linux-arm-kernel.lists.infradead.org archive mirror
 help / color / mirror / Atom feed
From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v9 08/18] iommu/vt-d: Implement reserved region get/put callbacks
Date: Mon, 23 Jan 2017 11:46:24 +0000	[thread overview]
Message-ID: <20170123114624.GH4622@arm.com> (raw)
In-Reply-To: <1484859483-2866-9-git-send-email-eric.auger@redhat.com>

[adding David Woodhouse, since he maintains this driver]

Will

On Thu, Jan 19, 2017 at 08:57:53PM +0000, Eric Auger wrote:
> This patch registers the [FEE0_0000h - FEF0_000h] 1MB MSI
> range as a reserved region and RMRR regions as direct regions.
> 
> This will allow to report those reserved regions in the
> iommu-group sysfs.
> 
> Signed-off-by: Eric Auger <eric.auger@redhat.com>
> 
> ---
> v6 -> v7:
> - report RMRR regions as direct regions
> - Due to the usage of rcu_read_lock, the rmrr reserved region
>   allocation is done on rmrr allocation.
> - use IOMMU_RESV_RESERVED
> 
> RFCv2 -> RFCv3:
> - use get/put_resv_region callbacks.
> 
> RFC v1 -> RFC v2:
> - fix intel_iommu_add_reserved_regions name
> - use IOAPIC_RANGE_START and IOAPIC_RANGE_END defines
> - return if the MSI region is already registered;
> ---
>  drivers/iommu/intel-iommu.c | 92 ++++++++++++++++++++++++++++++++++++---------
>  1 file changed, 74 insertions(+), 18 deletions(-)
> 
> diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
> index 8a18525..bce59a5 100644
> --- a/drivers/iommu/intel-iommu.c
> +++ b/drivers/iommu/intel-iommu.c
> @@ -440,6 +440,7 @@ struct dmar_rmrr_unit {
>  	u64	end_address;		/* reserved end address */
>  	struct dmar_dev_scope *devices;	/* target devices */
>  	int	devices_cnt;		/* target device count */
> +	struct iommu_resv_region *resv; /* reserved region handle */
>  };
>  
>  struct dmar_atsr_unit {
> @@ -4246,27 +4247,40 @@ static inline void init_iommu_pm_ops(void) {}
>  int __init dmar_parse_one_rmrr(struct acpi_dmar_header *header, void *arg)
>  {
>  	struct acpi_dmar_reserved_memory *rmrr;
> +	int prot = DMA_PTE_READ|DMA_PTE_WRITE;
>  	struct dmar_rmrr_unit *rmrru;
> +	size_t length;
>  
>  	rmrru = kzalloc(sizeof(*rmrru), GFP_KERNEL);
>  	if (!rmrru)
> -		return -ENOMEM;
> +		goto out;
>  
>  	rmrru->hdr = header;
>  	rmrr = (struct acpi_dmar_reserved_memory *)header;
>  	rmrru->base_address = rmrr->base_address;
>  	rmrru->end_address = rmrr->end_address;
> +
> +	length = rmrr->end_address - rmrr->base_address + 1;
> +	rmrru->resv = iommu_alloc_resv_region(rmrr->base_address, length, prot,
> +					      IOMMU_RESV_DIRECT);
> +	if (!rmrru->resv)
> +		goto free_rmrru;
> +
>  	rmrru->devices = dmar_alloc_dev_scope((void *)(rmrr + 1),
>  				((void *)rmrr) + rmrr->header.length,
>  				&rmrru->devices_cnt);
> -	if (rmrru->devices_cnt && rmrru->devices == NULL) {
> -		kfree(rmrru);
> -		return -ENOMEM;
> -	}
> +	if (rmrru->devices_cnt && rmrru->devices == NULL)
> +		goto free_all;
>  
>  	list_add(&rmrru->list, &dmar_rmrr_units);
>  
>  	return 0;
> +free_all:
> +	kfree(rmrru->resv);
> +free_rmrru:
> +	kfree(rmrru);
> +out:
> +	return -ENOMEM;
>  }
>  
>  static struct dmar_atsr_unit *dmar_find_atsr(struct acpi_dmar_atsr *atsr)
> @@ -4480,6 +4494,7 @@ static void intel_iommu_free_dmars(void)
>  	list_for_each_entry_safe(rmrru, rmrr_n, &dmar_rmrr_units, list) {
>  		list_del(&rmrru->list);
>  		dmar_free_dev_scope(&rmrru->devices, &rmrru->devices_cnt);
> +		kfree(rmrru->resv);
>  		kfree(rmrru);
>  	}
>  
> @@ -5203,6 +5218,45 @@ static void intel_iommu_remove_device(struct device *dev)
>  	iommu_device_unlink(iommu->iommu_dev, dev);
>  }
>  
> +static void intel_iommu_get_resv_regions(struct device *device,
> +					 struct list_head *head)
> +{
> +	struct iommu_resv_region *reg;
> +	struct dmar_rmrr_unit *rmrr;
> +	struct device *i_dev;
> +	int i;
> +
> +	rcu_read_lock();
> +	for_each_rmrr_units(rmrr) {
> +		for_each_active_dev_scope(rmrr->devices, rmrr->devices_cnt,
> +					  i, i_dev) {
> +			if (i_dev != device)
> +				continue;
> +
> +			list_add_tail(&rmrr->resv->list, head);
> +		}
> +	}
> +	rcu_read_unlock();
> +
> +	reg = iommu_alloc_resv_region(IOAPIC_RANGE_START,
> +				      IOAPIC_RANGE_END - IOAPIC_RANGE_START + 1,
> +				      0, IOMMU_RESV_RESERVED);
> +	if (!reg)
> +		return;
> +	list_add_tail(&reg->list, head);
> +}
> +
> +static void intel_iommu_put_resv_regions(struct device *dev,
> +					 struct list_head *head)
> +{
> +	struct iommu_resv_region *entry, *next;
> +
> +	list_for_each_entry_safe(entry, next, head, list) {
> +		if (entry->type == IOMMU_RESV_RESERVED)
> +			kfree(entry);
> +	}
> +}
> +
>  #ifdef CONFIG_INTEL_IOMMU_SVM
>  #define MAX_NR_PASID_BITS (20)
>  static inline unsigned long intel_iommu_get_pts(struct intel_iommu *iommu)
> @@ -5333,19 +5387,21 @@ struct intel_iommu *intel_svm_device_to_iommu(struct device *dev)
>  #endif /* CONFIG_INTEL_IOMMU_SVM */
>  
>  static const struct iommu_ops intel_iommu_ops = {
> -	.capable	= intel_iommu_capable,
> -	.domain_alloc	= intel_iommu_domain_alloc,
> -	.domain_free	= intel_iommu_domain_free,
> -	.attach_dev	= intel_iommu_attach_device,
> -	.detach_dev	= intel_iommu_detach_device,
> -	.map		= intel_iommu_map,
> -	.unmap		= intel_iommu_unmap,
> -	.map_sg		= default_iommu_map_sg,
> -	.iova_to_phys	= intel_iommu_iova_to_phys,
> -	.add_device	= intel_iommu_add_device,
> -	.remove_device	= intel_iommu_remove_device,
> -	.device_group   = pci_device_group,
> -	.pgsize_bitmap	= INTEL_IOMMU_PGSIZES,
> +	.capable		= intel_iommu_capable,
> +	.domain_alloc		= intel_iommu_domain_alloc,
> +	.domain_free		= intel_iommu_domain_free,
> +	.attach_dev		= intel_iommu_attach_device,
> +	.detach_dev		= intel_iommu_detach_device,
> +	.map			= intel_iommu_map,
> +	.unmap			= intel_iommu_unmap,
> +	.map_sg			= default_iommu_map_sg,
> +	.iova_to_phys		= intel_iommu_iova_to_phys,
> +	.add_device		= intel_iommu_add_device,
> +	.remove_device		= intel_iommu_remove_device,
> +	.get_resv_regions	= intel_iommu_get_resv_regions,
> +	.put_resv_regions	= intel_iommu_put_resv_regions,
> +	.device_group		= pci_device_group,
> +	.pgsize_bitmap		= INTEL_IOMMU_PGSIZES,
>  };
>  
>  static void quirk_iommu_g4x_gfx(struct pci_dev *dev)
> -- 
> 1.9.1
> 

