[HACK. will fix in v2]

This patch introduces vfio type1v2-equivalent interface to userspace. Due
to aforementioned hack, iommufd currently calls exported vfio symbols to
handle map/unmap requests from the user.

Signed-off-by: Liu Yi L <yi.l....@intel.com>
---
 drivers/iommu/iommufd/iommufd.c | 104 ++++++++++++++++++++++++++++++++
 include/uapi/linux/iommu.h      |  29 +++++++++
 2 files changed, 133 insertions(+)

diff --git a/drivers/iommu/iommufd/iommufd.c b/drivers/iommu/iommufd/iommufd.c
index cbf5e30062a6..f5f2274d658c 100644
--- a/drivers/iommu/iommufd/iommufd.c
+++ b/drivers/iommu/iommufd/iommufd.c
@@ -55,6 +55,7 @@ struct iommufd_ioas {
        struct mutex lock;
        struct list_head device_list;
        struct iommu_domain *domain;
+       struct vfio_iommu *vfio_iommu; /* FIXME: added for reusing 
vfio_iommu_type1 code */
 };
 
 /*
@@ -158,6 +159,7 @@ static void ioas_put_locked(struct iommufd_ioas *ioas)
                return;
 
        WARN_ON(!list_empty(&ioas->device_list));
+       vfio_iommu_type1_release(ioas->vfio_iommu); /* FIXME: reused vfio code 
*/
        xa_erase(&ictx->ioasid_xa, ioasid);
        iommufd_ctx_put(ictx);
        kfree(ioas);
@@ -185,6 +187,7 @@ static int iommufd_ioasid_alloc(struct iommufd_ctx *ictx, 
unsigned long arg)
        struct iommufd_ioas *ioas;
        unsigned long minsz;
        int ioasid, ret;
+       struct vfio_iommu *vfio_iommu;
 
        minsz = offsetofend(struct iommu_ioasid_alloc, addr_width);
 
@@ -211,6 +214,18 @@ static int iommufd_ioasid_alloc(struct iommufd_ctx *ictx, 
unsigned long arg)
                return ret;
        }
 
+       /* FIXME: get a vfio_iommu object for dma map/unmap management */
+       vfio_iommu = vfio_iommu_type1_open(VFIO_TYPE1v2_IOMMU);
+       if (IS_ERR(vfio_iommu)) {
+               pr_err_ratelimited("Failed to get vfio_iommu object\n");
+               mutex_lock(&ictx->lock);
+               xa_erase(&ictx->ioasid_xa, ioasid);
+               mutex_unlock(&ictx->lock);
+               kfree(ioas);
+               return PTR_ERR(vfio_iommu);
+       }
+       ioas->vfio_iommu = vfio_iommu;
+
        ioas->ioasid = ioasid;
 
        /* only supports kernel managed I/O page table so far */
@@ -383,6 +398,49 @@ static int iommufd_get_device_info(struct iommufd_ctx 
*ictx,
        return copy_to_user((void __user *)arg, &info, minsz) ? -EFAULT : 0;
 }
 
+static int iommufd_process_dma_op(struct iommufd_ctx *ictx,
+                                 unsigned long arg, bool map)
+{
+       struct iommu_ioasid_dma_op dma;
+       unsigned long minsz;
+       struct iommufd_ioas *ioas = NULL;
+       int ret;
+
+       minsz = offsetofend(struct iommu_ioasid_dma_op, padding);
+
+       if (copy_from_user(&dma, (void __user *)arg, minsz))
+               return -EFAULT;
+
+       if (dma.argsz < minsz || dma.flags || dma.ioasid < 0)
+               return -EINVAL;
+
+       ioas = ioasid_get_ioas(ictx, dma.ioasid);
+       if (!ioas) {
+               pr_err_ratelimited("unkonwn IOASID %u\n", dma.ioasid);
+               return -EINVAL;
+       }
+
+       mutex_lock(&ioas->lock);
+
+       /*
+        * Needs to block map/unmap request from userspace before IOASID
+        * is attached to any device.
+        */
+       if (list_empty(&ioas->device_list)) {
+               ret = -EINVAL;
+               goto out;
+       }
+
+       if (map)
+               ret = vfio_iommu_type1_map_dma(ioas->vfio_iommu, arg + minsz);
+       else
+               ret = vfio_iommu_type1_unmap_dma(ioas->vfio_iommu, arg + minsz);
+out:
+       mutex_unlock(&ioas->lock);
+       ioas_put(ioas);
+       return ret;
+};
+
 static long iommufd_fops_unl_ioctl(struct file *filep,
                                   unsigned int cmd, unsigned long arg)
 {
@@ -409,6 +467,12 @@ static long iommufd_fops_unl_ioctl(struct file *filep,
        case IOMMU_IOASID_FREE:
                ret = iommufd_ioasid_free(ictx, arg);
                break;
+       case IOMMU_MAP_DMA:
+               ret = iommufd_process_dma_op(ictx, arg, true);
+               break;
+       case IOMMU_UNMAP_DMA:
+               ret = iommufd_process_dma_op(ictx, arg, false);
+               break;
        default:
                pr_err_ratelimited("unsupported cmd %u\n", cmd);
                break;
@@ -478,6 +542,39 @@ static int ioas_check_device_compatibility(struct 
iommufd_ioas *ioas,
        return 0;
 }
 
