Received: by 2002:a05:6358:700f:b0:131:369:b2a3 with SMTP id 15csp1267755rwo; Wed, 2 Aug 2023 11:09:06 -0700 (PDT) X-Google-Smtp-Source: APBJJlGxwJl9N1zZYqWMHVH3uO/qO1q+N9ag4xZuajKDPWb1ge+pE6e4Wbi4Xk2IHG5NSNXX4Zha X-Received: by 2002:a05:6a20:9187:b0:13e:debc:3648 with SMTP id v7-20020a056a20918700b0013edebc3648mr4190346pzd.29.1690999746563; Wed, 02 Aug 2023 11:09:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1690999746; cv=none; d=google.com; s=arc-20160816; b=sE8dEBUX2JMR3BVs1C6Q8Nta6GD1cMOtijCqm9QZzqF5Cfw+EQAbQntRfs6oHntc2n ZYNK4bzYvVvv0rn5TGHTZ8FMMTavHVRnFHIz7xVqz0sZ8vA8iUvBk3DG1w3Ghe2t4N7S AFyIl+sZuO+cyF9UbWHwFqUd/n5s8vNVMgILOiYHG7Q+lv2/X/+gexCykn9GDLuL+Kck c6joA8tNup+F/leMoBmRp6H63EXVpQsmXjzh85N8+ZgFHSk3HlwsQa6uaXJ4Ha7o+bIm u3Wit7vsTL4yZTDXSC3ZZoBNdWclrdwQjaG8Iw0imcyjMir4WpcQwYRl82x0kA2beZKv dQxQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature:dkim-filter; bh=0w/s1aILUGdu6l9TBg9GA7dQB129S5Vn6UT0DHQRKKQ=; fh=w1DjzeoqrE01ynWqhovDz3fhLgzTkkBuW8zfaTn/oNY=; b=axdVcMEBH6Qq5eDzkorxdpfkEp7R7PMpJ54pyPuqPdua4xg/ER0/CH3f2kl4JlUusF JtblIUOGy4ToXg/c4MWAr5O/pfsw66iT9hIpYc4vwNw5uYEJ1Qp9HSnFfLJf+mTV6I1e x+9INBdJllsjckbbjRd/HJXwNKCudx94f5y1qqLioJUTUvxJM45t4hMvrua9cXMjijyh e6fOwlBsRITYoYOgt807Bv5tlezu42G1gqSnEQdwJoV1atnPmY7NMDp1Fx1e2Oh/1+MX k0KMa5qVECMXlKhLJiMN6YO0feJKl9e7CoDmi9/9HPs3/VX9UsFvQUcgRt5BSwVc924A MHhQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=RxY7sMqG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id n38-20020a635c66000000b00563d5bc2942si10476518pgm.539.2023.08.02.11.08.54; Wed, 02 Aug 2023 11:09:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linux.microsoft.com header.s=default header.b=RxY7sMqG; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linux.microsoft.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232445AbjHBRVY (ORCPT + 99 others); Wed, 2 Aug 2023 13:21:24 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44888 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232347AbjHBRVP (ORCPT ); Wed, 2 Aug 2023 13:21:15 -0400 Received: from linux.microsoft.com (linux.microsoft.com [13.77.154.182]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9CD971723; Wed, 2 Aug 2023 10:21:14 -0700 (PDT) Received: from rrs24-12-35.corp.microsoft.com (unknown [131.107.1.149]) by linux.microsoft.com (Postfix) with ESMTPSA id 14716238C439; Wed, 2 Aug 2023 10:21:14 -0700 (PDT) DKIM-Filter: OpenDKIM Filter v2.11.0 linux.microsoft.com 14716238C439 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linux.microsoft.com; s=default; t=1690996874; bh=0w/s1aILUGdu6l9TBg9GA7dQB129S5Vn6UT0DHQRKKQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=RxY7sMqG1DU8nJHWiEsAMX5imMZv0hsAB2RxzI6Vy9pFn8zyCPGU0EkTJdbL1BBzL tfkpU/0ASbACBBTjBECSQJET0XOovGuE3JwYT0qXP7jcGvY/BZXYE6ldplnVun1/Rb J6OL4pYerZW+UMolFgiP37enjtJiHzFuDUI2bV6I= From: Easwar Hariharan To: stable@vger.kernel.org Cc: easwar.hariharan@microsoft.com, Robin Murphy , Nicolin Chen , Will Deacon , Joerg Roedel , Vladimir Oltean , Yicong Yang , Lu Baolu , linux-arm-kernel@lists.infradead.org (moderated list:ARM SMMU DRIVERS), iommu@lists.linux.dev (open list:IOMMU SUBSYSTEM), linux-kernel@vger.kernel.org (open list) Subject: [PATCH v3 6.1 3/4] iommu/arm-smmu-v3: Add explicit feature for nesting Date: Wed, 2 Aug 2023 17:20:59 +0000 Message-Id: <20230802172100.1599164-4-eahariha@linux.microsoft.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230802172100.1599164-1-eahariha@linux.microsoft.com> References: <20230802172100.1599164-1-eahariha@linux.microsoft.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-19.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL, USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Robin Murphy commit 1d9777b9f3d55b4b6faf186ba4f1d6fb560c0523 upstream In certain cases we may want to refuse to allow nested translation even when both stages are implemented, so let's add an explicit feature for nesting support which we can control in its own right. For now this merely serves as documentation, but it means a nice convenient check will be ready and waiting for the future nesting code. Signed-off-by: Robin Murphy Reviewed-by: Nicolin Chen Link: https://lore.kernel.org/r/136c3f4a3a84cc14a5a1978ace57dfd3ed67b688.1683731256.git.robin.murphy@arm.com Signed-off-by: Will Deacon Signed-off-by: Easwar Hariharan --- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 4 ++++ drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h | 1 + 2 files changed, 5 insertions(+) diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c index aed038f7d66c..330f909a29de 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c @@ -3654,6 +3654,10 @@ static int arm_smmu_device_hw_probe(struct arm_smmu_device *smmu) smmu->ias = max(smmu->ias, smmu->oas); + if ((smmu->features & ARM_SMMU_FEAT_TRANS_S1) && + (smmu->features & ARM_SMMU_FEAT_TRANS_S2)) + smmu->features |= ARM_SMMU_FEAT_NESTING; + arm_smmu_device_iidr_probe(smmu); if (arm_smmu_sva_supported(smmu)) diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h index d9e4357c6869..d0b207cae107 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h @@ -645,6 +645,7 @@ struct arm_smmu_device { #define ARM_SMMU_FEAT_BTM (1 << 16) #define ARM_SMMU_FEAT_SVA (1 << 17) #define ARM_SMMU_FEAT_E2H (1 << 18) +#define ARM_SMMU_FEAT_NESTING (1 << 19) u32 features; #define ARM_SMMU_OPT_SKIP_PREFETCH (1 << 0) -- 2.25.1