Received: by 2002:a05:6358:a55:b0:ec:fcf4:3ecf with SMTP id 21csp1327936rwb; Fri, 13 Jan 2023 10:42:08 -0800 (PST) X-Google-Smtp-Source: AMrXdXuMwiq5I4REh/HbmJVF+dRkpWUHInhf784ysJ4BsEggTYV0sWINb5c68PP6bzqQ/5Sby0si X-Received: by 2002:a17:906:5fd0:b0:862:11f6:a082 with SMTP id k16-20020a1709065fd000b0086211f6a082mr8242815ejv.17.1673635328459; Fri, 13 Jan 2023 10:42:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1673635328; cv=none; d=google.com; s=arc-20160816; b=psUXu4D0k+48qW3gjj6uR/8iWVD4LX1cHHVodlY4rYNOceIdK6bpXho/m05VJqeUPm Rn5VMefFrJXosEtysU8NXqRZezmNTVA5q40ckajK+mpzUoJw5tqM9Njf1bYS5nVpBBFr BUbDAmKez7dQpvPqy+veyrym9YwLYHYqaVB2CDGlzJS8tz2gM46wit1T3eEaZzVKkkcX 76u7Zblb1XZVp0av1nZ4+6Rha43piGfn8hBVxOOzukqkiUWS4mnzRQvSAWDFrdSjCvq2 UgvPQA7nC27GNVg+lGMwBnevUB07iXO8eJasKZ/AXzhxieZIRMqJQ4jvgg9Sug+U2v5F S7lg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:to:content-language:subject:user-agent:mime-version:date :message-id:dkim-signature; bh=/Oy2/1GiZ/UmFJ7dSM2uK52u78WK4NzHRLVnqav+610=; b=SbcTeeAkiE7V2TiUL9EiDZa/1gmVCOW+GeK2G9EkguQQ6yg4REds1GDI4gzSDHsZs0 T/C+nAFtdoTJL/0ZjlayAgCrNmjFnklxQ2ZSe994D4U0Y3BplPrNlATV9RvdvkUHv/J1 OWZsIPzrCj1uCpUvDzlilZ9gQPzqQSgbDw/AdhyFADQWsAVPtIFvDznE3hZPLn6N0rFH IO7kin92aHE2uDmaxpZRu/127gKxRWlBVEzZr656cPpC3W9QmG8SOxKyaUMO9JFEbQnU p94XKzhpcChsTYDQN6ZsvhFO//ndYhuJPjt6xmlzjZqjCgyodE5HEOchTYV9KzGTMdTK acaA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BS5+zkYN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id gn24-20020a1709070d1800b0084c45d8a681si12216184ejc.39.2023.01.13.10.41.55; Fri, 13 Jan 2023 10:42:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=BS5+zkYN; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231173AbjAMS01 (ORCPT + 53 others); Fri, 13 Jan 2023 13:26:27 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35678 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231172AbjAMSZ6 (ORCPT ); Fri, 13 Jan 2023 13:25:58 -0500 Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4AA877C39D for ; Fri, 13 Jan 2023 10:20:34 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673634034; x=1705170034; h=message-id:date:mime-version:subject:to:references:from: in-reply-to:content-transfer-encoding; bh=Wa0kouoAdWT2qadn3J6c8vmc3fFgvMhcyc8wdY2aHdU=; b=BS5+zkYNBNjEu9DhFrvNU7xG8ABiZHwCHdqKX4WVlxHQr3Su5dEcY6sE PeaC3Vv9tizM6qtNmKFAANdmq/LKItbj/AGPF+igLWd3ebGj6Oaa9fhar kKdqfNCVOtxEQ6ebqVpnohdpNciiv4uTgeHXZucIISq87fyhArW1627jI P0NU2iC1aWtd+2LC070JJ0K2UbzGBOmIZ3BVfMSJY5peRDnAlyAn/OCvG 7371Xw1WZrOm5kXOHgIOSAu441gd4jHfQ+96IkLPfJqC0M52hiU+gT/Mw GcI+stJIvAe1+NIbTpZP3VGrt+rhBhyy9x26n1rSyO3ZdwwMfWwBnPTZB Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10589"; a="307613705" X-IronPort-AV: E=Sophos;i="5.97,214,1669104000"; d="scan'208";a="307613705" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jan 2023 10:20:21 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10589"; a="782248920" X-IronPort-AV: E=Sophos;i="5.97,214,1669104000"; d="scan'208";a="782248920" Received: from linux.intel.com ([10.54.29.200]) by orsmga004.jf.intel.com with ESMTP; 13 Jan 2023 10:20:21 -0800 Received: from [10.252.208.111] (kliang2-mobl1.ccr.corp.intel.com [10.252.208.111]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by linux.intel.com (Postfix) with ESMTPS id C76BB580AD7; Fri, 13 Jan 2023 10:20:02 -0800 (PST) Message-ID: Date: Fri, 13 Jan 2023 13:19:59 -0500 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.6.1 Subject: Re: [PATCH 3/7] iommu/vt-d: Support Enhanced Command Interface Content-Language: en-US To: Baolu Lu , joro@8bytes.org, will@kernel.org, dwmw2@infradead.org, robin.murphy@arm.com, robert.moore@intel.com, rafael.j.wysocki@intel.com, lenb@kernel.