From patchwork Tue Aug 27 16:59:54 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Nicolin Chen X-Patchwork-Id: 13779878 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id A7DF2C5472F for ; Tue, 27 Aug 2024 17:18:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender:List-Subscribe:List-Help :List-Post:List-Archive:List-Unsubscribe:List-Id:Content-Type: Content-Transfer-Encoding:MIME-Version:References:In-Reply-To:Message-ID:Date :Subject:CC:To:From:Reply-To:Content-ID:Content-Description:Resent-Date: Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:List-Owner; bh=M9gwxzjSvuGPTbOjmKyokAYc9NQ9/GvPyzwo1NIRlQA=; b=QVX8yxk1oPZv3V3/x185u2OBhT CjC4lJLZtQzHsxVlwvUiosWpUXqS7lVZPNEJA/Vu0MfPNaLYuXjmetVTiN/PP+YnOIO2WbKakMYVJ CUvZFLHD9alrN6RbLeYlWPayDPsPh4q9bxmYzxLV+gjzT8kA6ArxopycuxmJlMGZIrPV86DWfYuvo x1UglFxM1AEj3q/3hUKSe4FSvWK9/waoZAryGhZMk7i12BZE5B0tcZzLrb8tuv5ZhBTQ/4hY7uXWH 3TqB2pT0fSZ2cJWokhgS7RaNmQnoPAB+lJ5C15NS+M1AFQp7OID+qP15iqfhnd4p4cvcWHDl9Doxe Mm/X5aTg==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.97.1 #2 (Red Hat Linux)) id 1sizpg-0000000CGBZ-1FFl; Tue, 27 Aug 2024 17:18:16 +0000 Received: from mail-bn8nam12on2061a.outbound.protection.outlook.com ([2a01:111:f403:2418::61a] helo=NAM12-BN8-obe.outbound.protection.outlook.com) by bombadil.infradead.org with esmtps (Exim 4.97.1 #2 (Red Hat Linux)) id 1siza9-0000000CBxQ-3KUU for linux-arm-kernel@lists.infradead.org; Tue, 27 Aug 2024 17:02:15 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=TA4QwYUX5tQ7grnyv4HsptQKGtSCSmiNc27DF4TaSUogThGUAQZhyN9DMlwPdIYPCHAQEK105Qv64EmfK1f9LJDsMlTg72Fn9brcz6zqaljHsqar2cQ9gUIzStpZuRFi9tMghR1cpEAjGzrPu3nb6e/yi6oCCAZoN/less8m/I1Kc3HZOo1am0VLxO1py3mshEOwx+j+prQaYDyMPyhey2PvbYdjv9dYgjMWcm63mmjY2cr1A1thtqCwqg977I0TMU7CeCyyfJsRJC6fqwsL7BqxDm86n6v4bNWtwQRt07NGqPV9dwy2D1Sv/pzjyolHzR0A2/rdMGYBC0nLuq15Hg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=M9gwxzjSvuGPTbOjmKyokAYc9NQ9/GvPyzwo1NIRlQA=; b=h9VMi3I04nOFfjw+22wHW1+Xi5nrP1OHrvjh6eXUDC9HXW4evIPeuIGMXijgDquNhWrRgiN9RCa//RAZR9uMEv1ichrvIO3RuaDMmQ1nW3U7LuPLm3psKQeYDM+UVUXsuIeNFwjKXDTHyIcK9sD4BWue3uooU70L3jPp5agWn7HzYkOuE5lvAaG9fw03676ZLtz5ILn0z7oKnVIYR1Y4knwCg1cnLpw355rRcqRYJ7rIZkLwS9DQfgHJsqyE5DLn86bdXsboqDK28/GExmSglcY1U94OVGuSb9cwRLGWoT3YPa/z5HR9jW/d/pdn9pi4bEip2BrUQQI3Oajg9968aw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.232) smtp.rcpttodomain=huawei.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=M9gwxzjSvuGPTbOjmKyokAYc9NQ9/GvPyzwo1NIRlQA=; b=Ur+OorABI7h7xR/vSSBobkCQkHaHvwELtu2xQg8HumIbgnjw1Q+32qlu2iUGkPDMZjXqWEtSKCXXB9EcluUHKSo59rYJBQpdjaPRMMfedSusU8tt+LxXvazWwMPhvMZtNX5Jq24GRqThXgpWf4iZtemLkEuBBgKSgLYbuxbqpAKab+MM1+sBvg3gwDLyGmDN/11pgPi8qHfbY7/q6mhJR2chyudo3Ic6jvr1EaJi40LMpuqN0GXTNFmF9Ydcfp/4VCyhpW7JQlKd55mus0qYrn0z/ej6VkPuLjVS1qxApUCiupJDoxd7oRR797vq3ofMMyPD3hZlZSED//gwkW7TXw== Received: from PH7PR17CA0072.namprd17.prod.outlook.com (2603:10b6:510:325::20) by SA0PR12MB4381.namprd12.prod.outlook.com (2603:10b6:806:70::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7897.25; Tue, 27 Aug 2024 17:02:06 +0000 Received: from SN1PEPF000397AE.namprd05.prod.outlook.com (2603:10b6:510:325:cafe::7d) by PH7PR17CA0072.outlook.office365.com (2603:10b6:510:325::20) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7875.20 via Frontend Transport; Tue, 27 Aug 2024 17:02:06 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.232) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.232 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.232; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.232) by SN1PEPF000397AE.mail.protection.outlook.com (10.167.248.52) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7918.13 via Frontend Transport; Tue, 27 Aug 2024 17:02:06 +0000 Received: from drhqmail203.nvidia.com (10.126.190.182) by mail.nvidia.com (10.127.129.