Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp1131047ybk; Thu, 14 May 2020 00:57:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz6ubWVU//U5Vwzi0wo4SgJ1lYbflVqMcUlBpV8Ohf9hN0i9slXL+oCrvpXuSacS8JQSboH X-Received: by 2002:a05:6402:2211:: with SMTP id cq17mr2665558edb.171.1589443023215; Thu, 14 May 2020 00:57:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589443023; cv=none; d=google.com; s=arc-20160816; b=EeicvjCMbG7MEl+LdLAvINmT9CfliD8r90zG29Jw7uFX5DFAcS3TGT8YaXjVxc4ZPT ahAqLQXVDetT2XUvQ5bx/p8Y/pQlX7KS21yxOcJXhTOX8yp33i2O+obC/zK0OZ8VDJo0 PYWSIo+QvOVFL1llSSazxR6gmJMdJIS7C6fXunn3iLaidusgN3fuH2y/hPsRRrr44TGT 9IEz6hqacJhDkTAGj2JAskit9XIirN6ayvkfDdkEM564WCJL+Vo7HIVTJjn7D3rKbo47 tIc71r+mZi0O/O9S2mZE3GABdV1zj9RyONYmzXRnzaP/M0HanNqdUJbTowVV1g7E5cJY b0Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from:dkim-signature; bh=p0U/UT02XfTdoUDIf9op35mOVWZuHekP8TFVGz1ZDjg=; b=hbn/5k3TvtrO0A/9l4VM0Bfy9RUXvnL4kT3eZ5gbZVi0L+TTKsxQXn5u+0G8+w9b3s rW9sUmsCjqUH2DJc+5MnRBFAEkEoSPOb4scxwTUKMqe+51CF4Zc1QTBrKbhAx6ppTaMz wIQ5W1A6lvWK1F6eq4gTyzyNUy0aP8wPf+yToLbcEm/sTfO7S38VXWDEk4CT0vLbXJT7 80VLe9m32c7refMGymu+nzlEJ/ABk3Qbgh4csGUNXZjc5alQFa0kpqzFhW8nUXGsiFtx GLox/K4ZXknq24DkqiclGzNvKOXkBBNsJJ3ynSQNVlP3Uec3x4ChiznG2+3DUBteaZnN Kpyw== ARC-Authentication-Results: i=1; mx.google.com; dkim=temperror (no key for signature) header.i=@marvell.com header.s=pfpt0818 header.b=rPnfypHL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=marvell.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o1si1043893edi.246.2020.05.14.00.56.39; Thu, 14 May 2020 00:57:03 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=temperror (no key for signature) header.i=@marvell.com header.s=pfpt0818 header.b=rPnfypHL; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=marvell.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726011AbgENHwy (ORCPT + 99 others); Thu, 14 May 2020 03:52:54 -0400 Received: from mx0a-0016f401.pphosted.com ([67.231.148.174]:21232 "EHLO mx0b-0016f401.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725878AbgENHwy (ORCPT ); Thu, 14 May 2020 03:52:54 -0400 Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 04E7jXLs003237; Thu, 14 May 2020 00:52:46 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=pfpt0818; bh=p0U/UT02XfTdoUDIf9op35mOVWZuHekP8TFVGz1ZDjg=; b=rPnfypHLYFLgigPGKf4Mx/WClzb5hYR63tfkrzD/Ksg22dEkFLuv5pfoatbPDujevXVA hszxfLeiS9NBUR1KOdEDUFREcEyRGXAUgD202CSwVyiUaQupd0P85h0v0fUXoK8E6o6b KEPPcu1raiNix6fiD7EWDu5olo8VaibmODVIR0MqHYXJOLErI2lwp8OMLS1WOtX3gqDb sBWYMlsfmiqEEijlFJdy3LPzjrZH8A2Iy8n5T/bllgnSANoj9nMSKeW3Fq2GNIWpj2t2 1onOuePV5L3nUiES58zUmJ11G9xOduOMpSP85PAxzBNp/NvRf24ReLfrZ2kP+JKLm0yA +g== Received: from sc-exch01.marvell.com ([199.233.58.181]) by mx0a-0016f401.pphosted.com with ESMTP id 3100xah94d-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT); Thu, 14 May 2020 00:52:45 -0700 Received: from DC5-EXCH01.marvell.com (10.69.176.38) by SC-EXCH01.marvell.com (10.93.176.81) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 14 May 2020 00:52:44 -0700 Received: from bbhushan2.