Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp5408222pxu; Tue, 22 Dec 2020 16:52:31 -0800 (PST) X-Google-Smtp-Source: ABdhPJwoZsAewQmbqd7AgzWh3H95Buf0Iee/EyBcE9IxKugCZ1F72u489/aWalaraTiXiTW6+gJd X-Received: by 2002:a17:906:4544:: with SMTP id s4mr21793082ejq.366.1608684750877; Tue, 22 Dec 2020 16:52:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1608684750; cv=none; d=google.com; s=arc-20160816; b=rZixLjsEiubpaeL4wAIOAy2PGP3/hosNy9ILKVtf4To46FDaXFlgo3WpQq32731q2T k/zLpd7TcqdeAr4dDgbdqJ+W7sJBmV3cBtHjI36rxHq8tyGsfjzY4ZVxJFzNbX2uzjKj GYpoB1/IJYe21EVwJCY+H9CPW1Lepz6ZbBl3PEEfpjk9oIDiqjUVZMpc+/NZ7bYMimLW e11O/ebJ5W8XEFgCDomo0KBk0XZ6rs0EJ7+3MCVLZBUwr714h2BIoWQk5U7wcZl1Bfiy eGsD8ZaALcJ1daAE5/MVd+SPP0zLmIJIGA0IUCj5ugqljLm+fnl5FsResK0wsqqjEXxR 15Qg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:ironport-sdr:ironport-sdr; bh=T9c/4bxds/BJSvsbgleHVdqCDxidLyVUZqBHv6n/jFg=; b=lZ+q6c//iRpbfjqw9zeIf9MMy78bftPtSGkLX47QeB8GfN9/er/fkXKp4pE87GI27Y CuYwyair++nXDeJZn24eZgZUAyzwVeFPjr9hU7ml11clczUEVllhfvHneU/DVkkBOXJ6 C0VXOy0A7x0RXLURJSoGK/aPrXrlYGZN7nBRWowgwI74JF0WF1gDkV1yzRljG8NebyDY ZVT3eas4d+tH7iNsF4qA/vn0ajOiGkmrUjnEia8fky6l+C9ATnAwlkavCJelS/MSyMsF iMT7l4zJ+M5vn0/wvyc0JKkh0MNxInDSMm6vCHUPZUex18Nwg9JjyPhOh4EfDilgdPs3 9Jeg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u7si10235984ejy.363.2020.12.22.16.52.08; Tue, 22 Dec 2020 16:52:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726486AbgLWAvX (ORCPT + 99 others); Tue, 22 Dec 2020 19:51:23 -0500 Received: from mga11.intel.com ([192.55.52.93]:60048 "EHLO mga11.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726275AbgLWAvW (ORCPT ); Tue, 22 Dec 2020 19:51:22 -0500 IronPort-SDR: q+k6TD83iNaYXTaWsv3o7jrxko0d9IGVeuWqys76ObpIauZeINT+uoZzru3J3k4uSx2QQb226c 4pKOjZyclf6A== X-IronPort-AV: E=McAfee;i="6000,8403,9843"; a="172430828" X-IronPort-AV: E=Sophos;i="5.78,440,1599548400"; d="scan'208";a="172430828" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga102.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Dec 2020 16:50:26 -0800 IronPort-SDR: 2VngZnENosOFLL8IwtjWxLIeaXzuOn4BQbSmaeWtHmaEZnziC3JSLVTVc8nBBMp7Zs+kq41JtQ sjTBtBkn0NGQ== X-IronPort-AV: E=Sophos;i="5.78,440,1599548400"; d="scan'208";a="397599462" Received: from km-skylake-client-platform.sc.intel.com ([10.3.52.146]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Dec 2020 16:50:25 -0800 From: Kyung Min Park To: linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org Cc: dwmw2@infradead.org, baolu.lu@linux.intel.com, joro@8bytes.org, will@kernel.org, ricardo.neri@intel.com, ravi.v.shankar@intel.com, kevin.tian@intel.com, ashok.raj@intel.com, sohil.mehta@intel.com, kyung.min.park@intel.com Subject: [PATCH v3 2/3] iommu/vt-d: Move capability check code to cap_audit files Date: Tue, 22 Dec 2020 16:29:03 -0800 Message-Id: <20201223002904.13872-3-kyung.min.park@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20201223002904.13872-1-kyung.min.park@intel.com> References: <20201223002904.13872-1-kyung.min.park@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Move IOMMU capability check and sanity check code to cap_audit files. Also implement some helper functions for sanity checks. Signed-off-by: Kyung Min Park --- drivers/iommu/intel/cap_audit.c | 20 +++++++++ drivers/iommu/intel/cap_audit.h | 20 +++++++++ drivers/iommu/intel/iommu.c | 76 +-------------------------------- 3 files changed, 42 insertions(+), 74 deletions(-) diff --git a/drivers/iommu/intel/cap_audit.c b/drivers/iommu/intel/cap_audit.c index 4a062fc719d2..cf5326eb1d72 