lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <fa0f5283-fdc6-1cd5-b34d-dcdc86856ad1@intel.com>
Date:   Fri, 4 Aug 2023 10:58:16 +0800
From:   "Liu, Jingqi" <jingqi.liu@...el.com>
To:     Yi Liu <yi.l.liu@...el.com>, <joro@...tes.org>,
        <alex.williamson@...hat.com>, <jgg@...dia.com>,
        <kevin.tian@...el.com>, <robin.murphy@....com>,
        <baolu.lu@...ux.intel.com>
CC:     <cohuck@...hat.com>, <eric.auger@...hat.com>,
        <nicolinc@...dia.com>, <kvm@...r.kernel.org>,
        <mjrosato@...ux.ibm.com>, <chao.p.peng@...ux.intel.com>,
        <yi.y.sun@...ux.intel.com>, <peterx@...hat.com>,
        <jasowang@...hat.com>, <shameerali.kolothum.thodi@...wei.com>,
        <lulu@...hat.com>, <suravee.suthikulpanit@....com>,
        <iommu@...ts.linux.dev>, <linux-kernel@...r.kernel.org>,
        <linux-kselftest@...r.kernel.org>, <zhenzhong.duan@...el.com>
Subject: Re: [PATCH v5 2/4] iommu: Add new iommu op to get iommu hardware
 information

On 8/3/2023 10:31 PM, Yi Liu wrote:
> From: Lu Baolu <baolu.lu@...ux.intel.com>
>
> Introduce a new iommu op to get the IOMMU hardware capabilities for
> iommufd. This information will be used by any vIOMMU driver which is
> owned by userspace.
>
> This op chooses to make the special parameters opaque to the core. This
> suits the current usage model where accessing any of the IOMMU device
> special parameters does require a userspace driver that matches the kernel
> driver. If a need for common parameters, implemented similarly by several
> drivers, arises then there's room in the design to grow a generic parameter
> set as well. No wrapper API is added as it is supposed to be used by
> iommufd only.
>
> Different IOMMU hardware would have different hardware information. So the
> information reported differs as well. To let the external user understand
> the difference. enum iommu_hw_info_type is defined. For the iommu drivers
> that are capable to report hardware information, it should have a unique
> iommu_hw_info_type and return to caller. For the driver doesn't report
> hardware information, caller just uses IOMMU_HW_INFO_TYPE_NONE if a type
> is required.
>
> Signed-off-by: Lu Baolu <baolu.lu@...ux.intel.com>
> Co-developed-by: Nicolin Chen <nicolinc@...dia.com>
> Signed-off-by: Nicolin Chen <nicolinc@...dia.com>
> Signed-off-by: Yi Liu <yi.l.liu@...el.com>
> ---
>   include/linux/iommu.h        | 9 +++++++++
>   include/uapi/linux/iommufd.h | 8 ++++++++
>   2 files changed, 17 insertions(+)
>
> diff --git a/include/linux/iommu.h b/include/linux/iommu.h
> index e0245aa82b75..f2d6a3989713 100644
> --- a/include/linux/iommu.h
> +++ b/include/linux/iommu.h
> @@ -228,6 +228,14 @@ struct iommu_iotlb_gather {
>   /**
>    * struct iommu_ops - iommu ops and capabilities
>    * @capable: check capability
> + * @hw_info: IOMMU hardware information. The type of the returned data is
> + *           marked by the output type of this op. Type is one of
> + *           enum iommu_hw_info_type defined in include/uapi/linux/iommufd.h.
> + *           The drivers that support this op should define a unique type
> + *           in include/uapi/linux/iommufd.h. The data buffer returned by this
> + *           op is allocated in the IOMMU driver and the caller should free it
> + *           after use. Return the data buffer if success, or ERR_PTR on
> + *           failure.
>    * @domain_alloc: allocate iommu domain
>    * @probe_device: Add device to iommu driver handling
>    * @release_device: Remove device from iommu driver handling
> @@ -257,6 +265,7 @@ struct iommu_iotlb_gather {
>    */
>   struct iommu_ops {
>   	bool (*capable)(struct device *dev, enum iommu_cap);
> +	void *(*hw_info)(struct device *dev, u32 *length, u32 *type);
>   
>   	/* Domain allocation and freeing by the iommu driver */
>   	struct iommu_domain *(*domain_alloc)(unsigned iommu_domain_type);
> diff --git a/include/uapi/linux/iommufd.h b/include/uapi/linux/iommufd.h
> index 8245c01adca6..1f616b0f8ae0 100644
> --- a/include/uapi/linux/iommufd.h
> +++ b/include/uapi/linux/iommufd.h
> @@ -370,4 +370,12 @@ struct iommu_hwpt_alloc {
>   	__u32 __reserved;
>   };
>   #define IOMMU_HWPT_ALLOC _IO(IOMMUFD_TYPE, IOMMUFD_CMD_HWPT_ALLOC)
> +
> +/**
> + * enum iommu_hw_info_type - IOMMU Hardware Info Types
> + * @IOMMU_HW_INFO_TYPE_NONE: Used by the drivers that does not report hardware info
It looks like this:
/s/does/do

Thanks,
Jingqi

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