From patchwork Fri Apr 23 09:51:47 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Vivek Kumar Gautam X-Patchwork-Id: 12220037 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-16.8 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, INCLUDES_PATCH,MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED, USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AB953C433ED for ; Fri, 23 Apr 2021 09:56:41 +0000 (UTC) Received: from desiato.infradead.org (desiato.infradead.org [90.155.92.199]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 2CDF9613BE for ; Fri, 23 Apr 2021 09:56:41 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 2CDF9613BE Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=arm.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=desiato.20200630; h=Sender:Content-Transfer-Encoding :Content-Type:MIME-Version:List-Subscribe:List-Help:List-Post:List-Archive: List-Unsubscribe:List-Id:References:In-Reply-To:Message-Id:Date:Subject:Cc:To :From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=LkCK1MRidGcwUBLPSZEjr7YpZ0SP1OOzMgppsgU5+Qk=; b=X0F5nIzthkDz5pzkVJ5g7FPkgq AQ0GCsulp4+xDtVNR5VPYs8mLhEetlDVP8RjI5FBRSvY/wVfzc+Qh8XkRpwQuGCJBPCBh119lFLsk LVZ24R83yOHqosGixJSw7FKOmtIWH/OQcMUYkC+jH6nbRbRnef6oj5KUk6/ujCFrWpnabMy2bELwc lTWSCx3uWn9M3vTb+/EX1wnuWPAMSHq/ZZqHvAMvLInqFqcwtoda2tVP6HWTX4LIxlbuXGWtWtRHu LXCRMbLd7DMZjR+8dMfgq/GEBUHjWrBCLbXiTfaHTrXBLHYK+4BwEYedy6oyd/k+1Y7CSvPGChdwk 4vajhO5Q==; Received: from localhost ([::1] helo=desiato.infradead.org) by desiato.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lZsWO-001E3Z-Ai; Fri, 23 Apr 2021 09:54:48 +0000 Received: from bombadil.infradead.org ([2607:7c80:54:e::133]) by desiato.infradead.org with esmtps (Exim 4.94 #2 (Red Hat Linux)) id 1lZsUW-001DJN-Oz for linux-arm-kernel@desiato.infradead.org; Fri, 23 Apr 2021 09:52:52 +0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=infradead.org; s=bombadil.20210309; h=References:In-Reply-To:Message-Id: Date:Subject:Cc:To:From:Sender:Reply-To:MIME-Version:Content-Type: Content-Transfer-Encoding:Content-ID:Content-Description; bh=5eQQrqn8tNlZG/15ITW8s9/LmABKmp1zjkn7ppzYh6M=; b=Pbc/OvDVXFZVU/hVCDUlA3xks6 zKXXu8nyJHJDkPlkR8qNObVylQeF/9Z5Zfg7+Ok0AjtXKAqs32HZW5oRWQrZpYpTx6xYxL2ujHW/F bLMadj0kie30Dxd/xG8tUHNFzGUfXtb6ryk0byP8qpJAvB10ZO6LRkYgk2TKZnQAXp99fmE3zZR0L /Ab4jguvACfUZ1vo5XE6pHiDLNMDyVQm2g6suMRaUPsaoFTSS0CJteuU032tVICsIilj8qKA28fyg Z8OffxT6x2ZJl43rNEJAtcKLVBC/b6ro21mWC6x216Wh5w1nKQgndtRyW7pU/d9vCU6iFX94swcUj 5FuCjs6Q==; Received: from foss.arm.com ([217.140.110.172]) by bombadil.infradead.org with esmtp (Exim 4.94 #2 (Red Hat Linux)) id 1lZsUU-00EIlU-6f for linux-arm-kernel@lists.infradead.org; Fri, 23 Apr 2021 09:52:51 +0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 94D261684; Fri, 23 Apr 2021 02:52:49 -0700 (PDT) Received: from usa.arm.com (a074945.blr.arm.com [10.162.16.71]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 6D48D3F774; Fri, 23 Apr 2021 02:52:45 -0700 (PDT) From: Vivek Gautam To: linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org, iommu@lists.linux-foundation.org, virtualization@lists.linux-foundation.org Cc: joro@8bytes.org, will.deacon@arm.com, mst@redhat.com, robin.murphy@arm.com, jean-philippe@linaro.org, eric.auger@redhat.com, kevin.tian@intel.com, jacob.jun.pan@linux.intel.com, yi.l.liu@intel.com, Lorenzo.Pieralisi@arm.com, shameerali.kolothum.thodi@huawei.com, Vivek Gautam Subject: [PATCH RFC v1 11/11] iommu/virtio: Add support to send page response Date: Fri, 23 Apr 2021 15:21:47 +0530 Message-Id: <20210423095147.27922-12-vivek.gautam@arm.