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Thu, 14 May 2020 00:52:41 -0700 From: Bharat Bhushan To: , , , , , , , , , CC: Bharat Bhushan Subject: [PATCH v6] iommu/virtio: Use page size bitmap supported by endpoint Date: Thu, 14 May 2020 13:22:37 +0530 Message-ID: <20200514075237.3941-1-bbhushan2@marvell.com> X-Mailer: git-send-email 2.17.1 MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.216,18.0.676 definitions=2020-05-14_01:2020-05-13,2020-05-14 signatures=0 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Different endpoint can support different page size, probe endpoint if it supports specific page size otherwise use global page sizes. Device attached to domain should support a minimum of domain supported page sizes. If device supports more than domain supported page sizes then device is limited to use domain supported page sizes only. Signed-off-by: Bharat Bhushan --- v5->v6 - property length before dereference - Error out on no supported page sizes (page-size-mask is zero) - Allow device to attach to domain even it supports minimum of domain supported page sizes. In that case device will use domain page sizes only. - added format of pgsize_bitmap v4->v5: - Rebase to Linux v5.7-rc4 v3->v4: - Fix whitespace error v2->v3: - Fixed error return for incompatible endpoint - __u64 changed to __le64 in header file drivers/iommu/virtio-iommu.c | 63 ++++++++++++++++++++++++++++--- include/uapi/linux/virtio_iommu.h | 14 ++++++- 2 files changed, 71 insertions(+), 6 deletions(-) diff --git a/drivers/iommu/virtio-iommu.c b/drivers/iommu/virtio-iommu.c index 4e1d11af23c8..cbac3047a781 100644 --- a/drivers/iommu/virtio-iommu.c +++ b/drivers/iommu/virtio-iommu.c @@ -78,6 +78,7 @@ struct viommu_endpoint { struct viommu_dev *viommu; struct viommu_domain *vdomain; struct list_head resv_regions; + u64 pgsize_bitmap; }; struct viommu_request { @@ -415,6 +416,23 @@ static int viommu_replay_mappings(struct viommu_domain *vdomain) return ret; } +static int viommu_set_pgsize_bitmap(struct viommu_endpoint *vdev, + struct virtio_iommu_probe_pgsize_mask *mask, + size_t len) +{ + u64 pgsize_bitmap; + + if (len < sizeof(*mask)) + return -EINVAL; + + pgsize_bitmap = le64_to_cpu(mask->pgsize_bitmap); + if (!pgsize_bitmap) + return -EINVAL; + + vdev->pgsize_bitmap = pgsize_bitmap; + return 0; +} + static int viommu_add_resv_mem(struct viommu_endpoint *vdev, struct virtio_iommu_probe_resv_mem *mem, size_t len) @@ -499,6 +517,9 @@ static int viommu_probe_endpoint(struct viommu_dev *viommu, struct device *dev) case VIRTIO_IOMMU_PROBE_T_RESV_MEM: ret = viommu_add_resv_mem(vdev, (void *)prop, len); break; + case VIRTIO_IOMMU_PROBE_T_PAGE_SIZE_MASK: + ret = viommu_set_pgsize_bitmap(vdev, (void *)prop, len); + break; default: dev_err(dev, "unknown viommu prop 0x%x\n", type); } @@ -615,7 +636,7 @@ static int viommu_domain_finalise(struct viommu_endpoint *vdev, struct viommu_dev *viommu = vdev->viommu; struct viommu_domain *vdomain = to_viommu_domain(domain); - viommu_page_size = 1UL << __ffs(viommu->pgsize_bitmap); + viommu_page_size = 1UL << __ffs(vdev->pgsize_bitmap); if (viommu_page_size > PAGE_SIZE) { dev_err(vdev->dev, "granule 0x%lx larger than system page size 0x%lx\n", @@ -630,7 +651,7 @@ static int viommu_domain_finalise(struct