On 2023/10/10 16:19, Tian, Kevin wrote:
From: Liu, Yi L yi.l.liu@intel.com Sent: Monday, October 9, 2023 4:51 PM
+struct iommufd_device *iommufd_device_bind_pasid(struct iommufd_ctx *ictx,
struct device *dev,u32 pasid, u32 *id)+{
- struct iommufd_device *idev;
- int rc;
- /*
* iommufd always sets IOMMU_CACHE because we offer no way foruserspace
* to restore cache coherency.*/- if (!device_iommu_capable(dev, IOMMU_CAP_CACHE_COHERENCY))
return ERR_PTR(-EINVAL);- /*
* No iommu supports pasid-granular msi message today. Here we* just check whether the parent device can do safe interrupts.* Isolation between virtual devices within the parent device* relies on the parent driver to enforce.*/- if (!iommufd_selftest_is_mock_dev(dev) &&
!msi_device_has_isolated_msi(dev)) {rc = iommufd_allow_unsafe_interrupts(dev);if (rc)return ERR_PTR(rc);- }
Only MemWr w/o pasid can be interpreted as an interrupt message then we need msi isolation to protect.
yes.
But for SIOV all MemWr's are tagged with a pasid hence can never trigger an interrupt. From this angle looks this check is unnecessary.
But the interrupts out from a SIOV virtual device do not have pasid (at least today). Seems still need a check here if we consider this bind for a SIOV virtual device just like binding a physical device.