Received: by 2002:a17:90a:88:0:0:0:0 with SMTP id a8csp4426531pja; Thu, 21 Nov 2019 19:09:56 -0800 (PST) X-Google-Smtp-Source: APXvYqyoc80Lz+6nnyuN6/fUzGbwTPOLCbi5uGP5b/jSEQ1FZkvIIP76RwzRvyekWNZLD+widkeO X-Received: by 2002:a17:906:4e83:: with SMTP id v3mr18853058eju.246.1574392196354; Thu, 21 Nov 2019 19:09:56 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1574392196; cv=none; d=google.com; s=arc-20160816; b=oEkHch0DbMDmrBC30IxBgbrv0DVhBO9a94KbGp74WesV8xfZ45TioCLjhviPa6XXoa 7N5dQMaCpiiXHf5o92ahFFA86nTbRrxobgBImlfBAkHAcQCw7PUNJRsK2rgBpQ6Y762u IhqVEEIWi9Nh22C3v/w394ycOpiErLGO8ttXRHn1dXlKXwGycqkgdZxNPO61IixWXcgT VF/bDUe3qo51UBrpNW46EDnqgnOryh5uKrU1KUAQMwILELJFB+5+U2KSyBgLXe1l8oBy 3TYA+1hZY+MNC2UQ7hJ62XHe2A8hSWixqDp5BePepHcXQ/lgBGvv4Q3hXg2hUzc/VVIN KO7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=DhaYjTau2jM8bLdUcUSqrBKmchrSKj3Dz+hr5Z+jPVg=; b=tiGTFJws8qsA2ICYMktGbLAXTph1exhoak5OSqVMbsLBMH3DwYRwe0SUxFbjZsur5E W6k9NldArzEWUmYnu6qFJKWmYztaOFykuWmuvCZEo3B3dlOIrckESctPYrt8pqfCIG2K c2a8SqamBXviDjBL9lGGNgqZhOISR35U+sTfpYbx1/H20AFEukm9h8FaX9EP95TUMJ3g giVWhCUtSunC9t4aRyrlcrRJPQSuf2CAk1mgHj/DxXdV0jN+jblyUITT481ekrvBQg25 uGxXDPiGlAFSsAhsPuxH2vJsee4TZt9i9eaTET/U2qxNHVq2uIUlyD9aNQhUiYDKg5yN RLwQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id br3si3314889ejb.436.2019.11.21.19.09.31; Thu, 21 Nov 2019 19:09:56 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726813AbfKVDIa (ORCPT + 99 others); Thu, 21 Nov 2019 22:08:30 -0500 Received: from mga14.intel.com ([192.55.52.115]:53719 "EHLO mga14.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726765AbfKVDI2 (ORCPT ); Thu, 21 Nov 2019 22:08:28 -0500 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Nov 2019 19:08:28 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,228,1571727600"; d="scan'208";a="232540456" Received: from allen-box.sh.intel.com ([10.239.159.136]) by fmsmga004.fm.intel.com with ESMTP; 21 Nov 2019 19:08:26 -0800 From: Lu Baolu To: Joerg Roedel Cc: David Woodhouse , ashok.raj@intel.com, jacob.jun.pan@linux.intel.com, kevin.tian@intel.com, Eric Auger , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Lu Baolu Subject: [PATCH 4/5] iommu/vt-d: Consolidate pasid-based tlb invalidation Date: Fri, 22 Nov 2019 11:04:48 +0800 Message-Id: <20191122030449.28892-5-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20191122030449.28892-1-baolu.lu@linux.intel.com> References: <20191122030449.28892-1-baolu.lu@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Merge pasid-based tlb invalidation into iommu->flush.p_iotlb_inv. Signed-off-by: Lu Baolu --- drivers/iommu/intel-iommu.c | 43 +++++++++++++++++++++++++++++++++++++ drivers/iommu/intel-pasid.c | 18 ++-------------- drivers/iommu/intel-svm.c | 23 +++----------------- 3 files changed, 48 insertions(+), 36 deletions(-) diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c index 4eeb18942d3c..fec78cc877c1 100644 --- a/drivers/iommu/intel-iommu.c +++ b/drivers/iommu/intel-iommu.c @@ -3032,6 +3032,48 @@ qi_flush_dev_iotlb(struct intel_iommu *iommu, u16 sid, u16 pfsid, qi_submit_sync(&desc, iommu); } +/* PASID-based IOTLB invalidation */ +static void +qi_flush_piotlb(struct intel_iommu *iommu, u16 did, u32 pasid, u64 addr, + unsigned long npages, bool ih) +{ + struct qi_desc desc = {.qw2 = 0, .qw3 = 0}; + + /* + * npages == -1 means a PASID-selective invalidation, otherwise, + * a positive value for Page-selective-within-PASID invalidation. + * 0 is not a valid input. + */ + if (WARN_ON(!npages)) { + pr_err("Invalid input