Shared Virtual Addressing (SVA), a.k.a, Shared Virtual Memory (SVM) on
Intel platforms allows address space sharing between device DMA and
applications. SVA can reduce programming complexity and enhance security.

This VFIO series is intended to expose SVA usage to VMs. i.e. Sharing
guest application address space with passthru devices. This is called
vSVA in this series. The whole vSVA enabling requires QEMU/VFIO/IOMMU
changes. For IOMMU and QEMU changes, they are in separate series (listed
in the "Related series").

The high-level architecture for SVA virtualization is as below, the key
design of vSVA support is to utilize the dual-stage IOMMU translation (
also known as IOMMU nesting translation) capability in host IOMMU.


    .-------------.  .---------------------------.
    |   vIOMMU    |  | Guest process CR3, FL only|
    |             |  '---------------------------'
    .----------------/
    | PASID Entry |--- PASID cache flush -
    '-------------'                       |
    |             |                       V
    |             |                CR3 in GPA
    '-------------'
Guest
------| Shadow |--------------------------|--------
      v        v                          v
Host
    .-------------.  .----------------------.
    |   pIOMMU    |  | Bind FL for GVA-GPA  |
    |             |  '----------------------'
    .----------------/  |
    | PASID Entry |     V (Nested xlate)
    '----------------\.------------------------------.
    |             |   |SL for GPA-HPA, default domain|
    |             |   '------------------------------'
    '-------------'
Where:
 - FL = First level/stage one page tables
 - SL = Second level/stage two page tables

This patch series has been updated regards to the disscussion around PASID
allocation in v7 [1]. This series has removed the PASID allocation, and
adapted to the /dev/ioasid solution [2]. Therefore the patches in this series
has been re-ordered. And the Patch Overview is as below:

 1. reports IOMMU nesting info to userspace ( patch 0001, 0002, 0003, 0010)
 2. vfio support for binding guest page table to host (patch 0004)
 3. vfio support for IOMMU cache invalidation from VMs (patch 0005)
 4. vfio support for vSVA usage on IOMMU-backed mdevs (patch 0006, 0007)
 5. expose PASID capability to VM (patch 0008)
 6. add doc for VFIO dual stage control (patch 0009)

The complete vSVA kernel upstream patches are divided into three phases:
    1. Common APIs and PCI device direct assignment
    2. IOMMU-backed Mediated Device assignment
    3. Page Request Services (PRS) support

This patchset is aiming for the phase 1 and phase 2. And it has dependency on 
IOASID
extension from Jacobd Pan [3]. Complete set for current vSVA kernel and QEMU 
can be
found in [4] and [5].

[1] 
https://lore.kernel.org/kvm/dm5pr11mb14351121729909028d6eb365c3...@dm5pr11mb1435.namprd11.prod.outlook.com/
[2] 
https://lore.kernel.org/linux-iommu/1614463286-97618-19-git-send-email-jacob.jun....@linux.intel.com/
[3] 
https://lore.kernel.org/linux-iommu/1614463286-97618-1-git-send-email-jacob.jun....@linux.intel.com/
[4] https://github.com/jacobpan/linux/tree/vsva-linux-5.12-rc1-v8
[5] https://github.com/luxis1999/qemu/tree/vsva_5.12_rc1_qemu_rfcv11

Regards,
Yi Liu

Changelog:
        - Patch v7 -> Patch v8:
          a) removed the PASID allocation out of this series, it is covered by 
below patch:
             
https://lore.kernel.org/linux-iommu/1614463286-97618-19-git-send-email-jacob.jun....@linux.intel.com/
          Patch v7: 
https://lore.kernel.org/kvm/1599734733-6431-1-git-send-email-yi.l....@intel.com/

        - Patch v6 -> Patch v7:
          a) drop [PATCH v6 01/15] of v6 as it's merged by Alex.
          b) rebase on Jacob's v8 IOMMU uapi enhancement and v2 IOASID 
extension patchset.
          c) Address comments against v6 from Alex and Eric.
          Patch v6: 
https://lore.kernel.org/kvm/1595917664-33276-1-git-send-email-yi.l....@intel.com/

        - Patch v5 -> Patch v6:
          a) Address comments against v5 from Eric.
          b) rebase on Jacob's v6 IOMMU uapi enhancement
          Patch v5: 
https://lore.kernel.org/kvm/1594552870-55687-1-git-send-email-yi.l....@intel.com/

        - Patch v4 -> Patch v5:
          a) Address comments against v4
          Patch v4: 
https://lore.kernel.org/kvm/1593861989-35920-1-git-send-email-yi.l....@intel.com/

