Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp96712pxf; Wed, 10 Mar 2021 01:09:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJzYF8zbfT/SI34gA5Omc3/6ZHkB7Fe3i6WqXIWLSHQqKQSbsCVb/AKhjVVxgbpHnitUVSt4 X-Received: by 2002:a50:da4f:: with SMTP id a15mr2062712edk.301.1615367377937; Wed, 10 Mar 2021 01:09:37 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1615367377; cv=none; d=google.com; s=arc-20160816; b=Gi19ZG0u+5K0OKsygTAEI22GbHyGfX9QOByPAygH/H84RgCE9Slfrow829twTvmt7b rIssZFrfOGJUup+7YSCx72zZDJfXCvGLrIw2MmrVVT0+ma+3GVHJ1VJHLBptDE9ejNct 4RooT1T+maUcv7Dv2CJ4Ox3HtXUOu7Kyu8O5Gh2XMGrbCRrpxltbNJ3Bje4Fo5B9P9qI VlcHGgtZngoEz2fEbkCi7xsxvPkp1v/11xzB7+Wx0HZqbZy4QTnt0jUZrshdyEuKGLOd Q3RqpEHpUeMN9JOedKbRtOv+nAyWliTzpW37c1DX0Oeegspi1D9XllSHDoZxvW+J6EKx WbxA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=ycoQvETZxR6IuPC3oJ+5yfR/0jlDJbBw0DiTb01dhXM=; b=B0avg6JXf9qgk0j4rjPLv++UgZ0BoCPBaijBKuHshMelm02OQNYu6p/4A2Vjj8uNGT 7bSCS6U8zZEjA7g/zMOrj+pY0TWEaoTA3VZH87eLuAscFPu+pNAXt46VvktrG6yqLm6J 5hafNvbHeRdOTmgMYNOLnL5Er5DAtMuR5bak6grTAU1OTZG+v2IpfAQpNsed3BUH/qhm cQN1MFuVPJqnqHUz4Tdt76k1vxYIKL8D31xphqi1j0UepB8/Ho6BA5eCH3qqpbNJcoed KPjudzgp0EwnV5mgAo08dNaZQ5oQo4bk1vhUWAHcwaYtWqAh01A0hX6DDpYVz8fN3HFF mFyg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id ss17si11937549ejb.678.2021.03.10.01.09.15; Wed, 10 Mar 2021 01:09:37 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232822AbhCJJH3 (ORCPT + 99 others); Wed, 10 Mar 2021 04:07:29 -0500 Received: from szxga05-in.huawei.com ([45.249.212.191]:13497 "EHLO szxga05-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232684AbhCJJGz (ORCPT ); Wed, 10 Mar 2021 04:06:55 -0500 Received: from DGGEMS409-HUB.china.huawei.com (unknown [172.30.72.60]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4DwR3z3vPkzrTKS; Wed, 10 Mar 2021 17:05:03 +0800 (CST) Received: from DESKTOP-5IS4806.china.huawei.com (10.174.184.42) by DGGEMS409-HUB.china.huawei.com (10.3.19.209) with Microsoft SMTP Server id 14.3.498.0; Wed, 10 Mar 2021 17:06:25 +0800 From: Keqian Zhu To: , , , Alex Williamson , Robin Murphy , Yi Sun , Will Deacon CC: Kirti Wankhede , Cornelia Huck , Marc Zyngier , Catalin Marinas , Mark Rutland , James Morse , Suzuki K Poulose , , , , Subject: [PATCH v2 08/11] iommu/arm-smmu-v3: Add HWDBM device feature reporting Date: Wed, 10 Mar 2021 17:06:11 +0800 Message-ID: <20210310090614.26668-9-zhukeqian1@huawei.com> X-Mailer: git-send-email 2.8.4.windows.1 In-Reply-To: <20210310090614.26668-1-zhukeqian1@huawei.com> References: <20210310090614.26668-1-zhukeqian1@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.174.184.42] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: jiangkunkun We have implemented these interfaces required to support iommu dirty log tracking. The last step is reporting this feature to upper user, then the user can perform higher policy base on it. This adds a new dev feature named IOMMU_DEV_FEAT_HWDBM in iommu layer. For arm smmuv3, it is equal to ARM_SMMU_FEAT_HD and it is enabled by default if supported. Other types of IOMMU can enable it by default or when dev_enable_feature() is called. Co-developed-by: Keqian Zhu Signed-off-by: Kunkun Jiang --- changelog: v2: - As dev_has_feature() has been removed from iommu layer, IOMMU_DEV_FEAT_HWDBM is designed to be used through "enable" interface. --- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 4 ++++ include/linux/iommu.h | 1 + 2 files changed, 5 insertions(+) diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c index 696df51a3282..cd1627123e80 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c @@ -2722,6 +2722,8 @@ static bool arm_smmu_dev_has_feature(struct device *dev, switch (feat) { case IOMMU_DEV_FEAT_SVA: return arm_smmu_master_sva_supported(master); + case IOMMU_DEV_FEAT_HWDBM: + return !!(master->smmu->features & ARM_SMMU_FEAT_HD); default: return false; } @@ -2738,6 +2740,8 @@ static bool arm_smmu_dev_feature_enabled(struct device *dev, switch (feat) { case IOMMU_DEV_FEAT_SVA: return arm_smmu_master_sva_enabled(master); + case IOMMU_DEV_FEAT_HWDBM: + return arm_smmu_dev_has_feature(dev, feat); default: return false; } diff --git a/include/linux/iommu.h b/include/linux/iommu.h index 4f7db5d23b23..88584a2d027c 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -160,6 +160,7 @@ struct iommu_resv_region { enum iommu_dev_features { IOMMU_DEV_FEAT_AUX, /* Aux-domain feature */ IOMMU_DEV_FEAT_SVA, /* Shared Virtual Addresses */ + IOMMU_DEV_FEAT_HWDBM, /* Hardware Dirty Bit Management */ }; #define IOMMU_PASID_INVALID (-1U) -- 2.19.1