From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id AAA11C2BA1B for ; Sun, 5 Apr 2020 08:33:59 +0000 (UTC) Received: from fraxinus.osuosl.org (smtp4.osuosl.org [140.211.166.137]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 8497720659 for ; Sun, 5 Apr 2020 08:33:59 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8497720659 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linux.intel.com Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=iommu-bounces@lists.linux-foundation.org Received: from localhost (localhost [127.0.0.1]) by fraxinus.osuosl.org (Postfix) with ESMTP id 7A8DC8539A; Sun, 5 Apr 2020 08:33:59 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from fraxinus.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fMGjSm3hxUtb; Sun, 5 Apr 2020 08:33:58 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by fraxinus.osuosl.org (Postfix) with ESMTP id D9631853E5; Sun, 5 Apr 2020 08:33:58 +0000 (UTC) Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id D4A2AC1AE2; Sun, 5 Apr 2020 08:33:58 +0000 (UTC) Received: from silver.osuosl.org (smtp3.osuosl.org [140.211.166.136]) by lists.linuxfoundation.org (Postfix) with ESMTP id 1A523C0177 for ; Sun, 5 Apr 2020 08:33:58 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by silver.osuosl.org (Postfix) with ESMTP id F39B620133 for ; Sun, 5 Apr 2020 08:33:57 +0000 (UTC) X-Virus-Scanned: amavisd-new at osuosl.org Received: from silver.osuosl.org ([127.0.0.1]) by localhost (.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WL5zyKVSsf5P for ; Sun, 5 Apr 2020 08:33:57 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.7.6 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by silver.osuosl.org (Postfix) with ESMTPS id E255820242 for ; Sun, 5 Apr 2020 08:33:56 +0000 (UTC) IronPort-SDR: EpRLNMNtTQSZDoJ9DvCjir7vehcPqzHVOfddSTKuJXtjItVLU5tElUuEoTY0+oYO0XURgF9PHf oSg5JvyAJF+A== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 05 Apr 2020 01:33:56 -0700 IronPort-SDR: uNqdq9x5oTG4wmoHILLeUrjrJNuosLwAGR5Xc+SEd8Bcfbb+9BO1V+TXWPpysQMIR/Mgn/xDga ntbghLDjaWOg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,347,1580803200"; d="scan'208";a="397179314" Received: from allen-box.sh.intel.com ([10.239.159.139]) by orsmga004.jf.intel.com with ESMTP; 05 Apr 2020 01:33:54 -0700 From: Lu Baolu To: Joerg Roedel Subject: [PATCH 02/19] iommu: Configure default domain with def_domain_type Date: Sun, 5 Apr 2020 16:30:36 +0800 Message-Id: <20200405083053.17865-3-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200405083053.17865-1-baolu.lu@linux.intel.com> References: <20200405083053.17865-1-baolu.lu@linux.intel.com> Cc: iommu@lists.linux-foundation.org X-BeenThere: iommu@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Development issues for Linux IOMMU support List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: iommu-bounces@lists.linux-foundation.org Sender: "iommu" With the def_domain_type introduced, iommu default domain framework is now able to determine a proper default domain for a group. Let's use this to configure a group's default domain. If unlikely a device requires a special default domain type other than that in use, iommu probe procedure will either allocate a new domain according to the specified domain type, or (if the group has other devices sitting in it) change the default domain. The vendor iommu driver which exposes the def_domain_type callback should guarantee that there're no multiple devices in a same group requires differnt types of default domain. Signed-off-by: Sai Praneeth Prakhya Signed-off-by: Lu Baolu --- drivers/iommu/iommu.c | 103 ++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 100 insertions(+), 3 deletions(-) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 3e3528436e0b..8db670196706 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1361,6 +1361,89 @@ struct iommu_group *fsl_mc_device_group(struct device *dev) } EXPORT_SYMBOL_GPL(fsl_mc_device_group); +static int pre_def_domain_change(struct device *dev, void *data) +{ + struct iommu_group *group = data; + + if (device_is_bound(dev)) + return -EINVAL; + + return iommu_group_create_direct_mappings(group, dev); +} + +static int post_def_domain_change(struct device *dev, void *data) +{ + struct iommu_domain *domain = data; + + return domain->ops->add_device(dev); +} + +/** + * Changes the default domain of a group + * + * @group: The group for which the default domain should be changed + * @type: The new default domain type + * + * The caller should hold the group->mutex before call into this function. + * Returns 0 on success and error code on failure. + */ +static int iommu_group_change_def_domain(struct iommu_group *group, int type) +{ + struct iommu_domain *new, *old; + const struct iommu_ops *ops; + int ret; + + if ((type != IOMMU_DOMAIN_IDENTITY && type != IOMMU_DOMAIN_DMA) || + !group->default_domain || type == group->default_domain->type || + !group->default_domain->ops) + return -EINVAL; + + if (group->domain != group->default_domain) + return -EBUSY; + + iommu_group_ref_get(group); + old = group->default_domain; + ops = group->default_domain->ops; + + /* Allocate a new domain of requested type. */ + new = ops->domain_alloc(type); + if (!new) { + iommu_group_put(group); + return -ENOMEM; + } + new->type = type; + new->ops = ops; + new->pgsize_bitmap = old->pgsize_bitmap; + group->default_domain = new; + group->domain = new; + + ret = __iommu_group_for_each_dev(group, group, pre_def_domain_change); + if (ret) + goto err_out; + + ret = __iommu_attach_group(new, group); + if (ret) + goto err_out; + + ret = __iommu_group_for_each_dev(group, new, post_def_domain_change); + if (ret) + goto err_out; + + iommu_domain_free(old); + iommu_group_put(group); + + return 0; + +err_out: + group->default_domain = old; + group->domain = old; + __iommu_attach_group(old, group); + iommu_domain_free(new); + iommu_group_put(group); + + return ret; +} + /** * iommu_group_get_for_dev - Find or create the IOMMU group for a device * @dev: target device @@ -1375,6 +1458,7 @@ struct iommu_group *iommu_group_get_for_dev(struct device *dev) { const struct iommu_ops *ops = dev->bus->iommu_ops; struct iommu_group *group; + int dev_def_type = 0; int ret; group = iommu_group_get(dev); @@ -1391,20 +1475,24 @@ struct iommu_group *iommu_group_get_for_dev(struct device *dev) if (IS_ERR(group)) return group; + if (ops->def_domain_type) + dev_def_type = ops->def_domain_type(dev); + /* * Try to allocate a default domain - needs support from the * IOMMU driver. */ if (!group->default_domain) { struct iommu_domain *dom; + int type = dev_def_type ? : iommu_def_domain_type; - dom = __iommu_domain_alloc(dev->bus, iommu_def_domain_type); - if (!dom && iommu_def_domain_type != IOMMU_DOMAIN_DMA) { + dom = __iommu_domain_alloc(dev->bus, type); + if (!dom && type != IOMMU_DOMAIN_DMA) { dom = __iommu_domain_alloc(dev->bus, IOMMU_DOMAIN_DMA); if (dom) { dev_warn(dev, "failed to allocate default IOMMU domain of type %u; falling back to IOMMU_DOMAIN_DMA", - iommu_def_domain_type); + type); } } @@ -1418,6 +1506,15 @@ struct iommu_group *iommu_group_get_for_dev(struct device *dev) DOMAIN_ATTR_DMA_USE_FLUSH_QUEUE, &attr); } + } else if (dev_def_type && + dev_def_type != group->default_domain->type) { + mutex_lock(&group->mutex); + ret = iommu_group_change_def_domain(group, dev_def_type); + mutex_unlock(&group->mutex); + if (ret) { + iommu_group_put(group); + return ERR_PTR(ret); + } } ret = iommu_group_add_device(group, dev); -- 2.17.1 _______________________________________________ iommu mailing list iommu@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/iommu