Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1129591ybk; Thu, 14 May 2020 00:53:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx1K0QFlvF1Bh1Qes769+SKQHbYOjtarGUyzNWzf7me4xtuAp0XdyMA4nr69R1UxbIX9CaO X-Received: by 2002:a17:906:2d4a:: with SMTP id e10mr2783488eji.222.1589442828686; Thu, 14 May 2020 00:53:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589442828; cv=none; d=google.com; s=arc-20160816; b=Jfas4UHiA5g4Ic4TtNodUHuj226Xmo5L8uCU1sf8AwcRAH+HjYiDNOHeCz5HJbDxh1 guV6qDX1MtX9fcL1Zu1w3Bek1ZT6QC/S1K91UQrF+3j3I3+6S0YWXHlHvGvimjnJQ/2L zTjkY+xqFrA3Hb79OHSLtJkxa4YZUIwKBhje+D/I5zG4zzBXkvX4/ONr5y7CDe52m4at 5+QEL3qPH1fYy7T7argLgtCJZdHMLZBDlntbUqYqvIOn14cn/kN1XfRSV2MJxrIJOzC5 HxFDPm5jMyA3sCq/LAZiWHcz3n8gANK4PoiWV/090LhsKqp7dvZriRkrAEtH5dNUitYb oyng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:dkim-signature; bh=p0U/UT02XfTdoUDIf9op35mOVWZuHekP8TFVGz1ZDjg=; b=hKuZvjIfi7eNCJ0se3AvqNbc8FjZEITJmzSmLIHzvZdAurJEOgBpXeqFAu66Y0YPT/ TF3eDZjQegDkR4qoJGlxp0o1VjDiSF8ff0jjj5bK/1bpAMwL180cNURcP4EnPgL9USqE brhkDQzniFCZYYW048D3S9RhH1C6kJTPPvCZKrPJoIbtdNXQVcB+hxpjHJJ7qSJmnn7d BLcdPMHStrv/BOH9wa2sqe38G2wtvmtfXc4O+9Kqdx3mVCLf7M4RJepZbiTOrsC1MY0r +0FL5S72M3ErX0N+lpPE6UNxTXYZsTu3AYvG4O8PfM3Y8hWy+db56CkMzosVqCGpC7xh FGXw== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@marvell.com header.s=pfpt0818 header.b=TuXbyN+t; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=marvell.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h4si863472ejq.164.2020.05.14.00.53.25; Thu, 14 May 2020 00:53:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@marvell.com header.s=pfpt0818 header.b=TuXbyN+t; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=marvell.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725974AbgENHwC (ORCPT + 99 others); Thu, 14 May 2020 03:52:02 -0400 Received: from mx0b-0016f401.pphosted.com ([67.231.156.173]:15116 "EHLO mx0b-0016f401.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725878AbgENHwC (ORCPT ); Thu, 14 May 2020 03:52:02 -0400 Received: from pps.filterd (m0045851.ppops.net [127.0.0.1]) by mx0b-0016f401.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04E7kFxW027478; Thu, 14 May 2020 00:51:59 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-type; s=pfpt0818; bh=p0U/UT02XfTdoUDIf9op35mOVWZuHekP8TFVGz1ZDjg=; b=TuXbyN+toTOfF7So1evvV7jLnbMEUF+3HSmnSYVzBXa55ywr9xjWGIsxTT7cmbi+cwn1 GUkL1bzU0H8aIyhcKZyoldYFcgBFxso8xEHBosjuASSr9ja0pQeu+tUYy2Pc0jvQkb/K UPiE2dwcyvc0TioBpMAFlr9XuYc/2nZNaz9ZGyo5x5TbMgFmPDvR7Dc9DUvhMimA+wVm v5KtuIsnffoepYzgfZN+ybscd5kdNJinNAjHQflSVZOkCEBrjrouSSt3/76Y+dNGMl6w J7V/Ej9ms8zzVgXafsIaz2KwU09kLVzPi8K7QEYiLEUe5e6WXDWMWB6pffHAuj1V4iPa iQ== Received: from sc-exch03.marvell.com ([199.233.58.183]) by mx0b-0016f401.pphosted.com with ESMTP id 3100xk190s-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 14 May 2020 00:51:59 -0700 Received: from DC5-EXCH02.marvell.com (10.69.176.39) by SC-EXCH03.marvell.com (10.93.176.83) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 May 2020 00:51:56 -0700 Received: from bbhushan2.marvell.com (10.69.176.80) by DC5-EXCH02.marvell.com (10.69.176.39) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Thu, 14 May 2020 00:51:55 -0700 From: Bharat Bhushan To: , , , CC: Bharat Bhushan Subject: [PATCH v6] iommu/virtio: Use page size bitmap supported by endpoint Date: Thu, 14 May 2020 13:21:51 +0530 Message-ID: <20200514075152.3892-1-bbhushan2@marvell.