npages = %ld\n", npages); + return; + } + + if (npages == -1) { + desc.qw0 = QI_EIOTLB_PASID(pasid) | + QI_EIOTLB_DID(did) | + QI_EIOTLB_GRAN(QI_GRAN_NONG_PASID) | + QI_EIOTLB_TYPE; + desc.qw1 = 0; + } else { + int mask = ilog2(__roundup_pow_of_two(npages)); + unsigned long align = (1ULL << (VTD_PAGE_SHIFT + mask)); + + if (WARN_ON_ONCE(!ALIGN(addr, align))) + addr &= ~(align - 1); + + desc.qw0 = QI_EIOTLB_PASID(pasid) | + QI_EIOTLB_DID(did) | + QI_EIOTLB_GRAN(QI_GRAN_PSI_PASID) | + QI_EIOTLB_TYPE; + desc.qw1 = QI_EIOTLB_ADDR(addr) | + QI_EIOTLB_IH(ih) | + QI_EIOTLB_AM(mask); + } + + qi_submit_sync(&desc, iommu); +} + static void intel_iommu_init_qi(struct intel_iommu *iommu) { /* @@ -3065,6 +3107,7 @@ static void intel_iommu_init_qi(struct intel_iommu *iommu) iommu->flush.iotlb_inv = qi_flush_iotlb; iommu->flush.pc_inv = qi_flush_pasid; iommu->flush.dev_tlb_inv = qi_flush_dev_iotlb; + iommu->flush.p_iotlb_inv = qi_flush_piotlb; pr_info("%s: Using Queued invalidation\n", iommu->name); } } diff --git a/drivers/iommu/intel-pasid.c b/drivers/iommu/intel-pasid.c index 01dd9c86178b..78ff4eee8595 100644 --- a/drivers/iommu/intel-pasid.c +++ b/drivers/iommu/intel-pasid.c @@ -359,20 +359,6 @@ pasid_set_flpm(struct pasid_entry *pe, u64 value) pasid_set_bits(&pe->val[2], GENMASK_ULL(3, 2), value << 2); } -static void -iotlb_invalidation_with_pasid(struct intel_iommu *iommu, u16 did, u32 pasid) -{ - struct qi_desc desc; - - desc.qw0 = QI_EIOTLB_PASID(pasid) | QI_EIOTLB_DID(did) | - QI_EIOTLB_GRAN(QI_GRAN_NONG_PASID) | QI_EIOTLB_TYPE; - desc.qw1 = 0; - desc.qw2 = 0; - desc.qw3 = 0; - - qi_submit_sync(&desc, iommu); -} - static void devtlb_invalidation_with_pasid(struct intel_iommu *iommu, struct device *dev, int pasid) @@ -409,7 +395,7 @@ void intel_pasid_tear_down_entry(struct intel_iommu *iommu, clflush_cache_range(pte, sizeof(*pte)); iommu->flush.pc_inv(iommu, did, pasid, QI_PC_GRAN_PSWD); - iotlb_invalidation_with_pasid(iommu, did, pasid); + iommu->flush.p_iotlb_inv(iommu, did, pasid, 0, -1, 0); /* Device IOTLB doesn't need to be flushed in caching mode. */ if (!cap_caching_mode(iommu->cap)) @@ -425,7 +411,7 @@ static void pasid_flush_caches(struct intel_iommu *iommu, if (cap_caching_mode(iommu->cap)) { iommu->flush.pc_inv(iommu, did, pasid, QI_PC_GRAN_PSWD); - iotlb_invalidation_with_pasid(iommu, did, pasid); + iommu->flush.p_iotlb_inv(iommu, did, pasid, 0, -1, 0); } else { iommu_flush_write_buffer(iommu); } diff --git a/drivers/iommu/intel-svm.c b/drivers/iommu/intel-svm.c index f5594b9981a5..02c6b14f0568 100644 --- a/drivers/iommu/intel-svm.c +++ b/drivers/iommu/intel-svm.c @@ -118,27 +118,10 @@ static void intel_flush_svm_range_dev (struct intel_svm *svm, struct intel_svm_d unsigned long address, unsigned long pages, int ih) { struct qi_desc desc; + struct intel_iommu *iommu = svm->iommu; - if (pages == -1) { - desc.qw0 = QI_EIOTLB_PASID(svm->pasid) | - QI_EIOTLB_DID(sdev->did) | - QI_EIOTLB_GRAN(QI_GRAN_NONG_PASID) | - QI_EIOTLB_TYPE; - desc.qw1 = 0; - } else { - int mask = ilog2(__roundup_pow_of_two(pages)); - - desc.qw0 = QI_EIOTLB_PASID(svm->pasid) | - QI_EIOTLB_DID(sdev->did) | - QI_EIOTLB_GRAN(QI_GRAN_PSI_PASID) | - QI_EIOTLB_TYPE; - desc.qw1 = QI_EIOTLB_ADDR(address) | - QI_EIOTLB_IH(ih) | - QI_EIOTLB_AM(mask); - } - desc.qw2 = 0; - desc.qw3 = 0; - qi_submit_sync(&desc, svm->iommu); + iommu->flush.p_iotlb_inv(iommu, sdev->did, + svm->pasid, address, pages, ih); if (sdev->dev_iotlb) { desc.qw0 = QI_DEV_EIOTLB_PASID(svm->pasid) | -- 2.17.1