Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp2696842pxb; Tue, 23 Feb 2021 13:17:27 -0800 (PST) X-Google-Smtp-Source: ABdhPJxftExyNqphKIL3aky3j+Lr+WPivA0+pHO+xkp2c1A9R2aYClVEicZBZ3WXyuSd0rIkXwmo X-Received: by 2002:a17:906:28cc:: with SMTP id p12mr28734175ejd.426.1614115047080; Tue, 23 Feb 2021 13:17:27 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1614115047; cv=none; d=google.com; s=arc-20160816; b=PAW4D+ldoJgvyU6BTRdN1yktfL5QcXHmDN52E3L+JCWpzlMr6OkV0xHiDxuG+btcOl 4D6aZNY+pdSJr7jR2+7xphVvE4wXhtxIjsfCsjkkmbFUG3b8tnV8M83vxEoWJBoKbQS9 1bk4Cfwxkd+QHNBOJGql12Jb2+2Rk17ZeaEzedsIXyaqCdPQw8NVIIweKE/tWkWebtRm PA+diQx1y41J4IIpE5eGRkrAzZOX9aZs1gUHR3X9VdiFP36WOUIvCDcf5wDUYSp7qYAQ 2jOepvQ0pJtOJEnXJawFigLvxAXXI/8CuKu/KaeCF3F2W2rqDu3Wudoo0tyz75SpB7oD j9zA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=SXWc8ATTZ4eP+hdUawfXEBN7iawZP9INSzT40ei/Jzs=; b=V8RIkYwVNQWcJosrATtHjGa/a+5c7POkQgLOP/zpk+loRz3TrEP95GS28/k1OXtHSl 3OYYE/JqbTSEYZHGgatQ7n66HT+yVhS0uOjI6rQWrDp4c9NGeguYut/7EHtT3TLYtUgm 6CP193FUIIygSLz1QFpNGo2zDfgNASYg+bPXODN88nxfL/4MutT9+jwt6Q9HiSJv0HAz Wxl4KSrziNZ8rEAqoKlscLSUgy0/kKt1T6rPYA3wB++CPnZUBD3Dyf6b8r0KrRkq7gRb 3qxahRpWU46Mf61MIPBbgy18Gz1pj3lpIAsWyVM3L0be98t7G2dDvfF6xLDUksaF3HOH VAlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cZZFSByl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id cq1si12146494edb.162.2021.02.23.13.16.35; Tue, 23 Feb 2021 13:17:27 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=cZZFSByl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234180AbhBWVCZ (ORCPT + 99 others); Tue, 23 Feb 2021 16:02:25 -0500 Received: from us-smtp-delivery-124.mimecast.com ([216.205.24.124]:57446 "EHLO us-smtp-delivery-124.mimecast.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233834AbhBWVAb (ORCPT ); Tue, 23 Feb 2021 16:00:31 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1614113945; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=SXWc8ATTZ4eP+hdUawfXEBN7iawZP9INSzT40ei/Jzs=; b=cZZFSByl8QkG52dDXiAWKMS3hrJHmeH0Zve4jSeZ5M9oUqVlhS+OPiYwmBbJVDCIeNwZHy 8cv0pwvuoM5QoMSg0xSTrCAuduvah5rv8iEygO4iCIoklpP+Om5EXXCN1lrbsla3mhVEPj ugnVKNQ4vBnu1Fv1GrJd1THHVjTEjY0= Received: from mimecast-mx01.redhat.com (mimecast-mx01.redhat.com [209.132.183.4]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-583-eRb9Sc1COni79CumsNAESQ-1; Tue, 23 Feb 2021 15:58:58 -0500 X-MC-Unique: eRb9Sc1COni79CumsNAESQ-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.phx2.redhat.com [10.5.11.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx01.redhat.com (Postfix) with ESMTPS id DBA22835E27; Tue, 23 Feb 2021 20:58:54 +0000 (UTC) Received: from laptop.redhat.com (ovpn-114-34.ams2.redhat.com [10.36.114.34]) by smtp.corp.redhat.com (Postfix) with ESMTP id 26D2C5D9D0; Tue, 23 Feb 2021 20:58:34 +0000 (UTC) From: Eric Auger To: eric.auger.pro@gmail.com, eric.auger@redhat.com, iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, kvmarm@lists.cs.columbia.edu, will@kernel.org, maz@kernel.org, robin.murphy@arm.com, joro@8bytes.org, alex.williamson@redhat.com, tn@semihalf.com, zhukeqian1@huawei.com