From patchwork Fri Feb 26 17:35:42 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Auger Eric X-Patchwork-Id: 63090 Delivered-To: patches@linaro.org Received: by 10.112.235.234 with SMTP id up10csp788lbc; Fri, 26 Feb 2016 09:36:08 -0800 (PST) X-Received: by 10.28.19.204 with SMTP id 195mr4693923wmt.1.1456508168713; Fri, 26 Feb 2016 09:36:08 -0800 (PST) Return-Path: Received: from mail-wm0-x230.google.com (mail-wm0-x230.google.com. [2a00:1450:400c:c09::230]) by mx.google.com with ESMTPS id xs10si17105228wjc.93.2016.02.26.09.36.08 for (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Fri, 26 Feb 2016 09:36:08 -0800 (PST) Received-SPF: pass (google.com: domain of eric.auger@linaro.org designates 2a00:1450:400c:c09::230 as permitted sender) client-ip=2a00:1450:400c:c09::230; Authentication-Results: mx.google.com; spf=pass (google.com: domain of eric.auger@linaro.org designates 2a00:1450:400c:c09::230 as permitted sender) smtp.mailfrom=eric.auger@linaro.org; dkim=pass header.i=@linaro.org Received: by mail-wm0-x230.google.com with SMTP id g62so82756153wme.1 for ; Fri, 26 Feb 2016 09:36:08 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=fPDZWCj8q6qdcX2hcgd1FmagbwR5v8fqxilDgvSySD/xvvm68QGeo2oSEsiNeiAjQu wXqjDWERcTbtFp5v/tEDRJ53gaPu36t7S0ft72tGkuhPSUNAj2wAfbCLu14MIGR6PJ7F WY7fsx045EKnSqvgg0uGMY9Bmn1CgVjz3DNhE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=egff069YslH6BOxQLMrAwZXSUii3TZi35qyLJBSIApcPn2I9dBmAEAIgkcMvJ/Wb6B vnYsf7IC3SRRbGsm7PwEXmDTj/niRFHlWPySb9Kk040gN6aQZEwif8T4sZSz5zwNWdhN ePzRRTqkKvAlLbvm/2UKAATdkKKsD1dbj9idyZE94ImwGykRYgo3NG1v9xDPZRQrGXfc D0f5Ff0qh0szbHK5cUc25MDQirNr/hC0FmlDYb8KWkbNdr4Iz/CQfKKyt1Uodt0hAvss 4U0/YUshlDjb3UD4ums5vHKPMS296rBdaC0M0EkKMWLupvrOd9DmS2pB65dpqhGkEcZ2 Kt0g== X-Gm-Message-State: AD7BkJLJwOZuB4YJKdK+SrQIxnvHRB9w4dh2GnhHM1uOwJGFPVOMp8cAVMYQaGRewIwblSC3AJ0= X-Received: by 10.194.114.133 with SMTP id jg5mr2639224wjb.99.1456508168525; Fri, 26 Feb 2016 09:36:08 -0800 (PST) Return-Path: Received: from new-host-8.home (LMontsouris-657-1-37-90.w80-11.abo.wanadoo.fr. [80.11.198.90]) by smtp.gmail.com with ESMTPSA id 77sm3750373wmp.18.2016.02.26.09.36.05 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 26 Feb 2016 09:36:06 -0800 (PST) From: Eric Auger To: eric.auger@st.com, eric.auger@linaro.org, robin.murphy@arm.com, alex.williamson@redhat.com, will.deacon@arm.com, joro@8bytes.org, tglx@linutronix.de, jason@lakedaemon.net, marc.zyngier@arm.com, christoffer.dall@linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org Cc: suravee.suthikulpanit@amd.com, patches@linaro.org, linux-kernel@vger.kernel.org, Manish.Jaggi@caviumnetworks.com, Bharat.Bhushan@freescale.com, pranav.sawargaonkar@gmail.com, p.fedin@samsung.com, iommu@lists.linux-foundation.org Subject: [RFC v4 02/14] iommu: introduce a reserved iova cookie Date: Fri, 26 Feb 2016 17:35:42 +0000 Message-Id: <1456508154-2253-3-git-send-email-eric.auger@linaro.org> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1456508154-2253-1-git-send-email-eric.auger@linaro.org> References: <1456508154-2253-1-git-send-email-eric.auger@linaro.org> This patch introduces some new fields in the iommu_domain struct, dedicated to reserved iova management. In a similar way as DMA mapping IOVA window, we need to store information related to a reserved IOVA window. The reserved_iova_cookie will store the reserved iova_domain handle. An RB tree indexed by physical address is introduced to store the host physical addresses bound to reserved IOVAs. Those physical addresses will correspond to MSI frame base addresses, also referred to as doorbells. Their number should be quite limited per domain. Also a mutex is introduced to protect accesses to the iova_domain and RB tree. Signed-off-by: Eric Auger --- drivers/iommu/iommu.c | 1 + include/linux/iommu.h | 5 +++++ 2 files changed, 6 insertions(+) -- 1.9.1 diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 0e3b009..7b2bb94 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1072,6 +1072,7 @@ static struct iommu_domain *__iommu_domain_alloc(struct bus_type *bus, domain->ops = bus->iommu_ops; domain->type = type; + mutex_init(&domain->reserved_mutex); return domain; } diff --git a/include/linux/iommu.h b/include/linux/iommu.h index a4fe04a..0189144 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -82,6 +82,11 @@ struct iommu_domain { void *handler_token; struct iommu_domain_geometry geometry; void *iova_cookie; + void *reserved_iova_cookie; + /* rb tree indexed by PA, for reserved bindings only */ + struct rb_root reserved_binding_list; + /* protects reserved cookie and rbtree manipulation */ + struct mutex reserved_mutex; }; enum iommu_cap {