Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp498766pxu; Tue, 5 Jan 2021 17:55:34 -0800 (PST) X-Google-Smtp-Source: ABdhPJz94Guktf45QBln14ycFg1KbG1F2JErDxE6zgxIzqlKjxCVDnHLZbBn/GtM+E2N+Fj9x3Ig X-Received: by 2002:a17:906:4e50:: with SMTP id g16mr1483708ejw.191.1609898134597; Tue, 05 Jan 2021 17:55:34 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1609898134; cv=none; d=google.com; s=arc-20160816; b=cHYrIl6TEzr7WeXqHr7lplRjM5T9bBkU3rZ7iwGmDMMaNAz62V75qU+2z336nKUv6r ICSei0qlQSVb2kK08a+GsAO1ySleyLpPZRXvDZZmRxUPySIxdzTDnFoZ2dJIVj21poLM 4CoxcesQz1x4VubbPQ0U0ey4Gdx6nt36VQk9FJyIwjsb+gwH+UHk7s/xSF/T1DwEgwC/ yCw4fg6ULxAt5LtQGwpTEllxQUUsR+NNfuWi+i74u2W5d8aF11Hm1ePCezmFOgtV0Mpa qIjhLdqtQSnUyABSeh0HuYhtjjTFTorEtUEpk+IpBc5z6w+uDBFQltmYLfJp17gu6dg/ aofw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from:ironport-sdr:ironport-sdr; bh=2MapSEu5yMnoWf4OAC2Trn4XHNXT+egH6N51pnRyeXQ=; b=Tq0wV6CmnxE4INu5oUtzyhxfEUnwHlIEQcqkzRS4/kKXecw/yZO0CO5O7TTTNqEIdP 46L9lh7L93wlztECiAh5soX4/jSbUVV5bkAXVZbNQ7msGT2FBjWcNe7zgOQnChcjEGmJ LMv4RXqHCMpvXPbNs5DYpHF4/5LXRMmvEsm8AmoRLsryl2lApoznRHI5WNThh8OxFPZv rqroMdKgurYSjeAUnz0odMGV2+nUKtWObqmHUekKk3mwIHfjhcLl9H7EIytIkPjXLiA0 HSoXUd0mZ2wv6zCxYK+v+eTDiGzYahbAOWIm3DkabS8r01TM1I8qhR2DVb11OIUhVa+X 254Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gk1si372207ejc.288.2021.01.05.17.55.11; Tue, 05 Jan 2021 17:55:34 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726234AbhAFBxD (ORCPT + 99 others); Tue, 5 Jan 2021 20:53:03 -0500 Received: from mga12.intel.com ([192.55.52.136]:48745 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725778AbhAFBxD (ORCPT ); Tue, 5 Jan 2021 20:53:03 -0500 IronPort-SDR: 8ktyD+EiB2iNIK8cY0JZ0I82yauyWWP0b2lKGapVBJBqji1h0f1POtP1T0DGu5Bk6PRdaNaqjo H5nuS5NkwnkQ== X-IronPort-AV: E=McAfee;i="6000,8403,9855"; a="156402499" X-IronPort-AV: E=Sophos;i="5.78,478,1599548400"; d="scan'208";a="156402499" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jan 2021 17:51:50 -0800 IronPort-SDR: k62Jq6/0eJrj291dQ2noAqaAEB9k7tjg6h5cogUPnrkcGX1/KN+vjAyRM00ySerYqGv1cImK1y sEBYmzmxi7Kw== X-IronPort-AV: E=Sophos;i="5.78,478,1599548400"; d="scan'208";a="361387910" Received: from km-skylake-client-platform.sc.intel.com ([10.3.52.146]) by orsmga002-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Jan 2021 17:51:50 -0800 From: Kyung Min Park To: linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org Cc: dwmw2@infradead.org, baolu.lu@linux.intel.com, joro@8bytes.org, will@kernel.org, ricardo.neri@intel.com, ravi.v.shankar@intel.com, kevin.tian@intel.com, ashok.raj@intel.com, sohil.mehta@intel.com, kyung.min.park@intel.com Subject: [PATCH v4 2/3] iommu/vt-d: Move capability check code to cap_audit files Date: Tue, 5 Jan 2021 17:30:34 -0800 Message-Id: <20210106013035.6476-3-kyung.min.park@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210106013035.6476-1-kyung.min.park@intel.com> References: <20210106013035.6476-1-kyung.min.park@intel.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Move IOMMU capability check and sanity check code to cap_audit files. Also implement some helper functions for sanity checks. Signed-off-by: Kyung Min Park --- drivers/iommu/intel/cap_audit.c | 20 +++++++++ drivers/iommu/intel/cap_audit.h | 20 +++++++++ drivers/iommu/intel/iommu.c | 76 +-------------------------------- 3 files changed, 42 insertions(+), 74 deletions(-) diff --git a/drivers/iommu/intel/cap_audit.c b/drivers/iommu/intel/cap_audit.c index 4a062fc719d2..cf5326eb1d72 100644 --- a/drivers/iommu/intel/cap_audit.c +++ b/drivers/iommu/intel/cap_audit.c @@ -186,3 +186,23 @@ int intel_cap_audit(enum cap_audit_type type, struct intel_iommu *iommu) return -EFAULT; } + +bool intel_cap_smts_sanity(void) +{ + return ecap_smts(intel_iommu_ecap_sanity); +} + +bool intel_cap_pasid_sanity(void) +{ + return ecap_pasid(intel_iommu_ecap_sanity); +} + +bool intel_cap_nest_sanity(void) +{ + return ecap_nest(intel_iommu_ecap_sanity); +} + +bool intel_cap_flts_sanity(void) +{ + return ecap_flts(intel_iommu_ecap_sanity); +} diff --git a/drivers/iommu/intel/cap_audit.h b/drivers/iommu/intel/cap_audit.h index 866236581dd3..1ce1dc314950 100644 --- a/drivers/iommu/intel/cap_audit.h +++ b/drivers/iommu/intel/cap_audit.h @@ -103,4 +103,24 @@ enum cap_audit_type { CAP_AUDIT_HOTPLUG_IRQR, }; +bool intel_cap_smts_sanity(void); +bool intel_cap_pasid_sanity(void); +bool intel_cap_nest_sanity(void); +bool intel_cap_flts_sanity(void); + +static inline bool scalable_mode_support(void) +{ + return (intel_iommu_sm && intel_cap_smts_sanity()); +} + +static inline bool pasid_mode_support(void) +{ + return scalable_mode_support() && intel_cap_pasid_sanity(); +} + +static inline bool nested_mode_support(void) +{ + return scalable_mode_support() && intel_cap_nest_sanity(); +} + int intel_cap_audit(enum cap_audit_type type, struct intel_iommu *iommu); diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index dd8f41a5e4fa..75add2fd300a 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -1846,25 +1846,7 @@ static void free_dmar_iommu(struct intel_iommu *iommu) */ static bool first_level_by_default(void) { - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - static int first_level_support = -1; - - if (likely(first_level_support != -1)) - return first_level_support; - - first_level_support = 1; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!sm_supported(iommu) || !ecap_flts(iommu->ecap)) { - first_level_support = 0; - break; - } - } - rcu_read_unlock(); - - return first_level_support; + return scalable_mode_support() && intel_cap_flts_sanity(); } static struct dmar_domain *alloc_domain(int flags) @@ -5666,60 +5648,6 @@ static phys_addr_t intel_iommu_iova_to_phys(struct iommu_domain *domain, return phys; } -static inline bool scalable_mode_support(void) -{ - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - bool ret = true; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!sm_supported(iommu)) { - ret = false; - break; - } - } - rcu_read_unlock(); - - return ret; -} - -static inline bool iommu_pasid_support(void) -{ - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - bool ret = true; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!pasid_supported(iommu)) { - ret = false; - break; - } - } - rcu_read_unlock(); - - return ret; -} - -static inline bool nested_mode_support(void) -{ - struct dmar_drhd_unit *drhd; - struct intel_iommu *iommu; - bool ret = true; - - rcu_read_lock(); - for_each_active_iommu(iommu, drhd) { - if (!sm_supported(iommu) || !ecap_nest(iommu->ecap)) { - ret = false; - break; - } - } - rcu_read_unlock(); - - return ret; -} - static bool intel_iommu_capable(enum iommu_cap cap) { if (cap == IOMMU_CAP_CACHE_COHERENCY) @@ -5973,7 +5901,7 @@ intel_iommu_dev_has_feat(struct device *dev, enum iommu_dev_features feat) int ret; if (!dev_is_pci(dev) || dmar_disabled || - !scalable_mode_support() || !iommu_pasid_support()) + !scalable_mode_support() || !pasid_mode_support()) return false; ret = pci_pasid_features(to_pci_dev(dev)); -- 2.17.1