From patchwork Tue Mar 1 18:27:43 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Auger Eric X-Patchwork-Id: 63326 Delivered-To: patches@linaro.org Received: by 10.112.199.169 with SMTP id jl9csp1981435lbc; Tue, 1 Mar 2016 10:28:21 -0800 (PST) X-Received: by 10.28.98.138 with SMTP id w132mr414779wmb.45.1456856901322; Tue, 01 Mar 2016 10:28:21 -0800 (PST) Return-Path: Received: from mail-wm0-x232.google.com (mail-wm0-x232.google.com. [2a00:1450:400c:c09::232]) by mx.google.com with ESMTPS id e13si453512wme.27.2016.03.01.10.28.21 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Tue, 01 Mar 2016 10:28:21 -0800 (PST) Received-SPF: pass (google.com: domain of eric.auger@linaro.org designates 2a00:1450:400c:c09::232 as permitted sender) client-ip=2a00:1450:400c:c09::232; Authentication-Results: mx.google.com; spf=pass (google.com: domain of eric.auger@linaro.org designates 2a00:1450:400c:c09::232 as permitted sender) smtp.mailfrom=eric.auger@linaro.org; dkim=pass header.i=@linaro.org Received: by mail-wm0-x232.google.com with SMTP id l68so50608402wml.0 for ; Tue, 01 Mar 2016 10:28:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=cCga9q5pin3x7h0AgdkylSmu1u29iKJDNy3yTSITpz9c4jQRYHuKpK5uCqZGjFoL57 pTMiyx3Ard0378FlCNpXvtWW+4HUGyhCBEmzed6Iq9XyGY7jdePxwo7gG5KwIRkGrzJA jr+80B/r6lV5CsyQ3C6GzgmQ/tHJl/53R5xnE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=cIKCQwIuH0+XSl7pqZDN2lDvpFAPmWK4UtdyfjIMHPeMasQadOnKD5Qfl7yLvZZCU+ WWG7SmCX+9fR6lIl4VuBq/0iLS6PYOKrSYS2n+iju4tLgAKFylomusPOB0aKc03dXenA RZauVfx03Y2lsAo9OfTT7uoJkBllAiH0aesmCdOPO6UrTreo5dkjn6JccUhIW5X7Z/IP tAGeubreAiGF7Qk5rp4sQTR7omB8T/o4M/d/gVH+tQwvK6ZUfziETVtTw4vLiBrfQzCU R1rVx0qhfdYwHVqvCDo4EKqmouEJTcD1NpbDLilp1Y4e3qc4O7onOWU4CNVgPft8V79p oqQg== X-Gm-Message-State: AD7BkJLPeljfflXQyhHUt/fa5G4bWWV8gcPpLSIcINEXcarsFbfV1YhaueOD86ClkT3eH8XwVwY= X-Received: by 10.194.95.40 with SMTP id dh8mr24652871wjb.146.1456856901080; Tue, 01 Mar 2016 10:28:21 -0800 (PST) Return-Path: Received: from new-host-8.home (LMontsouris-657-1-37-90.w80-11.abo.wanadoo.fr. [80.11.198.90]) by smtp.gmail.com with ESMTPSA id k8sm32176385wjr.38.2016.03.01.10.28.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 01 Mar 2016 10:28:19 -0800 (PST) From: Eric Auger To: eric.auger@st.com, eric.auger@linaro.org, robin.murphy@arm.com, alex.williamson@redhat.com, will.deacon@arm.com, joro@8bytes.org, tglx@linutronix.de, jason@lakedaemon.net, marc.zyngier@arm.com, christoffer.dall@linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org Cc: suravee.suthikulpanit@amd.com, patches@linaro.org, linux-kernel@vger.kernel.org, Manish.Jaggi@caviumnetworks.com, Bharat.Bhushan@freescale.com, pranav.sawargaonkar@gmail.com, p.fedin@samsung.com, iommu@lists.linux-foundation.org Subject: [RFC v5 03/17] iommu: introduce a reserved iova cookie Date: Tue, 1 Mar 2016 18:27:43 +0000 Message-Id: <1456856877-4817-4-git-send-email-eric.auger@linaro.org> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1456856877-4817-1-git-send-email-eric.auger@linaro.org> References: <1456856877-4817-1-git-send-email-eric.auger@linaro.org> This patch introduces some new fields in the iommu_domain struct, dedicated to reserved iova management. In a similar way as DMA mapping IOVA window, we need to store information related to a reserved IOVA window. The reserved_iova_cookie will store the reserved iova_domain handle. An RB tree indexed by physical address is introduced to store the host physical addresses bound to reserved IOVAs. Those physical addresses will correspond to MSI frame base addresses, also referred to as doorbells. Their number should be quite limited per domain. Also a mutex is introduced to protect accesses to the iova_domain and RB tree. Signed-off-by: Eric Auger --- drivers/iommu/iommu.c | 1 + include/linux/iommu.h | 5 +++++ 2 files changed, 6 insertions(+) -- 1.9.1 diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 0e3b009..7b2bb94 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1072,6 +1072,7 @@ static struct iommu_domain *__iommu_domain_alloc(struct bus_type *bus, domain->ops = bus->iommu_ops; domain->type = type; + mutex_init(&domain->reserved_mutex); return domain; } diff --git a/include/linux/iommu.h b/include/linux/iommu.h index a4fe04a..0189144 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -82,6 +82,11 @@ struct iommu_domain { void *handler_token; struct iommu_domain_geometry geometry; void *iova_cookie; + void *reserved_iova_cookie; + /* rb tree indexed by PA, for reserved bindings only */ + struct rb_root reserved_binding_list; + /* protects reserved cookie and rbtree manipulation */ + struct mutex reserved_mutex; }; enum iommu_cap {