+/* HACK:
+ * vfio_iommu_add/remove_device() is hacky implementation for
+ * this version to add the device/group to vfio iommu type1.
+ */
+static int vfio_iommu_add_device(struct vfio_iommu *vfio_iommu,
+                                struct device *dev,
+                                struct iommu_domain *domain)
+{
+       struct iommu_group *group;
+       int ret;
+
+       group = iommu_group_get(dev);
+       if (!group)
+               return -EINVAL;
+
+       ret = vfio_iommu_add_group(vfio_iommu, group, domain);
+       iommu_group_put(group);
+       return ret;
+}
+
+static void vfio_iommu_remove_device(struct vfio_iommu *vfio_iommu,
+                                    struct device *dev)
+{
+       struct iommu_group *group;
+
+       group = iommu_group_get(dev);
+       if (!group)
+               return;
+
+       vfio_iommu_remove_group(vfio_iommu, group);
+       iommu_group_put(group);
+}
+
 /**
  * iommufd_device_attach_ioasid - attach device to an ioasid
  * @idev: [in] Pointer to struct iommufd_device.
@@ -539,11 +636,17 @@ int iommufd_device_attach_ioasid(struct iommufd_device 
*idev, int ioasid)
        if (ret)
                goto out_domain;
 
+       ret = vfio_iommu_add_device(ioas->vfio_iommu, idev->dev, domain);
+       if (ret)
+               goto out_detach;
+
        ioas_dev->idev = idev;
        list_add(&ioas_dev->next, &ioas->device_list);
        mutex_unlock(&ioas->lock);
 
        return 0;
+out_detach:
+       iommu_detach_device(domain, idev->dev);
 out_domain:
        ioas_free_domain_if_empty(ioas);
 out_free:
@@ -579,6 +682,7 @@ void iommufd_device_detach_ioasid(struct iommufd_device 
*idev, int ioasid)
        }
 
        list_del(&ioas_dev->next);
+       vfio_iommu_remove_device(ioas->vfio_iommu, idev->dev);
        iommu_detach_device(ioas->domain, idev->dev);
        ioas_free_domain_if_empty(ioas);
        kfree(ioas_dev);
diff --git a/include/uapi/linux/iommu.h b/include/uapi/linux/iommu.h
index f408ad3c8ade..fe815cc1f665 100644
--- a/include/uapi/linux/iommu.h
+++ b/include/uapi/linux/iommu.h
@@ -141,6 +141,35 @@ struct iommu_ioasid_alloc {
 
 #define IOMMU_IOASID_FREE              _IO(IOMMU_TYPE, IOMMU_BASE + 3)
 
+/*
+ * Map/unmap process virtual addresses to I/O virtual addresses.
+ *
+ * Provide VFIO type1 equivalent semantics. Start with the same
+ * restriction e.g. the unmap size should match those used in the
+ * original mapping call.
+ *
+ * @argsz:     user filled size of this data.
+ * @flags:     reserved for future extension.
+ * @ioasid:    the handle of target I/O address space.
+ * @data:      the operation payload, refer to vfio_iommu_type1_dma_{un}map.
+ *
+ * FIXME:
+ *     userspace needs to include uapi/vfio.h as well as interface reuses
+ *     the map/unmap logic from vfio iommu type1.
+ *
+ * Return: 0 on success, -errno on failure.
+ */
+struct iommu_ioasid_dma_op {
+       __u32   argsz;
+       __u32   flags;
+       __s32   ioasid;
+       __u32   padding;
+       __u8    data[];
+};
+
+#define IOMMU_MAP_DMA  _IO(IOMMU_TYPE, IOMMU_BASE + 4)
+#define IOMMU_UNMAP_DMA        _IO(IOMMU_TYPE, IOMMU_BASE + 5)
+
 #define IOMMU_FAULT_PERM_READ  (1 << 0) /* read */
 #define IOMMU_FAULT_PERM_WRITE (1 << 1) /* write */
 #define IOMMU_FAULT_PERM_EXEC  (1 << 2) /* exec */
-- 
2.25.1

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Reply via email to