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216,18.0.676 definitions=2020-05-14_01:2020-05-13,2020-05-14 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Different endpoint can support different page size, probe endpoint if it supports specific page size otherwise use global page sizes. Device attached to domain should support a minimum of domain supported page sizes. If device supports more than domain supported page sizes then device is limited to use domain supported page sizes only. Signed-off-by: Bharat Bhushan --- v5->v6 - property length before dereference - Error out on no supported page sizes (page-size-mask is zero) - Allow device to attach to domain even it supports minimum of domain supported page sizes. In that case device will use domain page sizes only. - added format of pgsize_bitmap v4->v5: - Rebase to Linux v5.7-rc4 v3->v4: - Fix whitespace error v2->v3: - Fixed error return for incompatible endpoint - __u64 changed to __le64 in header file drivers/iommu/virtio-iommu.c | 63 ++++++++++++++++++++++++++++--- include/uapi/linux/virtio_iommu.h | 14 ++++++- 2 files changed, 71 insertions(+), 6 deletions(-) diff --git a/drivers/iommu/virtio-iommu.c b/drivers/iommu/virtio-iommu.c index 4e1d11af23c8..cbac3047a781 100644 --- a/drivers/iommu/virtio-iommu.c +++ b/drivers/iommu/virtio-iommu.c @@ -78,6 +78,7 @@ struct viommu_endpoint { struct viommu_dev *viommu; struct viommu_domain *vdomain; struct list_head resv_regions; + u64 pgsize_bitmap; }; struct viommu_request { @@ -415,6 +416,23 @@ static int viommu_replay_mappings(struct viommu_domain *vdomain) return ret; } +static int viommu_set_pgsize_bitmap(struct viommu_endpoint *vdev, + struct virtio_iommu_probe_pgsize_mask *mask, + size_t len) +{ + u64 pgsize_bitmap; + + if (len < sizeof(*mask)) + return -EINVAL; + + pgsize_bitmap = le64_to_cpu(mask->pgsize_bitmap); + if (!pgsize_bitmap) + return -EINVAL; + + vdev->pgsize_bitmap = pgsize_bitmap; + return 0; +} + static int viommu_add_resv_mem(struct viommu_endpoint *vdev, struct virtio_iommu_probe_resv_mem *mem, size_t len) @@ -499,6 +517,9 @@ static int viommu_probe_endpoint(struct viommu_dev *viommu, struct device *dev) case VIRTIO_IOMMU_PROBE_T_RESV_MEM: ret = viommu_add_resv_mem(vdev, (void *)prop, len); break; + case VIRTIO_IOMMU_PROBE_T_PAGE_SIZE_MASK: + ret = viommu_set_pgsize_bitmap(vdev, (void *)prop, len); + break; default: dev_err(dev, "unknown viommu prop 0x%x\n", type); } @@ -615,7 +636,7 @@ static int viommu_domain_finalise(struct viommu_endpoint *vdev, struct viommu_dev *viommu = vdev->viommu; struct viommu_domain *vdomain = to_viommu_domain(domain); - viommu_page_size = 1UL << __ffs(viommu->pgsize_bitmap); + viommu_page_size = 1UL << __ffs(vdev->pgsize_bitmap); if (viommu_page_size > PAGE_SIZE) { dev_err(vdev->dev, "granule 0x%lx larger than system page size 0x%lx\n", @@ -630,7 +651,7 @@ static int viommu_domain_finalise(struct