From patchwork Thu May 13 13:45:44 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Shameerali Kolothum Thodi X-Patchwork-Id: 437328 Delivered-To: patch@linaro.org Received: by 2002:a02:c901:0:0:0:0:0 with SMTP id t1csp345433jao; Thu, 13 May 2021 06:46:48 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyXxrwECZ9P9AoKF4z62WSll+822mdRlS9cA1V/AH+4UvqOAwMkvo3cVNjx7tfyaWZ29O8V X-Received: by 2002:a05:6e02:190a:: with SMTP id w10mr35477170ilu.1.1620913607946; Thu, 13 May 2021 06:46:47 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1620913607; cv=none; d=google.com; s=arc-20160816; b=z2u5BGZA5pdUG1qUcOWeRImlrEGVaafHCwOrejV33+rAYmCM+NMyfQb5tt5XwEAg6z ENOrw8vYGuGYBJgUAKz5apHwpMy7YLbugO42i+s0BoVAhh197fTwKfGQ/7O7peyuGpKt PF+phOEJRF2IGugRrvngPVQXzc3lznMC9eViAHF0YBGs57ia3XWcoUvZD46Cgw/CUoHo nS+88BsoPxz2CIY0DHc20JYqNhLlrH3vCg8+xUdzdlUNRIL9L7mzw3HRFEtXNhwQQbVb kaZxOsKTgyrYmqI1p6QOCU2pAmhhHhyvFpzD59gdaSKJVEbB7b9WfLki/RLOzW5yiihg CMIA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:mime-version:references:in-reply-to:message-id :date:subject:cc:to:from; bh=LhC7FEfFFueMlo0Oj0z8A9hkVQlZ5ToqeydOvKY+6mU=; b=ja/ka4yGACiy/tNrPnrMOOdbFIqkY3fcD6XMwwNGGR2ia20ckGvJaSd9rQEhL30opp 5hJ0d+9kUlUFxmj7vpEECwB64G8bF4G91odrBXwQxNGgOvrZCRnWAbnrgeNrUCPSe/JB Vh49rJfUamhkBSL8whnUPN5wHuSbAsD/6qP+BSd13gZRyQP32B5ia/wHKtHZfWuVs9b8 V+7rwGWTAphNV3Cwr3ga068QPGbM6UYrtlkFe+S9wGn3kHefXD2Ejmd5PMX1LhKSNvaQ 59YK6q3NmU4P+S72tqoQLfMQexdwhKasWULOP5BmRh5HrymOyXvoz5TRRDTAKWlCzorC JlCg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-acpi-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-acpi-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u10si3346494ilv.5.2021.05.13.06.46.47; Thu, 13 May 2021 06:46:47 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-acpi-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-acpi-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-acpi-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234092AbhEMNr4 (ORCPT + 4 others); Thu, 13 May 2021 09:47:56 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:2723 "EHLO szxga04-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234155AbhEMNru (ORCPT ); Thu, 13 May 2021 09:47:50 -0400 Received: from DGGEMS406-HUB.china.huawei.com (unknown [172.30.72.60]) by szxga04-in.huawei.com (SkyGuard) with ESMTP id 4FgtD86xGHz16Njp; Thu, 13 May 2021 21:43:52 +0800 (CST) Received: from A2006125610.china.huawei.com (10.47.81.63) by DGGEMS406-HUB.china.huawei.com (10.3.19.206) with Microsoft SMTP Server id 14.3.498.0; Thu, 13 May 2021 21:46:27 +0800 From: Shameer Kolothum To: , , CC: , , , , , , , , , , Subject: [PATCH v4 2/8] iommu/dma: Introduce generic helper to retrieve RMR info Date: Thu, 13 May 2021 14:45:44 +0100 Message-ID: <20210513134550.2117-3-shameerali.kolothum.thodi@huawei.com> X-Mailer: git-send-email 2.12.0.windows.1 In-Reply-To: <20210513134550.2117-1-shameerali.kolothum.thodi@huawei.com> References: <20210513134550.2117-1-shameerali.kolothum.thodi@huawei.com> MIME-Version: 1.0 X-Originating-IP: [10.47.81.63] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-acpi@vger.kernel.org Reserved Memory Regions(RMR) associated with an IOMMU can be described through ACPI IORT tables in systems with devices that require a