Cc: jacob.jun.pan@linux.intel.com, yi.l.liu@intel.com, wangxingang5@huawei.com, jiangkunkun@huawei.com, jean-philippe@linaro.org, zhangfei.gao@linaro.org, zhangfei.gao@gmail.com, vivek.gautam@arm.com, shameerali.kolothum.thodi@huawei.com, yuzenghui@huawei.com, nicoleotsuka@gmail.com, lushenming@huawei.com, vsethi@nvidia.com Subject: [PATCH v14 11/13] iommu/smmuv3: Implement bind/unbind_guest_msi Date: Tue, 23 Feb 2021 21:56:32 +0100 Message-Id: <20210223205634.604221-12-eric.auger@redhat.com> In-Reply-To: <20210223205634.604221-1-eric.auger@redhat.com> References: <20210223205634.604221-1-eric.auger@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.14 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The bind/unbind_guest_msi() callbacks check the domain is NESTED and redirect to the dma-iommu implementation. Signed-off-by: Eric Auger --- v6 -> v7: - remove device handle argument --- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 43 +++++++++++++++++++++ 1 file changed, 43 insertions(+) diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c index ca6f796aeb95..f783c2804872 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c @@ -2922,6 +2922,47 @@ static void arm_smmu_get_resv_regions(struct device *dev, iommu_dma_get_resv_regions(dev, head); } +static int +arm_smmu_bind_guest_msi(struct iommu_domain *domain, + dma_addr_t giova, phys_addr_t gpa, size_t size) +{ + struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); + struct arm_smmu_device *smmu; + int ret = -EINVAL; + + mutex_lock(&smmu_domain->init_mutex); + smmu = smmu_domain->smmu; + if (!smmu) + goto out; + + if (smmu_domain->stage != ARM_SMMU_DOMAIN_NESTED) + goto out; + + ret = iommu_dma_bind_guest_msi(domain, giova, gpa, size); +out: + mutex_unlock(&smmu_domain->init_mutex); + return ret; +} + +static void +arm_smmu_unbind_guest_msi(struct iommu_domain *domain, dma_addr_t giova) +{ + struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); + struct arm_smmu_device *smmu; + + mutex_lock(&smmu_domain->init_mutex); + smmu = smmu_domain->smmu; + if (!smmu) + goto unlock; + + if (smmu_domain->stage != ARM_SMMU_DOMAIN_NESTED) + goto unlock; + + iommu_dma_unbind_guest_msi(domain, giova); +unlock: + mutex_unlock(&smmu_domain->init_mutex); +} + static int arm_smmu_attach_pasid_table(struct iommu_domain *domain, struct iommu_pasid_table_config *cfg) { @@ -3182,6 +3223,8 @@ static struct iommu_ops arm_smmu_ops = { .attach_pasid_table = arm_smmu_attach_pasid_table, .detach_pasid_table = arm_smmu_detach_pasid_table, .cache_invalidate = arm_smmu_cache_invalidate, + .bind_guest_msi = arm_smmu_bind_guest_msi, + .unbind_guest_msi = arm_smmu_unbind_guest_msi, .dev_has_feat = arm_smmu_dev_has_feature, .dev_feat_enabled = arm_smmu_dev_feature_enabled, .dev_enable_feat = arm_smmu_dev_enable_feature, -- 2.26.2