viommu_endpoint *vdev, vdomain->id = (unsigned int)ret; - domain->pgsize_bitmap = viommu->pgsize_bitmap; + domain->pgsize_bitmap = vdev->pgsize_bitmap; domain->geometry = viommu->geometry; vdomain->map_flags = viommu->map_flags; @@ -654,6 +675,38 @@ static void viommu_domain_free(struct iommu_domain *domain) kfree(vdomain); } +/* + * Check whether the endpoint's capabilities are compatible with other + * endpoints in the domain. Report any inconsistency. + */ +static bool viommu_endpoint_is_compatible(struct viommu_endpoint *vdev, + struct viommu_domain *vdomain) +{ + struct device *dev = vdev->dev; + u64 pgsize_bitmap; + + if (vdomain->viommu != vdev->viommu) { + dev_err(dev, "cannot attach to foreign vIOMMU\n"); + return false; + } + + pgsize_bitmap = vdomain->domain.pgsize_bitmap & vdev->pgsize_bitmap; + + if (pgsize_bitmap != vdomain->domain.pgsize_bitmap) { + dev_err(dev, "incompatible domain bitmap 0x%lx != 0x%llx\n", + vdomain->domain.pgsize_bitmap, vdev->pgsize_bitmap); + return false; + } + + /* Domain pagesize bitmap is subset of device pagesize bitmap */ + if (pgsize_bitmap != vdev->pgsize_bitmap) { + dev_info(dev, "page size bitmap used %llx, supported %llx\n", + pgsize_bitmap, vdev->pgsize_bitmap); + vdev->pgsize_bitmap = pgsize_bitmap; + } + return true; +} + static int viommu_attach_dev(struct iommu_domain *domain, struct device *dev) { int i; @@ -670,9 +723,8 @@ static int viommu_attach_dev(struct iommu_domain *domain, struct device *dev) * owns it. */ ret = viommu_domain_finalise(vdev, domain); - } else if (vdomain->viommu != vdev->viommu) { - dev_err(dev, "cannot attach to foreign vIOMMU\n"); - ret = -EXDEV; + } else if (!viommu_endpoint_is_compatible(vdev, vdomain)) { + ret = -EINVAL; } mutex_unlock(&vdomain->mutex); @@ -886,6 +938,7 @@ static int viommu_add_device(struct device *dev) vdev->dev = dev; vdev->viommu = viommu; + vdev->pgsize_bitmap = viommu->pgsize_bitmap; INIT_LIST_HEAD(&vdev->resv_regions); dev_iommu_priv_set(dev, vdev); diff --git a/include/uapi/linux/virtio_iommu.h b/include/uapi/linux/virtio_iommu.h index 48e3c29223b5..15a8327ffef5 100644 --- a/include/uapi/linux/virtio_iommu.h +++ b/include/uapi/linux/virtio_iommu.h @@ -28,7 +28,11 @@ struct virtio_iommu_range_32 { }; struct virtio_iommu_config { - /* Supported page sizes */ + /* + * Bitmap of supported page sizes. The least significant bit + * indicates the smallest granularity and the other bits are + * hints indicating optimal block sizes. + */ __u64 page_size_mask; /* Supported IOVA range */ struct virtio_iommu_range_64 input_range; @@ -111,6 +115,7 @@ struct virtio_iommu_req_unmap { #define VIRTIO_IOMMU_PROBE_T_NONE 0 #define VIRTIO_IOMMU_PROBE_T_RESV_MEM 1 +#define VIRTIO_IOMMU_PROBE_T_PAGE_SIZE_MASK 2 #define VIRTIO_IOMMU_PROBE_T_MASK 0xfff @@ -119,6 +124,13 @@ struct virtio_iommu_probe_property { __le16 length; }; +struct virtio_iommu_probe_pgsize_mask { + struct virtio_iommu_probe_property head; + __u8 reserved[4]; + /* Same format as virtio_iommu_config::page_size_mask */ + __le64 pgsize_bitmap; +}; + #define VIRTIO_IOMMU_RESV_MEM_T_RESERVED 0 #define VIRTIO_IOMMU_RESV_MEM_T_MSI 1 -- 2.17.1