100644 --- a/drivers/iommu/intel/cap_audit.c +++ b/drivers/iommu/intel/cap_audit.c @@ -186,3 +186,23 @@ int intel_cap_audit(enum cap_audit_type type, struct intel_iommu *iommu) return -EFAULT; } + +bool intel_cap_smts_sanity(void) +{ + return ecap_smts(intel_iommu_ecap_sanity); +} + +bool intel_cap_pasid_sanity(void) +{ + return ecap_pasid(intel_iommu_ecap_sanity); +} + +bool intel_cap_nest_sanity(void) +{ + return ecap_nest(intel_iommu_ecap_sanity); +} + +bool intel_cap_flts_sanity(void) +{ + return ecap_flts(intel_iommu_ecap_sanity); +} diff --git a/drivers/iommu/intel/cap_audit.h b/drivers/iommu/intel/cap_audit.h index 866236581dd3..1ce1dc314950 100644 --- a/drivers/iommu/intel/cap_audit.h +++ b/drivers/iommu/intel/cap_audit.h @@ -103,4 +103,24 @@ enum cap_audit_type { CAP_AUDIT_HOTPLUG_IRQR, }; +bool intel_cap_smts_sanity(void); +bool intel_cap_pasid_sanity(void); +bool intel_cap_nest_sanity(void); +bool intel_cap_flts_sanity(void); + +static inline bool scalable_mode_support(void) +{ + return (intel_iommu_sm && intel_cap_smts_sanity()); +} + +static inline bool pasid_mode_support(void) +{ + return scalable_mode_support() && intel_cap_pasid_sanity(); +} + +static inline bool nested_mode_support(void) +{ + return scalable_mode_support() && intel_cap_nest_sanity(); +} + int intel_cap_audit(enum cap_audit_type type, struct intel_iommu *iommu); diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index 592cb6dd5d3a..676f6900f4dc 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -1846,25 +1846,7 @@ static void free_dmar_iommu(struct intel_iommu *iommu) */ static bool first_level_by_default(void) { - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - static int first_level_support = -1; - - if (likely(first_level_support != -1)) - return first_level_support; - - first_level_support = 1; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!sm_supported(iommu) || !ecap_flts(iommu->ecap)) { - first_level_support = 0; - break; - } - } - rcu_read_unlock(); - - return first_level_support; + return scalable_mode_support() && intel_cap_flts_sanity(); } static struct dmar_domain *alloc_domain(int flags) @@ -5663,60 +5645,6 @@ static phys_addr_t intel_iommu_iova_to_phys(struct iommu_domain *domain, return phys; } -static inline bool scalable_mode_support(void) -{ - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - bool ret = true; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!sm_supported(iommu)) { - ret = false; - break; - } - } - rcu_read_unlock(); - - return ret; -} - -static inline bool iommu_pasid_support(void) -{ - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - bool ret = true; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!pasid_supported(iommu)) { - ret = false; - break; - } - } - rcu_read_unlock(); - - return ret; -} - -static inline bool nested_mode_support(void) -{ - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - bool ret = true; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!sm_supported(iommu) || !ecap_nest(iommu->ecap)) { - ret = false; - break; - } - } - rcu_read_unlock(); - - return ret; -} - static bool intel_iommu_capable(enum iommu_cap cap) { if (cap == IOMMU_CAP_CACHE_COHERENCY) @@ -5970,7 +5898,7 @@ intel_iommu_dev_has_feat(struct device *dev, enum iommu_dev_features feat) int ret; if (!dev_is_pci(dev) || dmar_disabled || - !scalable_mode_support() || !iommu_pasid_support()) + !scalable_mode_support() || !pasid_mode_support()) return false; ret = pci_pasid_features(to_pci_dev(dev)); -- 2.17.1