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Tue, 27 Aug 2024 10:01:52 -0700 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail203.nvidia.com (10.126.190.182) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Tue, 27 Aug 2024 10:01:52 -0700 Received: from Asurada-Nvidia.nvidia.com (10.127.8.13) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server id 15.2.1544.4 via Frontend Transport; Tue, 27 Aug 2024 10:01:51 -0700 From: Nicolin Chen To: , , CC: , , , , , , , , , , , , , , , , Subject: [PATCH v2 17/19] iommu/arm-smmu-v3: Add arm_smmu_viommu_cache_invalidate Date: Tue, 27 Aug 2024 09:59:54 -0700 Message-ID: <4b61aba3bc6c1cce628d9db44d5b18ea567a8be1.1724776335.git.nicolinc@nvidia.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: References: MIME-Version: 1.0 X-NV-OnPremToCloud: ExternallySecured X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SN1PEPF000397AE:EE_|SA0PR12MB4381:EE_ X-MS-Office365-Filtering-Correlation-Id: 03b50a8f-8dda-4362-7eae-08dcc6b9faf7 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0;ARA:13230040|376014|7416014|82310400026|36860700013|1800799024; X-Microsoft-Antispam-Message-Info: 7/5co3YfiFIiHlr7VIKZXaf13Pk20CqvzPtsNpP2c3cPpdfWqRxNbTwowGyyn31cC64zJIcgim73jIn1pUE/znzPGgF+XSt93/aozXaVCUhm4veXRPsYKFiFhHvSNi7MPNq4DaUoTPged6R7NU58kAH8OCClUhcP/nqMLLyLklqZ0XAIHtpA7hHBbSJ2AXjZd4sIXILkk5b/s+W4FkKfQPJ8hAKyAkWrDlhFpiH9NRbG4lgIMRNMUo+Qd7EqjVFFb32qoD1BPWxSosCzLyWI3oHF+aS9RHqIofrXIsocmN9exl/AkorsQBgnb/Jr91Yn9tUWPwUGY1NLUc8OkZgR6fxcUiq2x3/noJDi1TA3dd5wccxm3bpAQbGJwqSG7LEq0DKqSKu9LUWip0t16aGBFj9ZUtxXJR5s1/Y6pswHqkbq8N9rf1x11YvWBiyq47erkMZTCRxjiq3FfDGB2iIBYlT71sck0CAQu2pOd+MOEs0K2CTORk2w786Tcq2pdX4DnKsLVF50o4LBzwsrQkx2Q8WVTnPwCczFlOLwdct1htBCOAg3rnsRZyekGNwjBYkVlv0jLf6VkMCH/7/IjIJixHh3WA9EAxAvy5Afl0t8OBCNCXRwNJc9Qwtu4vBpVvCblwC25qGMaHFC57qyPosdwn1Uzl5LBgfUn6MljNgMO36Xv7Ks6ubAhdKmdou5Q2nY3PL8c3HU/JpKs9A0DFw1jc1+Uz+UiDjpuWrTxzgqElzb67IUPGw2k0z/O/ic+L3YstAyG6e7Hla++nJ9jkezN0E7BsHwJMKMerIUU2Ioe9gmxlrcP7wbuw5CN7fKb62S708QqiB7ZA3ssrl1ZdQ7kvi2EeUudbCj8Xb6TOIQl+FMcIWI0fDnqVyG4E0UAHw4wTc8LdwsWuNsxVB88i1fmiCBn5vcr2s+d3xrliTEG6RSal+zRFGxVayvgLdp9D1ealDJqDqzjju8CnF46LINryPsNlRmY/P2y0GBPsvfpXjuDPzOOjGkLse0GE3aHTeXiWD620kYB+ue+z07DF4blL0+iCcXrmer1gmMcOZl3RCZiebadBE3CVS4v7XuY+iTX3Ig4z3YIEXF39oeNXSdDDEzigtjzHzCUOBYcs8afRtOm3/w6IMQDnEK+rLG/5HlRWsr4z9Ob0ex2MROsBYvX/x6fcopmYQXuk91t7gwxch8aRJIOmoBjaWnlJdNCFhHLMk0qsYCbRkaQ5ImjFFKMSeWfEhp+PgUBLchSOFrRWRpeJubYSUJMZofR0Let/pzuIYWgrVf5PZEJrxQbVWrj7W5b5nsz3v4c7T6yUGpygFcEOIZ9ZrC2zDVx2qyzCIhkoNUdespOLu+DuTGvDIm6fWWPlmVzGQZWwcFdvjDJU6jfDu1KitiO0qWXC2TS6lyNfeE1erM5UZZQOn5RM1oVtkEuMSvU+kDtTpgGnqoENkSAemLlhFuQ0nk89sXrGom X-Forefront-Antispam-Report: CIP:216.228.118.232;CTRY:US;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:mail.nvidia.com;PTR:dc7edge1.nvidia.com;CAT:NONE;SFS:(13230040)(376014)(7416014)(82310400026)(36860700013)(1800799024);DIR:OUT;SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 27 Aug 2024 17:02:06.0134 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 03b50a8f-8dda-4362-7eae-08dcc6b9faf7 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a;Ip=[216.228.118.232];Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SN1PEPF000397AE.