From: Robin Murphy <robin.murphy@arm.com>
To: Shameer Kolothum <shameerali.kolothum.thodi@huawei.com>,
linux-arm-kernel@lists.infradead.org, linux-acpi@vger.kernel.org,
iommu@lists.linux-foundation.org, devel@acpica.org
Cc: linuxarm@huawei.com, lorenzo.pieralisi@arm.com, joro@8bytes.org,
wanghuiqiang@huawei.com, guohanjun@huawei.com,
jonathan.cameron@huawei.com
Subject: Re: [RFC PATCH 3/4] ACPI/IORT: Add RMR memory regions reservation helper
Date: Thu, 5 Nov 2020 18:03:58 +0000 [thread overview]
Message-ID: <327e6475-eb48-33a1-ef38-fae9df3bf0cb@arm.com> (raw)
In-Reply-To: <20201027112646.44680-4-shameerali.kolothum.thodi@huawei.com>
On 2020-10-27 11:26, Shameer Kolothum wrote:
> Add a helper function that retrieves RMR memory descriptors
> associated with a given endpoint dev. These memory regions
> should have a unity mapping in the SMMU. So reserve them as
> IOMMU_RESV_DIRECT.
As a general observation, we also need a way into this that isn't from
the perspective of endpoint devices. With SMMUv3 we need to know all the
active stream IDs relevant to a given SMMU instance at probe time, so
that we can set up some kind of valid stream table entries *before*
enabling the SMMU in the reset routine. Otherwise we're just going to
kill ongoing traffic (e.g. EFI GOP) with C_BAD_STE long before we ever
start adding devices and worrying about reserved regions for them.
Similarly for the initial SMR/S2CR state on SMMUv2 with disable_bypass.
Robin.
> Signed-off-by: Shameer Kolothum <shameerali.kolothum.thodi@huawei.com>
> ---
> drivers/acpi/arm64/iort.c | 56 +++++++++++++++++++++++++++++++++++++++
> include/linux/acpi_iort.h | 4 +++
> 2 files changed, 60 insertions(+)
>
> diff --git a/drivers/acpi/arm64/iort.c b/drivers/acpi/arm64/iort.c
> index b32cd53cca08..c0700149e60b 100644
> --- a/drivers/acpi/arm64/iort.c
> +++ b/drivers/acpi/arm64/iort.c
> @@ -842,6 +842,60 @@ static inline int iort_add_device_replay(struct device *dev)
> return err;
> }
>
> +static bool iort_dev_has_rmr(struct device *dev, struct iort_rmr_entry *e)
> +{
> + struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev);
> + struct acpi_iort_node *iommu;
> + struct iort_rmr_id *rmr_ids = e->rmr_ids;
> + int i, j;
> +
> + iommu = iort_get_iort_node(fwspec->iommu_fwnode);
> +
> + for (i = 0; i < e->rmr_ids_num; i++, rmr_ids++) {
> + for (j = 0; j < fwspec->num_ids; j++) {
> + if (rmr_ids->sid == fwspec->ids[j] &&
> + rmr_ids->smmu == iommu)
> + return true;
> + }
> + }
> +
> + return false;
> +}
> +
> +/**
> + * iort_dev_rmr_get_resv_regions - RMR Reserved region driver helper
> + * @dev: Device from iommu_get_resv_regions()
> + * @head: Reserved region list from iommu_get_resv_regions()
> + *
> + * Returns: 0 on success, <0 failure
> + */
> +int iort_dev_rmr_get_resv_regions(struct device *dev, struct list_head *head)
> +{
> + struct iort_rmr_entry *e;
> +
> + list_for_each_entry(e, &iort_rmr_list, list) {
> + struct iommu_resv_region *region;
> + struct acpi_iort_rmr_desc *rmr;
> + int prot = IOMMU_READ | IOMMU_WRITE |
> + IOMMU_NOEXEC | IOMMU_MMIO;
> +
> + if (!iort_dev_has_rmr(dev, e))
> + continue;
> +
> + rmr = e->rmr_desc;
> + region = iommu_alloc_resv_region(rmr->base_address,
> + rmr->length, prot,
> + IOMMU_RESV_DIRECT);
> + if (!region) {
> + dev_err(dev, "Out of memory allocating RMR regions\n");
> + return -ENOMEM;
> + }
> + list_add_tail(®ion->list, head);
> + }
> +
> + return 0;
> +}
> +
> /**