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org References: <20230111202504.378258-1-kan.liang@linux.intel.com> <20230111202504.378258-4-kan.liang@linux.intel.com> <6783f737-2701-77e3-ce83-8d287be51cf6@linux.intel.com> From: "Liang, Kan" In-Reply-To: <6783f737-2701-77e3-ce83-8d287be51cf6@linux.intel.com> Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,NICE_REPLY_A,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2023-01-13 8:55 a.m., Baolu Lu wrote: > On 2023/1/12 4:25, kan.liang@linux.intel.com wrote: >> From: Kan Liang >> >> The Enhanced Command Register is to submit command and operand of >> enhanced commands to DMA Remapping hardware. It can supports upto 256 >> enhanced commands. >> >> There is a HW register to indicate the availability of all 256 enhanced >> commands. Each bit stands for each command. But there isn't an existing >> interface to read/write all 256 bits. Introduce the u64 ecmdcap[4] to >> store the existence of each enhanced command. Read 4 times to get >> all of them in map_iommu(). >> >> Add a helper to facilitate an enhanced command launch. Make sure hardware >> complete the command. >> >> Add a helper to facilitate the check of PMU essentials. >> >> The helpers will be used later. >> >> Signed-off-by: Kan Liang >> --- >>   drivers/iommu/intel/dmar.c  | 63 +++++++++++++++++++++++++++++++++++++ >>   drivers/iommu/intel/iommu.h | 46 +++++++++++++++++++++++++++ >>   2 files changed, 109 insertions(+) >> >> diff --git a/drivers/iommu/intel/dmar.c b/drivers/iommu/intel/dmar.c >> index 91bb48267df2..dcafa32875c1 100644 >> --- a/drivers/iommu/intel/dmar.c >> +++ b/drivers/iommu/intel/dmar.c >> @@ -1025,6 +1025,16 @@ static int map_iommu(struct intel_iommu *iommu, >> struct dmar_drhd_unit *drhd) >>               goto release; >>           } >>       } >> + >> +    if (cap_ecmds(iommu->cap)) { >> +        int i; >> + >> +        for (i = 0; i < DMA_MAX_NUM_ECMDCAP; i++) { >> +            iommu->ecmdcap[i] = dmar_readq(iommu->reg + DMAR_ECCAP_REG + >> +                               i * DMA_ECMD_REG_STEP); >> +        } >> +    } >> + >>       err = 0; >>       goto out; >>   @@ -2434,3 +2444,56 @@ bool dmar_platform_optin(void) >>       return ret; >>   } >>   EXPORT_SYMBOL_GPL(dmar_platform_optin); >> + >> +#ifdef CONFIG_INTEL_IOMMU > > Why do you need above #ifdef? > >> +#define ecmd_get_status_code(res)    ((res & 0xff) >> 1) >> + >> +/* >> + * Function to submit a command to the enhanced command interface. The >> + * valid enhanced command descriptions are defined in Table 47 of the >> + * VT-d spec. The VT-d hardware implementation may support some but not >> + * all commands, which can be determined by checking the Enhanced >> + * Command Capability Register. >> + * >> + * Return values: >> + *  - 0: Command successful without any error; >> + *  - Negative: software error value; >> + *  - Nonzero positive: failure status code defined in Table 48. >> + */ >> +int ecmd_submit_sync(struct intel_iommu *iommu, u8 ecmd, >> +             u64 oa, bool has_ob, u64 ob) >> +{ >> +    unsigned long flags; >> +    u64 res; >> +    int ret; >> + >> +    if (!cap_ecmds(iommu->cap)) >> +        return -ENODEV; >> + >> +    raw_spin_lock_irqsave(&iommu->register_lock, flags); >> + >> +    res = dmar_readq(iommu->reg + DMAR_ECRSP_REG); >> +    if (res & DMA_ECMD_ECRSP_IP) { >> +        ret = -EBUSY; >> +        goto err; >> +    } >> + >> +    if (has_ob) >> +        dmar_writeq(iommu->reg + DMAR_ECEO_REG, ob); > > The ecmds that require a Operand B are statically defined in the spec, > right? What will it look like if we define a static ignore_ob(ecmd)? > >> +    dmar_writeq(iommu->reg + DMAR_ECMD_REG, ecmd | (oa << >> DMA_ECMD_OA_SHIFT)); >> + >> +    IOMMU_WAIT_OP(iommu, DMAR_ECRSP_REG, dmar_readq, >> +              !