unity mapping or bypass for those regions. Introduce a generic interface so that IOMMU drivers can retrieve and set up necessary mappings. Signed-off-by: Shameer Kolothum --- drivers/iommu/dma-iommu.c | 33 +++++++++++++++++++++++++++++++++ include/linux/dma-iommu.h | 10 ++++++++++ include/linux/iommu.h | 19 +++++++++++++++++++ 3 files changed, 62 insertions(+) -- 2.17.1 diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 7bcdd1205535..674bd8815159 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -193,6 +193,39 @@ void iommu_dma_get_resv_regions(struct device *dev, struct list_head *list) } EXPORT_SYMBOL(iommu_dma_get_resv_regions); +/** + * iommu_dma_get_rmrs - Retrieve Reserved Memory Regions(RMRs) associated + * with a given IOMMU + * @iommu_fwnode: fwnode associated with IOMMU + * @list: RMR list to be populated + * + */ +int iommu_dma_get_rmrs(struct fwnode_handle *iommu_fwnode, + struct list_head *list) +{ + return -EINVAL; +} +EXPORT_SYMBOL(iommu_dma_get_rmrs); + +struct iommu_rmr *iommu_dma_alloc_rmr(u64 base, u64 length, u32 sid, + u32 flags) +{ + struct iommu_rmr *rmr; + + rmr = kzalloc(sizeof(*rmr), GFP_KERNEL); + if (!rmr) + return NULL; + + INIT_LIST_HEAD(&rmr->list); + rmr->base_address = base; + rmr->length = length; + rmr->sid = sid; + rmr->flags = flags; + + return rmr; +} +EXPORT_SYMBOL(iommu_dma_alloc_rmr); + static int cookie_init_hw_msi_region(struct iommu_dma_cookie *cookie, phys_addr_t start, phys_addr_t end) { diff --git a/include/linux/dma-iommu.h b/include/linux/dma-iommu.h index 6e75a2d689b4..319f332c279f 100644 --- a/include/linux/dma-iommu.h +++ b/include/linux/dma-iommu.h @@ -42,12 +42,17 @@ void iommu_dma_free_cpu_cached_iovas(unsigned int cpu, extern bool iommu_dma_forcedac; +int iommu_dma_get_rmrs(struct fwnode_handle *iommu, struct list_head *list); +struct iommu_rmr *iommu_dma_alloc_rmr(u64 base, u64 length, u32 sid, u32 flags); + #else /* CONFIG_IOMMU_DMA */ struct iommu_domain; struct msi_desc; struct msi_msg; struct device; +struct fwnode_handle; +struct iommu_rmr; static inline void iommu_setup_dma_ops(struct device *dev, u64 dma_base, u64 size) @@ -83,5 +88,10 @@ static inline void iommu_dma_get_resv_regions(struct device *dev, struct list_he { } +int iommu_dma_get_rmrs(struct fwnode_handle *iommu, struct list_head *list) +{ + return -ENODEV; +} + #endif /* CONFIG_IOMMU_DMA */ #endif /* __DMA_IOMMU_H */ diff --git a/include/linux/iommu.h b/include/linux/iommu.h index 32d448050bf7..73cd2831cb45 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -555,6 +555,25 @@ struct iommu_sva { struct device *dev; }; +/** + * struct iommu_rmr - Reserved Memory Region details per IOMMU + * @list: Linked list pointers to hold RMR region info + * @base_address: base address of Reserved Memory Region + * @length: length of memory region + * @sid: associated stream id + * @flags: flags that apply to the RMR node + */ +struct iommu_rmr { + struct list_head list; + phys_addr_t base_address; + u64 length; + u32 sid; + u32 flags; +}; + +/* RMR Remap permitted */ +#define IOMMU_RMR_REMAP_PERMITTED (1 << 0) + int iommu_fwspec_init(struct device *dev, struct fwnode_handle *iommu_fwnode, const struct iommu_ops *ops); void iommu_fwspec_free(struct device *dev);