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210423095147.27922-1-vivek.gautam@arm.com> References: <20210423095147.27922-1-vivek.gautam@arm.com> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20210423_025250_307460_9E8BB336 X-CRM114-Status: UNSURE ( 9.76 ) X-CRM114-Notice: Please train this message. X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Add page_response iommu ops callback to send page response to the device that generated io page fault. Signed-off-by: Vivek Gautam --- drivers/iommu/virtio-iommu.c | 47 ++++++++++++++++++++++++++++++++++++ 1 file changed, 47 insertions(+) diff --git a/drivers/iommu/virtio-iommu.c b/drivers/iommu/virtio-iommu.c index 08f1294baeab..6d62d9eae452 100644 --- a/drivers/iommu/virtio-iommu.c +++ b/drivers/iommu/virtio-iommu.c @@ -1778,6 +1778,52 @@ static int viommu_of_xlate(struct device *dev, struct of_phandle_args *args) return iommu_fwspec_add_ids(dev, args->args, 1); } +static int viommu_page_response(struct device *dev, + struct iommu_fault_event *evt, + struct iommu_page_response *resp) +{ + struct iommu_domain *domain = iommu_get_domain_for_dev(dev); + struct viommu_domain *vdomain = to_viommu_domain(domain); + struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(dev); + struct viommu_endpoint *vdev = dev_iommu_priv_get(dev); + struct viommu_dev *viommu = vdev->viommu; + bool pasid_valid = resp->flags & IOMMU_PAGE_RESP_PASID_VALID; + struct virtio_iommu_req_page_resp req = { + .head.type = VIRTIO_IOMMU_T_PAGE_RESP, + .domain = cpu_to_le32(vdomain->id), + .endpoint = cpu_to_le32(fwspec->ids[0]), + }; + + if (vdev->pri_supported) { + bool needs_pasid = (evt->fault.prm.flags & + IOMMU_FAULT_PAGE_RESPONSE_NEEDS_PASID); + + req.pasid_valid = needs_pasid && pasid_valid; + req.flags = cpu_to_le32((needs_pasid && pasid_valid) ? + VIRTIO_IOMMU_PAGE_RESP_PASID_VALID : 0); + req.pasid = cpu_to_le32(resp->pasid); + req.grpid = cpu_to_le32(resp->grpid); + + switch (resp->code) { + case IOMMU_PAGE_RESP_FAILURE: + req.resp_code = cpu_to_le16(VIRTIO_IOMMU_PAGE_RESP_FAILURE); + break; + case IOMMU_PAGE_RESP_INVALID: + req.resp_code = cpu_to_le16(VIRTIO_IOMMU_PAGE_RESP_INVALID); + break; + case IOMMU_PAGE_RESP_SUCCESS: + req.resp_code = cpu_to_le16(VIRTIO_IOMMU_PAGE_RESP_SUCCESS); + break; + default: + return -EINVAL; + } + } else { + return -ENODEV; + } + + return viommu_send_req_sync(viommu, &req, sizeof(req)); +} + static u32 viommu_sva_get_pasid(struct iommu_sva *handle) { struct viommu_sva_bond *bond = sva_to_viommu_bond(handle); @@ -2155,6 +2201,7 @@ static struct iommu_ops viommu_ops = { .sva_bind = viommu_sva_bind, .sva_unbind = viommu_sva_unbind, .sva_get_pasid = viommu_sva_get_pasid, + .page_response = viommu_page_response, }; static int viommu_init_vqs(struct viommu_dev *viommu)