Received: by 2002:a25:d7c1:0:0:0:0:0 with SMTP id o184csp4009590ybg; Fri, 25 Oct 2019 12:03:01 -0700 (PDT) X-Google-Smtp-Source: APXvYqyDhBc3zXUqza/uHX+gt+UfCCVavXU/Kq1j06ajBTq8vi0sWTSKPiU6+ocvf3zKnB+3ExAe X-Received: by 2002:a50:9fa4:: with SMTP id c33mr4858999edf.176.1572030180953; Fri, 25 Oct 2019 12:03:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572030180; cv=none; d=google.com; s=arc-20160816; b=o86vNt4koqPBknFCu5Nxku75SStnPI1aa2ZY7xBlqwNak0a7E/mkjPK+/9oYCG1L9f 1ZWDutjJ1hqmKGTiwq9Ljvg7/KwFw4XBJ70jBREt5MypKOoSLRBlnIc0BJgE96ah3DGE vnchyNFfYvVXJHyNqh5jP4o1mwTFg63esTEZBS67PiCQGzwQTEoFQ71CgQP0vqNiM/Me y+ynJ6qt9Y+NcJgeQAMV9AYVyaRK2YiN1/SvKOv51hiNlXC2c0qoCIF2aiRej9DilGUs /wR4ymQ2jfXUyosealbw2DjcdaPqiv9CZapCKNgd+KrxILDWdIgeXd0nh6KQluiCveF0 N3UA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=Wt5flPth9VvviRMC6Njblq7GS+u/XyuXoR9EyILhlf4=; b=abvHoSDtOkI7ma7g8wVOLTa7FxribMIz8nkTrWEe+ch4+FL6ox9/9Fr5gKLyvQctta chNMY/832G/QFHS74Qjlaf80Z06i4od2YOu0lH7yoKCKbA2n9xhI0MeeXtYyEZAAuptd ALUgVtNe3ghJc9mp0CQFBlhieO6b0Cr2ivKxNiR7N1cssbpvM7x1/yIVoSBYGxza9F+I ZECIPzvZ2rMKhJdEFqbMfl69hAc9+fRRY/3JNR/3c55a8gQ3LUid6yZFwzw8k2ez5r9V acRigVeaLHlJH4WMhHzWiXOsQTZm7IvQSScIeZrE/QR6951PordzdaKrS2zCHCW3J5lJ 9t1Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c9si1734894ejn.362.2019.10.25.12.02.33; Fri, 25 Oct 2019 12:03:00 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2438162AbfJXTut (ORCPT + 99 others); Thu, 24 Oct 2019 15:50:49 -0400 Received: from mga07.intel.com ([134.134.136.100]:62203 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2437983AbfJXTup (ORCPT ); Thu, 24 Oct 2019 15:50:45 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga001.jf.intel.com ([10.7.209.18]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 24 Oct 2019 12:50:43 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.68,225,1569308400"; d="scan'208";a="282043137" Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga001.jf.intel.com with ESMTP; 24 Oct 2019 12:50:43 -0700 From: Jacob Pan To: iommu@lists.linux-foundation.org, LKML , Joerg Roedel , David Woodhouse , Alex Williamson , Jean-Philippe Brucker Cc: "Yi Liu" , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , "Lu Baolu" , Jonathan Cameron , Eric Auger , Jacob Pan Subject: [PATCH v7 01/11] iommu/vt-d: Cache virtual command capability register Date: Thu, 24 Oct 2019 12:54:54 -0700 Message-Id: <1571946904-86776-2-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1571946904-86776-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1571946904-86776-1-git-send-email-jacob.jun.pan@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Virtual command registers are used in the guest only, to prevent vmexit cost, we cache the capability and store it during initialization. Signed-off-by: Jacob Pan --- drivers/iommu/dmar.c | 1 + include/linux/intel-iommu.h | 4 ++++ 2 files changed, 5 insertions(+) diff --git a/drivers/iommu/dmar.c b/drivers/iommu/dmar.c index eecd6a421667..49bb7d76e646 100644 --- a/drivers/iommu/dmar.c +++ b/drivers/iommu/dmar.c @@ -950,6 +950,7 @@ static int map_iommu(struct intel_iommu *iommu, u64 phys_addr) warn_invalid_dmar(phys_addr, " returns all ones"); goto unmap; } + iommu->vccap = dmar_readq(iommu->reg + DMAR_VCCAP_REG); /* the registers might be more than one page */ map_size = max_t(int, ecap_max_iotlb_offset(iommu->ecap), diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h index ed11ef594378..2e1bed9b7eef 100644 --- a/include/linux/intel-iommu.h +++ b/include/linux/intel-iommu.h @@ -186,6 +186,9 @@ #define ecap_max_handle_mask(e) ((e >> 20) & 0xf) #define ecap_sc_support(e) ((e >> 7) & 0x1) /* Snooping Control */ +/* Virtual command interface capabilities */ +#define vccap_pasid(v) ((v & DMA_VCS_PAS)) /* PASID allocation */ + /* IOTLB_REG */ #define DMA_TLB_FLUSH_GRANU_OFFSET 60 #define DMA_TLB_GLOBAL_FLUSH (((u64)1) << 60) @@ -520,6 +523,7 @@ struct intel_iommu { u64 reg_size; /* size of hw register set */ u64 cap; u64 ecap; + u64 vccap; u32 gcmd; /* Holds TE, EAFL. Don't need SRTP, SFL, WBF */ raw_spinlock_t register_lock; /* protect register handling */ int seq_id; /* sequence id of the iommu */ -- 2.7.4