Received: by 2002:a05:6a10:e82a:0:0:0:0 with SMTP id gk42csp329702pxb; Fri, 15 Jan 2021 04:19:10 -0800 (PST) X-Google-Smtp-Source: ABdhPJw8jtsEeQhT6b3VOERAMmfPxP2s2Z/QA9cZgWyky0FHfSU/oHVbRQvOgIVow+cRmXid/kOa X-Received: by 2002:a05:6402:352:: with SMTP id r18mr9160449edw.373.1610713150718; Fri, 15 Jan 2021 04:19:10 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1610713150; cv=none; d=google.com; s=arc-20160816; b=Hn46X0XGzupzv8kdcZF/lKEocYIRg8dgPJ+g+f0a0PruFPOYHbs2G5v9HHcGKawaqh 1gtpqHmu6JVPuWYdvk/1MkVMFxRS0u+49w/bvGA1LB6nEYT1YZUfP/8M+NDORZ3wJA5R p3aI5p+h/zKfsHtSSfQoSfDkS3d2hC5GgqmHzvRpWKfadB7REvP6wXBqSEmALoCcjuli myERqn9iRU5DaIBjYu/RObgQXaIO7ni3d8tn2ogReTcU9BYkw08CLct8+2hL8O91J1KO skfjl6l4/q7vMeT3qStrYNp4fbT6Sz9ZLvAu+Kli2bAELXvm1qgzCoTXa+s4SL6wQPEP qwEQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:references:in-reply-to:message-id:date:subject :cc:to:from; bh=0eRCRdkHJvwsvMtxFr+Q83c1JuwcvA7lXyG/9t0jNLQ=; b=m6paocEQXtXuNWu67pGI5rWDAXxAOvrLaUqKcEM7rB/NMjOcvsd7eqFepGQIxfp3BV aezqPWBlR+8HzdVjVDRVvaC5jK1v2vb+EdzklvGzck7l81I6uwmoDcjCNykNdzO3aoQe WeDLIuJxV914MKcW4IdzOto1SXHPGHq1d1vu4J+QWMrhkISfAXgeaOqqNb+j5VIiesiS 5be+/x0tNgMk6oWx+9xfo71boLTfTNWm7zb2o6TMv1KOzU40XCgDQA/0DQNDDpxNodfG qfAAB05pS8vlY2AB4ntM6U884ChUQbQdWuozqi/moFIsYWvm9QRenl9u+UvFSvo2Axew P/bw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t4si3867592edq.607.2021.01.15.04.18.46; Fri, 15 Jan 2021 04:19:10 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729797AbhAOMPZ (ORCPT + 99 others); Fri, 15 Jan 2021 07:15:25 -0500 Received: from foss.arm.com ([217.140.110.172]:37684 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726182AbhAOMPY (ORCPT ); Fri, 15 Jan 2021 07:15:24 -0500 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 7D53313D5; Fri, 15 Jan 2021 04:14:27 -0800 (PST) Received: from usa.arm.com (a074945.blr.arm.com [10.162.16.71]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 069603F70D; Fri, 15 Jan 2021 04:14:22 -0800 (PST) From: Vivek Gautam To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, virtualization@lists.linux-foundation.org Cc: joro@8bytes.org, will.deacon@arm.com, mst@redhat.com, robin.murphy@arm.com, jean-philippe@linaro.org, eric.auger@redhat.com, alex.williamson@redhat.com, kevin.tian@intel.com, jacob.jun.pan@linux.intel.com, yi.l.liu@intel.com, lorenzo.pieralisi@arm.com, shameerali.kolothum.thodi@huawei.com, vivek.gautam@arm.com Subject: [PATCH RFC v1 07/15] iommu/virtio: Add table format probing Date: Fri, 15 Jan 2021 17:43:34 +0530 Message-Id: <20210115121342.15093-8-vivek.gautam@arm.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210115121342.15093-1-vivek.gautam@arm.com> References: <20210115121342.15093-1-vivek.gautam@arm.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Jean-Philippe Brucker The device may provide information about hardware tables and additional capabilities for each device. Parse the new probe fields. Signed-off-by: Jean-Philippe Brucker [Vivek: Refactor to use "struct virtio_iommu_probe_table_format" rather than separate structures for page table and pasid table format.] Signed-off-by: Vivek Gautam Cc: Joerg Roedel Cc: Will Deacon Cc: Michael S. Tsirkin Cc: Robin Murphy Cc: Jean-Philippe Brucker Cc: Eric Auger Cc: Alex Williamson Cc: Kevin Tian Cc: Jacob Pan Cc: Liu Yi L Cc: Lorenzo Pieralisi Cc: Shameerali Kolothum Thodi --- drivers/iommu/virtio-iommu.c | 102 ++++++++++++++++++++++++++++++++++- 1 file changed, 101 insertions(+), 1 deletion(-) diff --git a/drivers/iommu/virtio-iommu.c b/drivers/iommu/virtio-iommu.c index 2bfdd5734844..12d73321dbf4 100644 --- a/drivers/iommu/virtio-iommu.c +++ b/drivers/iommu/virtio-iommu.c @@ -78,6 +78,17 @@ struct