------------------ Original ------------------ From: "Jason Gunthorpe" <iommu@lists.linux-foundation.org>; Date: Sat, Mar 19, 2022 01:27 AM To: Cc: "Jean-Philippe Brucker"<jean-philippe@linaro.org>;"Chaitanya Kulkarni"<chaitanyak@nvidia.com>;"kvm"<kvm@vger.kernel.org>;"Michael S. Tsirkin"<mst@redhat.com>;"Jason Wang"<jasowang@redhat.com>;"Cornelia Huck"<cohuck@redhat.com>;"Niklas Schnelle"<schnelle@linux.ibm.com>;"iommu"<iommu@lists.linux-foundation.org>;"Daniel Jordan"<daniel.m.jordan@oracle.com>;"Kevin Tian"<kevin.tian@intel.com>;"Alex Williamson"<alex.williamson@redhat.com>;"Joao Martins"<joao.m.martins@oracle.com>;"David Gibson"<david@gibson.dropbear.id.au>; Subject: [PATCH RFC 00/12] IOMMUFD Generic interface
iommufd is the user API to control the IOMMU subsystem as it relates to managing IO page tables that point at user space memory.
It takes over from drivers/vfio/vfio_iommu_type1.c (aka the VFIO container) which is the VFIO specific interface for a similar idea.
We see a broad need for extended features, some being highly IOMMU device specific: - Binding iommu_domain's to PASID/SSID - Userspace page tables, for ARM, x86 and S390 - Kernel bypass'd invalidation of user page tables - Re-use of the KVM page table in the IOMMU - Dirty page tracking in the IOMMU - Runtime Increase/Decrease of IOPTE size - PRI support with faults resolved in userspace
As well as a need to access these features beyond just VFIO, VDPA for instance, but other classes of accelerator HW are touching on these areas now too.
The v1 series proposed re-using the VFIO type 1 data structure, however it was suggested that if we are doing this big update then we should also come with a data structure that solves the limitations that VFIO type1 has. Notably this addresses:
- Multiple IOAS/'containers' and multiple domains inside a single FD
- Single-pin operation no matter how many domains and containers use a page
- A fine grained locking scheme supporting user managed concurrency for multi-threaded map/unmap
- A pre-registration mechanism to optimize vIOMMU use cases by pre-pinning pages
- Extended ioctl API that can manage these new objects and exposes domains directly to user space
- domains are sharable between subsystems, eg VFIO and VDPA
The bulk of this code is a new data structure design to track how the IOVAs are mapped to PFNs.
iommufd intends to be general and consumable by any driver that wants to DMA to userspace. From a driver perspective it can largely be dropped in in-place of iommu_attach_device() and provides a uniform full feature set to all consumers.
As this is a larger project this series is the first step. This series provides the iommfd "generic interface" which is designed to be suitable for applications like DPDK and VMM flows that are not optimized to specific HW scenarios. It is close to being a drop in replacement for the existing VFIO type 1.
This is part two of three for an initial sequence: - Move IOMMU Group security into the iommu layer https://lore.kernel.org/linux-iommu/20220218005521.172832-1-baolu.lu@linux.i... * Generic IOMMUFD implementation - VFIO ability to consume IOMMUFD An early exploration of this is available here: https://github.com/luxis1999/iommufd/commits/iommufd-v5.17-rc6
Various parts of the above extended features are in WIP stages currently to define how their IOCTL interface should work.
At this point, using the draft VFIO series, unmodified qemu has been tested to operate using iommufd on x86 and ARM systems.
Several people have contributed directly to this work: Eric Auger, Kevin Tian, Lu Baolu, Nicolin Chen, Yi L Liu. Many more have participated in the discussions that lead here, and provided ideas. Thanks to all!