        - Patch v3 -> Patch v4:
          a) Address comments against v3
          b) Add rb from Stefan on patch 14/15
          Patch v3: 
https://lore.kernel.org/kvm/1592988927-48009-1-git-send-email-yi.l....@intel.com/

        - Patch v2 -> Patch v3:
          a) Rebase on top of Jacob's v3 iommu uapi patchset
          b) Address comments from Kevin and Stefan Hajnoczi
          c) Reuse DOMAIN_ATTR_NESTING to get iommu nesting info
          d) Drop [PATCH v2 07/15] iommu/uapi: Add iommu_gpasid_unbind_data
          Patch v2: 
https://lore.kernel.org/kvm/1591877734-66527-1-git-send-email-yi.l....@intel.com/

        - Patch v1 -> Patch v2:
          a) Refactor vfio_iommu_type1_ioctl() per suggestion from Christoph
             Hellwig.
          b) Re-sequence the patch series for better bisect support.
          c) Report IOMMU nesting cap info in detail instead of a format in
             v1.
          d) Enforce one group per nesting type container for vfio iommu type1
             driver.
          e) Build the vfio_mm related code from vfio.c to be a separate
             vfio_pasid.ko.
          f) Add PASID ownership check in IOMMU driver.
          g) Adopted to latest IOMMU UAPI design. Removed IOMMU UAPI version
             check. Added iommu_gpasid_unbind_data for unbind requests from
             userspace.
          h) Define a single ioctl:VFIO_IOMMU_NESTING_OP for bind/unbind_gtbl
             and cahce_invld.
          i) Document dual stage control in vfio.rst.
          Patch v1: 
https://lore.kernel.org/kvm/1584880325-10561-1-git-send-email-yi.l....@intel.com/

        - RFC v3 -> Patch v1:
          a) Address comments to the PASID request(alloc/free) path
          b) Report PASID alloc/free availabitiy to user-space
          c) Add a vfio_iommu_type1 parameter to support pasid quota tuning
          d) Adjusted to latest ioasid code implementation. e.g. remove the
             code for tracking the allocated PASIDs as latest ioasid code
             will track it, VFIO could use ioasid_free_set() to free all
             PASIDs.
          RFC v3: 
https://lore.kernel.org/kvm/1580299912-86084-1-git-send-email-yi.l....@intel.com/

        - RFC v2 -> v3:
          a) Refine the whole patchset to fit the roughly parts in this series
          b) Adds complete vfio PASID management framework. e.g. pasid alloc,
          free, reclaim in VM crash/down and per-VM PASID quota to prevent
          PASID abuse.
          c) Adds IOMMU uAPI version check and page table format check to ensure
          version compatibility and hardware compatibility.
          d) Adds vSVA vfio support for IOMMU-backed mdevs.
          RFC v2: 
https://lore.kernel.org/kvm/1571919983-3231-1-git-send-email-yi.l....@intel.com/

        - RFC v1 -> v2:
          Dropped vfio: VFIO_IOMMU_ATTACH/DETACH_PASID_TABLE.
          RFC v1: 
https://lore.kernel.org/kvm/1562324772-3084-1-git-send-email-yi.l....@intel.com/

---
Eric Auger (1):
  vfio: Document dual stage control

Liu Yi L (8):
  iommu: Report domain nesting info
  iommu/smmu: Report empty domain nesting info
  vfio/type1: Report iommu nesting info to userspace
  vfio/type1: Support binding guest page tables to PASID
  vfio/type1: Allow invalidating first-level/stage IOMMU cache
  vfio/type1: Add vSVA support for IOMMU-backed mdevs
  vfio/pci: Expose PCIe PASID capability to userspace
  iommu/vt-d: Support reporting nesting capability info

Yi Sun (1):
  iommu: Pass domain to sva_unbind_gpasid()

 Documentation/driver-api/vfio.rst           |  77 +++++
 Documentation/userspace-api/iommu.rst       |   5 +-
 drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c |  29 +-
 drivers/iommu/arm/arm-smmu/arm-smmu.c       |  29 +-
 drivers/iommu/intel/cap_audit.h             |   7 +
 drivers/iommu/intel/iommu.c                 |  68 ++++-
 drivers/iommu/intel/svm.c                   |   3 +-
 drivers/iommu/iommu.c                       |   2 +-
 drivers/vfio/pci/vfio_pci_config.c          |   2 +-
 drivers/vfio/vfio_iommu_type1.c             | 321 +++++++++++++++++++-
 include/linux/intel-iommu.h                 |   3 +-
 include/linux/iommu.h                       |   3 +-
 include/uapi/linux/iommu.h                  |  72 +++++
 include/uapi/linux/vfio.h                   |  57 ++++
 14 files changed, 651 insertions(+), 27 deletions(-)

-- 
2.25.1

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Reply via email to