viommu_endpoint { struct viommu_dev *viommu; struct viommu_domain *vdomain; struct list_head resv_regions; + + /* properties of the physical IOMMU */ + u64 pgsize_mask; + u64 input_start; + u64 input_end; + u8 output_bits; + u8 pasid_bits; + /* Preferred PASID table format */ + void *pstf; + /* Preferred page table format */ + void *pgtf; }; struct viommu_request { @@ -457,6 +468,72 @@ static int viommu_add_resv_mem(struct viommu_endpoint *vdev, return 0; } +static int viommu_add_pgsize_mask(struct viommu_endpoint *vdev, + struct virtio_iommu_probe_page_size_mask *prop, + size_t len) +{ + if (len < sizeof(*prop)) + return -EINVAL; + vdev->pgsize_mask = le64_to_cpu(prop->mask); + return 0; +} + +static int viommu_add_input_range(struct viommu_endpoint *vdev, + struct virtio_iommu_probe_input_range *prop, + size_t len) +{ + if (len < sizeof(*prop)) + return -EINVAL; + vdev->input_start = le64_to_cpu(prop->start); + vdev->input_end = le64_to_cpu(prop->end); + return 0; +} + +static int viommu_add_output_size(struct viommu_endpoint *vdev, + struct virtio_iommu_probe_output_size *prop, + size_t len) +{ + if (len < sizeof(*prop)) + return -EINVAL; + vdev->output_bits = prop->bits; + return 0; +} + +static int viommu_add_pasid_size(struct viommu_endpoint *vdev, + struct virtio_iommu_probe_pasid_size *prop, + size_t len) +{ + if (len < sizeof(*prop)) + return -EINVAL; + vdev->pasid_bits = prop->bits; + return 0; +} + +static int viommu_add_pgtf(struct viommu_endpoint *vdev, void *pgtf, size_t len) +{ + /* Select the first page table format available */ + if (len < sizeof(struct virtio_iommu_probe_table_format) || vdev->pgtf) + return -EINVAL; + + vdev->pgtf = kmemdup(pgtf, len, GFP_KERNEL); + if (!vdev->pgtf) + return -ENOMEM; + + return 0; +} + +static int viommu_add_pstf(struct viommu_endpoint *vdev, void *pstf, size_t len) +{ + if (len < sizeof(struct virtio_iommu_probe_table_format) || vdev->pstf) + return -EINVAL; + + vdev->pstf = kmemdup(pstf, len, GFP_KERNEL); + if (!vdev->pstf) + return -ENOMEM; + + return 0; +} + static int viommu_probe_endpoint(struct viommu_dev *viommu, struct device *dev) { int ret; @@ -493,11 +570,30 @@ static int viommu_probe_endpoint(struct viommu_dev *viommu, struct device *dev) while (type != VIRTIO_IOMMU_PROBE_T_NONE && cur < viommu->probe_size) { + void *value = prop; len = le16_to_cpu(prop->length) + sizeof(*prop); switch (type) { case VIRTIO_IOMMU_PROBE_T_RESV_MEM: - ret = viommu_add_resv_mem(vdev, (void *)prop, len); + ret = viommu_add_resv_mem(vdev, value, len); + break; + case VIRTIO_IOMMU_PROBE_T_PAGE_SIZE_MASK: + ret = viommu_add_pgsize_mask(vdev, value, len); + break; + case VIRTIO_IOMMU_PROBE_T_INPUT_RANGE: + ret = viommu_add_input_range(vdev, value, len); + break; + case VIRTIO_IOMMU_PROBE_T_OUTPUT_SIZE: + ret = viommu_add_output_size(vdev, value, len); + break; + case VIRTIO_IOMMU_PROBE_T_PASID_SIZE: + ret = viommu_add_pasid_size(vdev, value, len); + break; + case VIRTIO_IOMMU_PROBE_T_PAGE_TABLE_FMT: + ret = viommu_add_pgtf(vdev, value, len); + break; + case VIRTIO_IOMMU_PROBE_T_PASID_TABLE_FMT: + ret = viommu_add_pstf(vdev, value, len); break; default: dev_err(dev, "unknown viommu prop 0x%x\n", type); @@ -899,6 +995,8 @@ static struct iommu_device *viommu_probe_device(struct device *dev) err_free_dev: generic_iommu_put_resv_regions(dev, &vdev->resv_regions); + kfree(vdev->pstf); + kfree(vdev->pgtf); kfree(vdev); return ERR_PTR(ret); @@ -915,6 +1013,8 @@ static void viommu_release_device(struct device *dev) vdev = dev_iommu_priv_get(dev); generic_iommu_put_resv_regions(dev, &vdev->resv_regions); + kfree(vdev->pstf); + kfree(vdev->pgtf); kfree(vdev); } -- 2.17.1