  reply	other threads:[~2017-01-23 11:46 UTC|newest]

Thread overview: 22+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-01-19 20:57 [PATCH v9 00/18] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions Eric Auger
2017-01-19 20:57 ` [PATCH v9 01/18] iommu/dma: Allow MSI-only cookies Eric Auger
2017-01-19 20:57 ` [PATCH v9 02/18] iommu: Rename iommu_dm_regions into iommu_resv_regions Eric Auger
2017-01-19 20:57 ` [PATCH v9 03/18] iommu: Add a new type field in iommu_resv_region Eric Auger
2017-01-19 20:57 ` [PATCH v9 04/18] iommu: iommu_alloc_resv_region Eric Auger
2017-01-19 20:57 ` [PATCH v9 05/18] iommu: Only map direct mapped regions Eric Auger
2017-01-19 20:57 ` [PATCH v9 06/18] iommu: iommu_get_group_resv_regions Eric Auger
2017-01-19 20:57 ` [PATCH v9 07/18] iommu: Implement reserved_regions iommu-group sysfs file Eric Auger
2017-01-19 20:57 ` [PATCH v9 08/18] iommu/vt-d: Implement reserved region get/put callbacks Eric Auger
2017-01-23 11:46   ` Will Deacon [this message]
2017-01-23 11:57     ` Auger Eric
2017-01-19 20:57 ` [PATCH v9 09/18] iommu/amd: Declare MSI and HT regions as reserved IOVA regions Eric Auger
2017-01-19 20:57 ` [PATCH v9 10/18] iommu/arm-smmu: Implement reserved region get/put callbacks Eric Auger
2017-01-23 11:44   ` Will Deacon
2017-01-19 20:57 ` [PATCH v9 11/18] iommu/arm-smmu-v3: " Eric Auger
2017-01-19 20:57 ` [PATCH v9 12/18] irqdomain: Add irq domain MSI and MSI_REMAP flags Eric Auger
2017-01-19 20:57 ` [PATCH v9 13/18] genirq/msi: Set IRQ_DOMAIN_FLAG_MSI on MSI domain creation Eric Auger
2017-01-19 20:57 ` [PATCH v9 14/18] irqdomain: irq_domain_check_msi_remap Eric Auger
2017-01-19 20:58 ` [PATCH v9 15/18] irqchip/gicv3-its: Sets IRQ_DOMAIN_FLAG_MSI_REMAP Eric Auger
2017-01-19 20:58 ` [PATCH v9 16/18] vfio/type1: Allow transparent MSI IOVA allocation Eric Auger
2017-01-19 20:58 ` [PATCH v9 17/18] vfio/type1: Check MSI remapping at irq domain level Eric Auger
2017-01-19 20:58 ` [PATCH v9 18/18] iommu/arm-smmu: Do not advertise IOMMU_CAP_INTR_REMAP anymore Eric Auger

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170123114624.GH4622@arm.com \
    --to=will.deacon@arm.com \
    --cc=linux-arm-kernel@lists.infradead.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).