From nobody Sun Feb 8 02:29:32 2026 Received: from mail-wm1-f74.google.com (mail-wm1-f74.google.com [209.85.128.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 595DB237FE2 for ; Thu, 12 Dec 2024 18:05:45 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.128.74 ARC-Seal: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734026747; cv=none; b=a1nsf4RQLn+LW+hVjB1hm/7f84vQ4KEUcq67DgEWX6I1AAfijE+30zhSGWPDYwhXP1FpflLLncbIGl9sMg47z2I6DxUbzlfbqLSSIulfaY3PzLHVBfhApWPZyfMGaetuIdnD8Rrw6o+pYg9rNJU3ctIWbeZXxynbCVQTEZdeLQI= ARC-Message-Signature: i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1734026747; c=relaxed/simple; bh=A77HVtgiNiiuQUM+4fbCpZhMG/L5Q9L2AOqjPUwbohA=; h=Date:In-Reply-To:Mime-Version:References:Message-ID:Subject:From: To:Cc:Content-Type; b=AfIvVAUNWlrPX7rNKRRn5YNqGEJb0KDAxG119MJ5pdLQfC2l7Q3czaO6nbBdXeL20uN3E65ksvf7i+j1bc1lY9I+c0VVyBvH/NFkfma1CKZTN38tjRnQNOsdKnChdS5bcUZudp/PXpgz/fJVq0dsIXkq19A9smmqI+t7Sxjsw0E= ARC-Authentication-Results: i=1; smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com; spf=pass smtp.mailfrom=flex--smostafa.bounces.google.com; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b=STTPQ6+m; arc=none smtp.client-ip=209.85.128.74 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=reject dis=none) header.from=google.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=flex--smostafa.bounces.google.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=google.com header.i=@google.com header.b="STTPQ6+m" Received: by mail-wm1-f74.google.com with SMTP id 5b1f17b1804b1-4361fc2b2d6so5535045e9.3 for ; Thu, 12 Dec 2024 10:05:45 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20230601; t=1734026744; x=1734631544; darn=vger.kernel.org; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=JE/i5lAaPb/dJbCdJrBXAH1qN4sLI6tJdn5DSSo5Z6Q=; b=STTPQ6+mhQywRqrJxoWuJrpbJT22gNeqIdvQeVxUC7xZQOXFv2cWkqkSGcVPFjJhBd kxO6ec3Q//zRpGYliX0/xrVZ6HCoBKnlynUJD60Xp23qn++VXG+zSBfbXDKVN41VaZ4u yDjB474f51dZJ0L02ndsodUnYJWn6pq95jcXOB3QTOD7nULh5WuXrA7C0ORYg+nc35zV zOW/lKrkLOA6fToFSYTJ1reTuRm9jtp0J1PhFfci0OY+TVoMsD3JZaouZcMiUXyuLz+R 2uM8anJgwzKDo3kVQAE0tZ27Rii+RaA1lNoPDO86FPv+g9MtILKcOg234/KwpH7VOfQq VOvQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1734026744; x=1734631544; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=JE/i5lAaPb/dJbCdJrBXAH1qN4sLI6tJdn5DSSo5Z6Q=; b=vD3igx+3S/LwXPcEso9+b7klXNZhCGJR+4N/FlIX43fIdK10OG1mrBnG43/zXZK3Ab he0PYqxkvcvmpz2W+NsUVMJ3WuxuTNpaw6tD9hZYM7ZkNHjC536d5WKf45KbpHgnLW+j WG4dMTdutyYZlqo838FLb+MQ9fzqrJrzcD2WBu9Ynf4b657O7z0DLYHNbMP2QtEuy8+z dnzI3gwcaP9LZXyCncrtFvUjwWJQ1FEN1ORPfBgAztTcG7jRMn9ULfEullyMGh8mgzas Wgqkho20aAzaV1bJIwi5pEhjGFiDVCmPJGoKQWkJdeKbSnT4Ex7Sn6avBNWOblkQFzIf btKg== X-Forwarded-Encrypted: i=1; AJvYcCWUVlRj+YfcSoeN3ntu7+b5KQOCQrrOR+K/+vXejWdwt7/zEDIzrHXCFiIHOgfZWJfiYm01JWu+UZ1F2ww=@vger.kernel.org X-Gm-Message-State: AOJu0YxAYZmI/hOz7SNrtdJcSZUybV34ahPMOBUaACwde0bMInKrUjK+ ASOxqhUTHH3YB7QZZhYLB/sbYi5N7W7RtymEXJJRzL/MSlgT0fPzvjtRuB32aW8dlzVOOfA2WI1 4yZ+5Wbo9Dw== X-Google-Smtp-Source: AGHT+IFLzVaDnxOQQpqmcBPGMzPT4gfF0J87Ucqw5+xEyz4q3jDg+AjzzwnSPOPsWSAVi+g32NOxN+jbO3aNIw== X-Received: from wmbd18.prod.google.com ([2002:a05:600c:58d2:b0:434:a98d:6a1c]) (user=smostafa job=prod-delivery.src-stubby-dispatcher) by 2002:a05:600c:5029:b0:431:44fe:fd9a with SMTP id 5b1f17b1804b1-4361c3e010amr64441725e9.19.1734026744100; Thu, 12 Dec 2024 10:05:44 -0800 (PST) Date: Thu, 12 Dec 2024 18:03:53 +0000 In-Reply-To: <20241212180423.1578358-1-smostafa@google.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: Mime-Version: 1.0 References: <20241212180423.1578358-1-smostafa@google.com> X-Mailer: git-send-email 2.47.1.613.gc27f4b7a9f-goog Message-ID: <20241212180423.1578358-30-smostafa@google.com> Subject: [RFC PATCH v2 29/58] KVM: arm64: smmu-v3: Setup event queue From: Mostafa Saleh To: iommu@lists.linux.dev, kvmarm@lists.linux.dev, linux-kernel@vger.kernel.org, linux-arm-kernel@lists.infradead.org Cc: catalin.marinas@arm.com, will@kernel.org, maz@kernel.org, oliver.upton@linux.dev, joey.gouly@arm.com, suzuki.poulose@arm.com, yuzenghui@huawei.com, robdclark@gmail.com, joro@8bytes.org, robin.murphy@arm.com, jean-philippe@linaro.org, jgg@ziepe.ca, nicolinc@nvidia.com, vdonnefort@google.com, qperret@google.com, tabba@google.com, danielmentz@google.com, tzukui@google.com, Mostafa Saleh Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset="utf-8" The host can use the event queue for debuging, and unlike the command queue, it would be managed by the kernel. However, it must set in a shared state so it can't be donated to the hypervisor later. This relies on the ARM_SMMU_EVTQ_BASE can't be changed after de-privilege. Signed-off-by: Mostafa Saleh --- arch/arm64/kvm/hyp/nvhe/iommu/arm-smmu-v3.c | 39 +++++++++++++++++++++ 1 file changed, 39 insertions(+) diff --git a/arch/arm64/kvm/hyp/nvhe/iommu/arm-smmu-v3.c b/arch/arm64/kvm/h= yp/nvhe/iommu/arm-smmu-v3.c index 43d2ce7828c1..5020f74421ad 100644 --- a/arch/arm64/kvm/hyp/nvhe/iommu/arm-smmu-v3.c +++ b/arch/arm64/kvm/hyp/nvhe/iommu/arm-smmu-v3.c @@ -342,6 +342,41 @@ static int smmu_init_cmdq(struct hyp_arm_smmu_v3_devic= e *smmu) return 0; } =20 +/* + * Event q support is optional and managed by the kernel, + * However, it must set in a shared state so it can't be donated + * to the hypervisor later. + * This relies on the ARM_SMMU_EVTQ_BASE can't be changed after + * de-privilege. + */ +static int smmu_init_evtq(struct hyp_arm_smmu_v3_device *smmu) +{ + u64 evtq_base, evtq_pfn; + size_t evtq_nr_entries, evtq_size, evtq_nr_pages; + size_t i; + int ret; + + evtq_base =3D readq_relaxed(smmu->base + ARM_SMMU_EVTQ_BASE); + if (!evtq_base) + return 0; + + if (evtq_base & ~(Q_BASE_RWA | Q_BASE_ADDR_MASK | Q_BASE_LOG2SIZE)) + return -EINVAL; + + evtq_nr_entries =3D 1 << (evtq_base & Q_BASE_LOG2SIZE); + evtq_size =3D evtq_nr_entries * EVTQ_ENT_DWORDS * 8; + evtq_nr_pages =3D PAGE_ALIGN(evtq_size) >> PAGE_SHIFT; + + evtq_pfn =3D PAGE_ALIGN(evtq_base & Q_BASE_ADDR_MASK) >> PAGE_SHIFT; + + for (i =3D 0 ; i < evtq_nr_pages ; ++i) { + ret =3D __pkvm_host_share_hyp(evtq_pfn + i); + if (ret) + return ret; + } + return 0; +} + static int smmu_init_strtab(struct hyp_arm_smmu_v3_device *smmu) { int ret; @@ -429,6 +464,10 @@ static int smmu_init_device(struct hyp_arm_smmu_v3_dev= ice *smmu) if (ret) return ret; =20 + ret =3D smmu_init_evtq(smmu); + if (ret) + return ret; + ret =3D smmu_init_strtab(smmu); if (ret) return ret; --=20 2.47.0.338.g60cca15819-goog