@@ -127,4 +127,21 @@ struct iommu_hwpt_selftest {
__u32 iotlb;
};
+/**
+ * struct iommu_hwpt_invalidate_selftest
+ *
+ * @flags: invalidate flags
+ * @iotlb_id: invalidate iotlb entry index
+ *
+ * If IOMMU_TEST_INVALIDATE_ALL is set in @flags, @iotlb_id will be ignored
+ */
+struct iommu_hwpt_invalidate_selftest {
+#define IOMMU_TEST_INVALIDATE_ALL (1ULL << 0)
+ __u32 flags;
+ __u32 iotlb_id;
+};
+
+#define IOMMU_TEST_INVALIDATE_ERR_FETCH 0xdeadbeee
+#define IOMMU_TEST_INVALIDATE_ERR_REQ 0xdeadbeef
+
#endif
@@ -428,9 +428,53 @@ static const struct iommu_ops mock_ops = {
},
};
+static int
+mock_domain_cache_invalidate_user(struct iommu_domain *domain,
+ struct iommu_user_data_array *array,
+ u32 *error_code)
+{
+ const size_t min_len =
+ offsetofend(struct iommu_hwpt_invalidate_selftest, iotlb_id);
+ struct mock_iommu_domain *mock =
+ container_of(domain, struct mock_iommu_domain, domain);
+ struct iommu_hwpt_invalidate_selftest inv;
+ int rc = 0;
+ int i, j;
+
+ if (domain->type != IOMMU_DOMAIN_NESTED || !mock->nested)
+ return -EINVAL;
+
+ for (i = 0; i < array->entry_num; i++) {
+ rc = iommu_copy_user_data_from_array(&inv, array,
+ i, sizeof(inv), min_len);
+ if (rc) {
+ *error_code = IOMMU_TEST_INVALIDATE_ERR_FETCH;
+ goto err;
+ }
+ /* Invalidate all mock iotlb entries and ignore iotlb_id */
+ if (inv.flags & IOMMU_TEST_INVALIDATE_ALL) {
+ for (j = 0; j < MOCK_NESTED_DOMAIN_IOTLB_NUM; j++)
+ mock->iotlb[j] = 0;
+ continue;
+ }
+ /* Treat out-of-boundry iotlb_id as a request error */
+ if (inv.iotlb_id > MOCK_NESTED_DOMAIN_IOTLB_ID_MAX) {
+ *error_code = IOMMU_TEST_INVALIDATE_ERR_REQ;
+ rc = -EINVAL;
+ goto err;
+ }
+ mock->iotlb[inv.iotlb_id] = 0;
+ }
+
+err:
+ array->entry_num = i;
+ return rc;
+}
+
static struct iommu_domain_ops domain_nested_ops = {
.free = mock_domain_free,
.attach_dev = mock_domain_nop_attach,
+ .cache_invalidate_user = mock_domain_cache_invalidate_user,
};
static inline struct iommufd_hw_pagetable *