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SA0PR12MB4381 X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240827_100213_955518_ACAB2F15 X-CRM114-Status: GOOD ( 22.85 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org Add an arm_smmu_viommu_cache_invalidate() function for user space to issue cache invalidation commands via viommu. The viommu invalidation takes the same native format of a 128-bit command, as the hwpt invalidation. Thus, reuse the same driver data structure, but make it wider to accept CMDQ_OP_ATC_INV and CMDQ_OP_CFGI_CD{_ALL}. Scan the commands against the supported ist and fix the VMIDs and SIDs. Signed-off-by: Nicolin Chen --- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 76 ++++++++++++++++++++- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h | 1 + include/uapi/linux/iommufd.h | 7 +- 3 files changed, 80 insertions(+), 4 deletions(-) diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c index a2af693bc7b2..bddbb98da414 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c @@ -3267,15 +3267,32 @@ static void arm_smmu_domain_nested_free(struct iommu_domain *domain) kfree(container_of(domain, struct arm_smmu_nested_domain, domain)); } +static int arm_smmu_convert_viommu_vdev_id(struct iommufd_viommu *viommu, + u32 vdev_id, u32 *sid) +{ + struct arm_smmu_master *master; + struct device *dev; + + dev = iommufd_viommu_find_device(viommu, vdev_id); + if (!dev) + return -EIO; + master = dev_iommu_priv_get(dev); + + if (sid) + *sid = master->streams[0].id; + return 0; +} + /* * Convert, in place, the raw invalidation command into an internal format that * can be passed to arm_smmu_cmdq_issue_cmdlist(). Internally commands are * stored in CPU endian. * - * Enforce the VMID on the command. + * Enforce the VMID or the SID on the command. */ static int arm_smmu_convert_user_cmd(struct arm_smmu_domain *s2_parent, + struct iommufd_viommu *viommu, struct iommu_hwpt_arm_smmuv3_invalidate *cmd) { u16 vmid = s2_parent->s2_cfg.vmid; @@ -3297,13 +3314,46 @@ arm_smmu_convert_user_cmd(struct arm_smmu_domain *s2_parent, cmd->cmd[0] &= ~CMDQ_TLBI_0_VMID; cmd->cmd[0] |= FIELD_PREP(CMDQ_TLBI_0_VMID, vmid); break; + case CMDQ_OP_ATC_INV: + case CMDQ_OP_CFGI_CD: + case CMDQ_OP_CFGI_CD_ALL: + if (viommu) { + u32 sid, vsid = FIELD_GET(CMDQ_CFGI_0_SID, cmd->cmd[0]); + + if (arm_smmu_convert_viommu_vdev_id(viommu, vsid, &sid)) + return -EIO; + cmd->cmd[0] &= ~CMDQ_CFGI_0_SID; + cmd->cmd[0] |= FIELD_PREP(CMDQ_CFGI_0_SID, sid); + break; + } + fallthrough; default: return -EIO; } return 0; } +static inline bool +arm_smmu_must_lock_vdev_id(struct iommu_hwpt_arm_smmuv3_invalidate *cmds, + unsigned int num_cmds) +{ + int i; + + for (i = 0; i < num_cmds; i++) { + switch (cmds[i].cmd[0] & CMDQ_0_OP) { + case CMDQ_OP_ATC_INV: + case CMDQ_OP_CFGI_CD: + case CMDQ_OP_CFGI_CD_ALL: + return true; + default: + continue; + } + } + return false; +} + static int __arm_smmu_cache_invalidate_user(struct arm_smmu_domain *s2_parent, + struct iommufd_viommu *viommu, struct iommu_user_data_array *array) { struct arm_smmu_device *smmu = s2_parent->smmu; @@ -3313,6 +3363,7 @@ static int __arm_smmu_cache_invalidate_user(struct arm_smmu_domain *s2_parent, struct iommu_hwpt_arm_smmuv3_invalidate *end; struct arm_smmu_cmdq_ent ent; struct arm_smmu_cmdq *cmdq; + bool must_lock = false; int ret; /* A zero-length array is allowed to validate the array type */ @@ -3335,12 +3386,17 @@ static int __arm_smmu_cache_invalidate_user(struct arm_smmu_domain *s2_parent, if (ret) goto out; + if (viommu) + must_lock = arm_smmu_must_lock_vdev_id(cmds, array->entry_num); + if (must_lock) + iommufd_viommu_lock_vdev_id(viommu); + ent.opcode = cmds->cmd[0] & CMDQ_0_OP; cmdq = arm_smmu_get_cmdq(smmu, &ent); last_batch = cmds; while (cur != end) { - ret = arm_smmu_convert_user_cmd(s2_parent, cur); + ret = arm_smmu_convert_user_cmd(s2_parent, viommu, cur); if (ret) goto out; @@ -3358,6 +3414,8 @@ static int __arm_smmu_cache_invalidate_user(struct arm_smmu_domain *s2_parent, last_batch = cur; } out: + if (must_lock) + iommufd_viommu_unlock_vdev_id(viommu); array->entry_num = cur - cmds; kfree(cmds); return ret; @@ -3370,7 +3428,7 @@ static int arm_smmu_cache_invalidate_user(struct iommu_domain *domain, container_of(domain, struct arm_smmu_nested_domain, domain); return __arm_smmu_cache_invalidate_user( - nested_domain->s2_parent, array); + nested_domain->s2_parent, NULL, array); } static const struct iommu_domain_ops arm_smmu_nested_ops = { @@ -3863,6 +3921,15 @@ static int arm_smmu_def_domain_type(struct device *dev) return 0; } +static int arm_smmu_viommu_cache_invalidate(struct iommufd_viommu *viommu, + struct iommu_user_data_array *array) +{ + struct iommu_domain *domain = iommufd_viommu_to_parent_domain(viommu); + + return __arm_smmu_cache_invalidate_user( + to_smmu_domain(domain), viommu, array); +} + static struct iommu_ops arm_smmu_ops = { .identity_domain = &arm_smmu_identity_domain, .blocked_domain = &arm_smmu_blocked_domain, @@ -3893,6 +3960,9 @@ static struct iommu_ops arm_smmu_ops = { .iotlb_sync = arm_smmu_iotlb_sync, .iova_to_phys = arm_smmu_iova_to_phys, .free = arm_smmu_domain_free_paging, + .default_viommu_ops = &(const struct iommufd_viommu_ops) { + .cache_invalidate = arm_smmu_viommu_cache_invalidate, + } } }; diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h index 6c8ae70c90fe..e7f6e9194a9e 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h @@ -10,6 +10,7 @@ #include #include +#include #include #include #include diff --git a/include/uapi/linux/iommufd.h b/include/uapi/linux/iommufd.h index f3aefb11f681..0d973486b604 100644 --- a/include/uapi/linux/iommufd.h +++ b/include/uapi/linux/iommufd.h @@ -734,13 +734,18 @@ struct iommu_hwpt_vtd_s1_invalidate { * @cmd: 128-bit cache invalidation command that runs in SMMU CMDQ. * Must be little-endian. * - * Supported command list: + * Supported command list when passing in a HWPT via @hwpt_id: * CMDQ_OP_TLBI_NSNH_ALL * CMDQ_OP_TLBI_NH_VA * CMDQ_OP_TLBI_NH_VAA * CMDQ_OP_TLBI_NH_ALL * CMDQ_OP_TLBI_NH_ASID * + * Additional to the list above, when passing in a VIOMMU via @hwpt_id: + * CMDQ_OP_ATC_INV + * CMDQ_OP_CFGI_CD + * CMDQ_OP_CFGI_CD_ALL + * * -EIO will be returned if the command is not supported. */ struct iommu_hwpt_arm_smmuv3_invalidate {