(res & DMA_ECMD_ECRSP_IP), res); >> + >> +    if (res & DMA_ECMD_ECRSP_IP) { >> +        ret = -ETIMEDOUT; >> +        goto err; >> +    } >> + >> +    ret = ecmd_get_status_code(res); >> +err: >> +    raw_spin_unlock_irqrestore(&iommu->register_lock, flags); >> + >> +    return ret; >> +} >> +#endif /* CONFIG_INTEL_IOMMU */ >> diff --git a/drivers/iommu/intel/iommu.h b/drivers/iommu/intel/iommu.h >> index 5bcefbea55c9..f227107434ac 100644 >> --- a/drivers/iommu/intel/iommu.h >> +++ b/drivers/iommu/intel/iommu.h >> @@ -130,6 +130,10 @@ >>   #define DMAR_PERFOVFOFF_REG    0x318 >>   #define DMAR_PERFCNTROFF_REG    0x31c >>   #define DMAR_PERFEVNTCAP_REG    0x380 >> +#define DMAR_ECMD_REG        0x400 >> +#define DMAR_ECEO_REG        0x408 >> +#define DMAR_ECRSP_REG        0x410 >> +#define DMAR_ECCAP_REG        0x430 >>   #define DMAR_VCCAP_REG        0xe30 /* Virtual command capability >> register */ >>   #define DMAR_VCMD_REG        0xe00 /* Virtual command register */ >>   #define DMAR_VCRSP_REG        0xe10 /* Virtual command response >> register */ >> @@ -304,6 +308,26 @@ >>   #define DMA_CCMD_SID(s) (((u64)((s) & 0xffff)) << 16) >>   #define DMA_CCMD_DID(d) ((u64)((d) & 0xffff)) >>   +/* ECMD_REG */ >> +#define DMA_MAX_NUM_ECMD        256 >> +#define DMA_MAX_NUM_ECMDCAP        (DMA_MAX_NUM_ECMD / 64) >> +#define DMA_ECMD_REG_STEP        8 >> +#define DMA_ECMD_ENABLE            0xf0 >> +#define DMA_ECMD_DISABLE        0xf1 >> +#define DMA_ECMD_FREEZE            0xf4 >> +#define DMA_ECMD_UNFREEZE        0xf5 >> +#define DMA_ECMD_OA_SHIFT        16 >> +#define DMA_ECMD_ECRSP_IP        0x1 >> +#define DMA_ECMD_ECCAP3            3 >> +#define DMA_ECMD_ECCAP3_ECNTS        (1ULL << 48) >> +#define DMA_ECMD_ECCAP3_DCNTS        (1ULL << 49) >> +#define DMA_ECMD_ECCAP3_FCNTS        (1ULL << 52) >> +#define DMA_ECMD_ECCAP3_UFCNTS        (1ULL << 53) >> +#define DMA_ECMD_ECCAP3_ESSENTIAL    (DMA_ECMD_ECCAP3_ECNTS |    \ >> +                     DMA_ECMD_ECCAP3_DCNTS |    \ >> +                     DMA_ECMD_ECCAP3_FCNTS |    \ >> +                     DMA_ECMD_ECCAP3_UFCNTS) >> + >>   /* FECTL_REG */ >>   #define DMA_FECTL_IM (((u32)1) << 31) >>   @@ -600,6 +624,7 @@ struct intel_iommu { >>       u64        cap; >>       u64        ecap; >>       u64        vccap; >> +    u64        ecmdcap[DMA_MAX_NUM_ECMDCAP]; >>       u32        gcmd; /* Holds TE, EAFL. Don't need SRTP, SFL, WBF */ >>       raw_spinlock_t    register_lock; /* protect register handling */ >>       int        seq_id;    /* sequence id of the iommu */ >> @@ -841,6 +866,15 @@ extern const struct iommu_ops intel_iommu_ops; >>   extern int intel_iommu_sm; >>   extern int iommu_calculate_agaw(struct intel_iommu *iommu); >>   extern int iommu_calculate_max_sagaw(struct intel_iommu *iommu); >> +extern int ecmd_submit_sync(struct intel_iommu *iommu, u8 ecmd, >> +                u64 oa, bool has_ob, u64 ob); >> + >> +static inline bool ecmd_has_pmu_essential(struct intel_iommu *iommu) >> +{ >> +    return (iommu->ecmdcap[DMA_ECMD_ECCAP3] & >> DMA_ECMD_ECCAP3_ESSENTIAL) == >> +        DMA_ECMD_ECCAP3_ESSENTIAL; >> +} >> + >>   extern int dmar_disabled; >>   extern int intel_iommu_enabled; >>   #else >> @@ -852,6 +886,18 @@ static inline int >> iommu_calculate_max_sagaw(struct intel_iommu *iommu) >>   { >>       return 0; >>   } >> + >> +static inline int ecmd_submit_sync(struct intel_iommu *iommu, u8 ecmd, >> +                   u64 oa, bool has_ob, u64 ob) >> +{ >> +    return -EOPNOTSUPP; >> +} >> + >> +static inline bool ecmd_has_pmu_essential(struct intel_iommu *iommu) >> +{ >> +    return false; >> +} > > Is there any need to call these helpers when INTEL_IOMMU is not > configured? No, I will remove them from non-INTEL_IOMMU. Thanks, Kan > >> + >>   #define dmar_disabled    (1) >>   #define intel_iommu_enabled (0) >>   #define intel_iommu_sm (0) > > -- > Best regards, > baolu