viommu_endpoint *vdev, vdomain->id = (unsigned int)ret; - domain->pgsize_bitmap = viommu->pgsize_bitmap; + domain->pgsize_bitmap = vdev->pgsize_bitmap; domain->geometry = viommu->geometry; vdomain->map_flags = viommu->map_flags; @@ -654,6 +675,38 @@ static void viommu_domain_free(struct iommu_domain *domain) kfree(vdomain); } +/* + * Check whether the endpoint's capabilities are compatible with other + * endpoints in the domain. Report any inconsistency. + */ +static bool viommu_endpoint_is_compatible(struct viommu_endpoint *vdev, + struct viommu_domain *vdomain) +{ + struct device *dev = vdev->dev; + u64 pgsize_bitmap; + + if (vdomain->viommu != vdev->viommu) { + dev_err(dev, "cannot attach to foreign vIOMMU\n"); + return false; + } + + pgsize_bitmap = vdomain->domain.pgsize_bitmap & vdev->pgsize_bitmap; + + if (pgsize_bitmap != vdomain->domain.pgsize_bitmap) { + dev_err(dev, "incompatible domain bitmap 0x%lx != 0x%llx\n", + vdomain->domain.pgsize_bitmap, vdev->pgsize_bitmap); + return false; + } + + /* Domain pagesize bitmap is subset of device pagesize bitmap */ + if (pgsize_bitmap != vdev->pgsize_bitmap) { + dev_info(dev, "page size bitmap used %llx, supported %llx\n", + pgsize_bitmap, vdev->pgsize_bitmap); + vdev->pgsize_bitmap = pgsize_bitmap; + } + return true; +} + static int viommu_attach_dev(struct iommu_domain *domain, struct device *dev) { int i; @@ -670,9 +723,8 @@ static int viommu_attach_dev(struct iommu_domain *domain, struct device *dev) * owns it. */ ret = viommu_domain_finalise(vdev, domain); - } else if (vdomain->viommu != vdev->viommu) { - dev_err(dev, "cannot attach to foreign vIOMMU\n"); - ret = -EXDEV; + } else if (!viommu_endpoint_is_compatible(vdev, vdomain)) { + ret = -EINVAL; } mutex_unlock(&vdomain->mutex); @@ -886,6 +938,7 @@ static int viommu_add_device(struct device *dev) vdev->dev = dev; vdev->viommu = viommu; + vdev->pgsize_bitmap = viommu->pgsize_bitmap; INIT_LIST_HEAD(&vdev->resv_regions); dev_iommu_priv_set(dev, vdev); diff --git a/include/uapi/linux/virtio_iommu.h b/include/uapi/linux/virtio_iommu.h index 48e3c29223b5..15a8327ffef5 100644 --- a/include/uapi/linux/virtio_iommu.h +++ b/include/uapi/linux/virtio_iommu.h @@ -28,7 +28,11 @@ struct virtio_iommu_range_32 { }; struct virtio_iommu_config { - /* Supported page sizes */ + /* + * Bitmap of supported page sizes. The least significant bit + * indicates the smallest granularity and the other bits are + * hints indicating optimal block sizes. + */ __u64 page_size_mask; /* Supported IOVA range */ struct virtio_iommu_range_64 input_range; @@ -111,6 +115,7 @@ struct virtio_iommu_req_unmap { #define VIRTIO_IOMMU_PROBE_T_NONE 0 #define VIRTIO_IOMMU_PROBE_T_RESV_MEM 1 +#define VIRTIO_IOMMU_PROBE_T_PAGE_SIZE_MASK 2 #define VIRTIO_IOMMU_PROBE_T_MASK 0xfff @@ -119,6 +124,13 @@ struct virtio_iommu_probe_property { __le16 length; }; +struct virtio_iommu_probe_pgsize_mask { + struct virtio_iommu_probe_property head; + __u8 reserved[4]; + /* Same format as virtio_iommu_config::page_size_mask */ + __le64 pgsize_bitmap; +}; + #define VIRTIO_IOMMU_RESV_MEM_T_RESERVED 0 #define VIRTIO_IOMMU_RESV_MEM_T_MSI 1 -- 2.17.1