> * iort_iommu_msi_get_resv_regions - Reserved region driver helper
> * @dev: Device from iommu_get_resv_regions()
> @@ -1112,6 +1166,8 @@ int iort_iommu_msi_get_resv_regions(struct device *dev, struct list_head *head)
> const struct iommu_ops *iort_iommu_configure_id(struct device *dev,
> const u32 *input_id)
> { return NULL; }
> +int iort_dev_rmr_get_resv_regions(struct device *dev, struct list_head *head)
> +{ return 0; }
> #endif
>
> static int nc_dma_get_range(struct device *dev, u64 *size)
> diff --git a/include/linux/acpi_iort.h b/include/linux/acpi_iort.h
> index 20a32120bb88..6dd89faf340c 100644
> --- a/include/linux/acpi_iort.h
> +++ b/include/linux/acpi_iort.h
> @@ -38,6 +38,7 @@ void iort_dma_setup(struct device *dev, u64 *dma_addr, u64 *size);
> const struct iommu_ops *iort_iommu_configure_id(struct device *dev,
> const u32 *id_in);
> int iort_iommu_msi_get_resv_regions(struct device *dev, struct list_head *head);
> +int iort_dev_rmr_get_resv_regions(struct device *dev, struct list_head *head);
> #else
> static inline void acpi_iort_init(void) { }
> static inline u32 iort_msi_map_id(struct device *dev, u32 id)
> @@ -55,6 +56,9 @@ static inline const struct iommu_ops *iort_iommu_configure_id(
> static inline
> int iort_iommu_msi_get_resv_regions(struct device *dev, struct list_head *head)
> { return 0; }
> +static inline
> +int iort_dev_rmr_get_resv_regions(struct device *dev, struct list_head *head)
> +{ return 0; }
> #endif
>
> #endif /* __ACPI_IORT_H__ */
>
next prev parent reply other threads:[~2020-11-05 18:04 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-10-27 11:26 [RFC PATCH 0/4] ACPI/IORT: Support for IORT RMR node Shameer Kolothum
2020-10-27 11:26 ` [RFC PATCH 1/4] ACPICA: IORT: Update for revision E Shameer Kolothum
[not found] ` <BYAPR11MB3256AFF743B4FCC400F4181C87160@BYAPR11MB3256.namprd11.prod.outlook.com>
[not found] ` <610c14ef56d64fe087ca52aede07d811@huawei.com>
[not found] ` <MWHPR11MB1599988D7C857E3AFFA4A48AF0170@MWHPR11MB1599.namprd11.prod.outlook.com>
2020-10-28 18:40 ` [Devel] " Shameerali Kolothum Thodi
2020-10-27 11:26 ` [RFC PATCH 2/4] ACPI/IORT: Add support for RMR node parsing Shameer Kolothum
2020-10-28 18:43 ` [Devel] " David E. Box
2020-11-09 12:29 ` [Devel] " Sami Mujawar
2020-11-19 12:07 ` Shameerali Kolothum Thodi
2020-10-27 11:26 ` [RFC PATCH 3/4] ACPI/IORT: Add RMR memory regions reservation helper Shameer Kolothum
2020-11-05 18:03 ` Robin Murphy [this message]
2020-11-06 8:30 ` Shameerali Kolothum Thodi
2020-11-06 13:06 ` Robin Murphy
2020-11-06 16:00 ` Shameerali Kolothum Thodi
2020-10-27 11:26 ` [RFC PATCH 4/4] iommu/dma: Reserve any RMR regions associated with a dev Shameer Kolothum
2020-10-28 16:43 ` [RFC PATCH 0/4] ACPI/IORT: Support for IORT RMR node Steven Price
2020-10-28 18:24 ` Shameerali Kolothum Thodi
2020-11-06 15:22 ` Steven Price
2020-11-06 16:17 ` Shameerali Kolothum Thodi
2020-11-06 16:26 ` Steven Price
2020-11-06 17:09 ` Robin Murphy
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=327e6475-eb48-33a1-ef38-fae9df3bf0cb@arm.com \
--to=robin.murphy@arm.com \
--cc=devel@acpica.org \
--cc=guohanjun@huawei.com \
--cc=iommu@lists.linux-foundation.org \
--cc=jonathan.cameron@huawei.com \
--cc=joro@8bytes.org \
--cc=linux-acpi@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linuxarm@huawei.com \
--cc=lorenzo.pieralisi@arm.com \
--cc=shameerali.kolothum.thodi@huawei.com \
--cc=wanghuiqiang@huawei.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox