From patchwork Mon Apr 4 08:06:58 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Auger Eric X-Patchwork-Id: 64953 Delivered-To: patches@linaro.org Received: by 10.112.199.169 with SMTP id jl9csp1047204lbc; Mon, 4 Apr 2016 01:07:20 -0700 (PDT) X-Received: by 10.25.154.193 with SMTP id c184mr1878885lfe.69.1459757240058; Mon, 04 Apr 2016 01:07:20 -0700 (PDT) Return-Path: Received: from mail-lf0-x22a.google.com (mail-lf0-x22a.google.com. [2a00:1450:4010:c07::22a]) by mx.google.com with ESMTPS id r70si15244991lfd.187.2016.04.04.01.07.20 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 04 Apr 2016 01:07:20 -0700 (PDT) Received-SPF: pass (google.com: domain of eric.auger@linaro.org designates 2a00:1450:4010:c07::22a as permitted sender) client-ip=2a00:1450:4010:c07::22a; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org; spf=pass (google.com: domain of eric.auger@linaro.org designates 2a00:1450:4010:c07::22a as permitted sender) smtp.mailfrom=eric.auger@linaro.org; dmarc=pass (p=NONE dis=NONE) header.from=linaro.org Received: by mail-lf0-x22a.google.com with SMTP id g184so82883830lfb.3 for ; Mon, 04 Apr 2016 01:07:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=+hlAxDsyfpzdZRGBb8ec6lobJ7A0PpWvNDdX/oMR2i8=; b=h3o3g4sy4vgK3D/rSz0U/GQB5IgV9TOfOGtWFOJePQ81qYbqum2q0qxA0Yb3JnGKmL kWpa8ZzB/3QgvD4stlAYGPhz0WNkhAdpq84pZYe13Elu2TpaPyGCNeeeHgG0x9o7IuXu awl2tQrGaK+RuNkoV/VG1wjuL/OpGFg7AuovY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=+hlAxDsyfpzdZRGBb8ec6lobJ7A0PpWvNDdX/oMR2i8=; b=FAngWfZ2vy2HNxII+yJbvDK3V6gyrTJxNAbNBGjsb6EBEk3w6I+RiiRFzbPhnZGHrL Rqahq1CihpanHeZdz+zcGdJzlg/8rDdyYbS68PqnAyBmO84zokoeYKRta8XwCmtCYiAB uojueg6VmQUCldJQNa7EhdzLAEzhSebXoStK7AKIRWy7jrbRuYap8opHDZCYnpOvZ6ND vJLDUN57+nXgLdXO+EKAgHAAleBGLN2IuLnQk1n9qPSxatzNqss8H8TZbiZpnnDRwKd4 4TCIc2FV7fWfO83WXNcp5qfZDUlZACyRy9BEGYc5VmrBRMqfbWgQVcLTt1vJzQ/2bHey SsaA== X-Gm-Message-State: AD7BkJL/dWsfcPPQulIftkTSBx6XovLXYTOEOcPmJIN19udxrXBFDzH409cscNJuRoX62U+d6c0= X-Received: by 10.194.184.234 with SMTP id ex10mr16126248wjc.8.1459757239819; Mon, 04 Apr 2016 01:07:19 -0700 (PDT) Return-Path: Received: from new-host-2.home (LMontsouris-657-1-37-90.w80-11.abo.wanadoo.fr. [80.11.198.90]) by smtp.gmail.com with ESMTPSA id m67sm7505239wma.3.2016.04.04.01.07.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Mon, 04 Apr 2016 01:07:18 -0700 (PDT) From: Eric Auger To: eric.auger@st.com, eric.auger@linaro.org, robin.murphy@arm.com, alex.williamson@redhat.com, will.deacon@arm.com, joro@8bytes.org, tglx@linutronix.de, jason@lakedaemon.net, marc.zyngier@arm.com, christoffer.dall@linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org Cc: suravee.suthikulpanit@amd.com, patches@linaro.org, linux-kernel@vger.kernel.org, Manish.Jaggi@caviumnetworks.com, Bharat.Bhushan@freescale.com, pranav.sawargaonkar@gmail.com, p.fedin@samsung.com, iommu@lists.linux-foundation.org, Jean-Philippe.Brucker@arm.com, julien.grall@arm.com Subject: [PATCH v6 3/7] iommu: introduce a reserved iova cookie Date: Mon, 4 Apr 2016 08:06:58 +0000 Message-Id: <1459757222-2668-4-git-send-email-eric.auger@linaro.org> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1459757222-2668-1-git-send-email-eric.auger@linaro.org> References: <1459757222-2668-1-git-send-email-eric.auger@linaro.org> This patch introduces some new fields in the iommu_domain struct, dedicated to reserved iova management. In a similar way as DMA mapping IOVA window, we need to store information related to a reserved IOVA window. The reserved_iova_cookie will store the reserved iova_domain handle. An RB tree indexed by physical address is introduced to store the host physical addresses bound to reserved IOVAs. Those physical addresses will correspond to MSI frame base addresses, also referred to as doorbells. Their number should be quite limited per domain. Also a mutex is introduced to protect accesses to the iova_domain and RB tree. Signed-off-by: Eric Auger --- v5 -> v6: - initialize reserved_binding_list - use a spinlock instead of a mutex --- drivers/iommu/iommu.c | 2 ++ include/linux/iommu.h | 6 ++++++ 2 files changed, 8 insertions(+) -- 1.9.1 diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index bfd4f7c..cdb7845 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1072,6 +1072,8 @@ static struct iommu_domain *__iommu_domain_alloc(struct bus_type *bus, domain->ops = bus->iommu_ops; domain->type = type; + spin_lock_init(&domain->reserved_lock); + domain->reserved_binding_list = RB_ROOT; return domain; } diff --git a/include/linux/iommu.h b/include/linux/iommu.h index a4fe04a..630a207 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -24,6 +24,7 @@ #include #include #include +#include #include #define IOMMU_READ (1 << 0) @@ -82,6 +83,11 @@ struct iommu_domain { void *handler_token; struct iommu_domain_geometry geometry; void *iova_cookie; + void *reserved_iova_cookie; + /* rb tree indexed by PA, for reserved bindings only */ + struct rb_root reserved_binding_list; + /* protects reserved cookie and rbtree manipulation */ + spinlock_t reserved_lock; }; enum iommu_cap {