This is on github: https://github.com/jgunthorpe/linux/commits/iommufd
# S390 in-kernel page table walker Cc: Niklas Schnelle <schnelle@linux.ibm.com> Cc: Matthew Rosato <mjrosato@linux.ibm.com> # AMD Dirty page tracking Cc: Joao Martins <joao.m.martins@oracle.com> # ARM SMMU Dirty page tracking Cc: Keqian Zhu <zhukeqian1@huawei.com> Cc: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@huawei.com> # ARM SMMU nesting Cc: Eric Auger <eric.auger@redhat.com> Cc: Jean-Philippe Brucker <jean-philippe@linaro.org> # Map/unmap performance Cc: Daniel Jordan <daniel.m.jordan@oracle.com> # VDPA Cc: "Michael S. Tsirkin" <mst@redhat.com> Cc: Jason Wang <jasowang@redhat.com> # Power Cc: David Gibson <david@gibson.dropbear.id.au> # vfio Cc: Alex Williamson <alex.williamson@redhat.com> Cc: Cornelia Huck <cohuck@redhat.com> Cc: kvm@vger.kernel.org # iommu Cc: iommu@lists.linux-foundation.org # Collaborators Cc: "Chaitanya Kulkarni" <chaitanyak@nvidia.com> Cc: Nicolin Chen <nicolinc@nvidia.com> Cc: Lu Baolu <baolu.lu@linux.intel.com> Cc: Kevin Tian <kevin.tian@intel.com> Cc: Yi Liu <yi.l.liu@intel.com> Signed-off-by: Jason Gunthorpe <jgg@nvidia.com>
Jason Gunthorpe (11): interval-tree: Add a utility to iterate over spans in an interval tree iommufd: File descriptor, context, kconfig and makefiles kernel/user: Allow user::locked_vm to be usable for iommufd iommufd: PFN handling for iopt_pages iommufd: Algorithms for PFN storage iommufd: Data structure to provide IOVA to PFN mapping iommufd: IOCTLs for the io_pagetable iommufd: Add a HW pagetable object iommufd: Add kAPI toward external drivers iommufd: vfio container FD ioctl compatibility iommufd: Add a selftest
Kevin Tian (1): iommufd: Overview documentation
Documentation/userspace-api/index.rst | 1 + .../userspace-api/ioctl/ioctl-number.rst | 1 + Documentation/userspace-api/iommufd.rst | 224 +++ MAINTAINERS | 10 + drivers/iommu/Kconfig | 1 + drivers/iommu/Makefile | 2 +- drivers/iommu/iommufd/Kconfig | 22 + drivers/iommu/iommufd/Makefile | 13 + drivers/iommu/iommufd/device.c | 274 ++++ drivers/iommu/iommufd/hw_pagetable.c | 142 ++ drivers/iommu/iommufd/io_pagetable.c | 890 +++++++++++ drivers/iommu/iommufd/io_pagetable.h | 170 +++ drivers/iommu/iommufd/ioas.c | 252 ++++ drivers/iommu/iommufd/iommufd_private.h | 231 +++ drivers/iommu/iommufd/iommufd_test.h | 65 + drivers/iommu/iommufd/main.c | 346 +++++ drivers/iommu/iommufd/pages.c | 1321 +++++++++++++++++ drivers/iommu/iommufd/selftest.c | 495 ++++++ drivers/iommu/iommufd/vfio_compat.c | 401 +++++ include/linux/interval_tree.h | 41 + include/linux/iommufd.h | 50 + include/linux/sched/user.h | 2 +- include/uapi/linux/iommufd.h | 223 +++ kernel/user.c | 1 + lib/interval_tree.c | 98 ++ tools/testing/selftests/Makefile | 1 + tools/testing/selftests/iommu/.gitignore | 2 + tools/testing/selftests/iommu/Makefile | 11 + tools/testing/selftests/iommu/config | 2 + tools/testing/selftests/iommu/iommufd.c | 1225 +++++++++++++++ 30 files changed, 6515 insertions(+), 2 deletions(-) create mode 100644 Documentation/userspace-api/iommufd.rst create mode 100644 drivers/iommu/iommufd/Kconfig create mode 100644 drivers/iommu/iommufd/Makefile create mode 100644 drivers/iommu/iommufd/device.c create mode 100644 drivers/iommu/iommufd/hw_pagetable.c create mode 100644 drivers/iommu/iommufd/io_pagetable.c create mode 100644 drivers/iommu/iommufd/io_pagetable.h create mode 100644 drivers/iommu/iommufd/ioas.c create mode 100644 drivers/iommu/iommufd/iommufd_private.h create mode 100644 drivers/iommu/iommufd/iommufd_test.h create mode 100644 drivers/iommu/iommufd/main.c create mode 100644 drivers/iommu/iommufd/pages.c create mode 100644 drivers/iommu/iommufd/selftest.c create mode 100644 drivers/iommu/iommufd/vfio_compat.c create mode 100644 include/linux/iommufd.h create mode 100644 include/uapi/linux/iommufd.h create mode 100644 tools/testing/selftests/iommu/.gitignore create mode 100644 tools/testing/selftests/iommu/Makefile create mode 100644 tools/testing/selftests/iommu/config create mode 100644 tools/testing/selftests/iommu/iommufd.c
base-commit: d1c716ed82a6bf4c35ba7be3741b9362e84cd722