From patchwork Fri Feb 26 17:35:42 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Auger X-Patchwork-Id: 8440361 Return-Path: X-Original-To: patchwork-kvm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 590249F52D for ; Fri, 26 Feb 2016 17:41:10 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 7DA2220395 for ; Fri, 26 Feb 2016 17:41:09 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 5D81A203B6 for ; Fri, 26 Feb 2016 17:41:06 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1422797AbcBZRlB (ORCPT ); Fri, 26 Feb 2016 12:41:01 -0500 Received: from mail-wm0-f54.google.com ([74.125.82.54]:35456 "EHLO mail-wm0-f54.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1030230AbcBZRgJ (ORCPT ); Fri, 26 Feb 2016 12:36:09 -0500 Received: by mail-wm0-f54.google.com with SMTP id c200so82101619wme.0 for ; Fri, 26 Feb 2016 09:36:09 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=fPDZWCj8q6qdcX2hcgd1FmagbwR5v8fqxilDgvSySD/xvvm68QGeo2oSEsiNeiAjQu wXqjDWERcTbtFp5v/tEDRJ53gaPu36t7S0ft72tGkuhPSUNAj2wAfbCLu14MIGR6PJ7F WY7fsx045EKnSqvgg0uGMY9Bmn1CgVjz3DNhE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=E5uMDfEgcZKtYueQv/quJHMEdGSz7QMZ14xAWouMJRwu+zhSyF+dVRGY+Ggylr56Dh Bipmilq6F1uKtiicXblNDmCFhY5Vif+3ZiRoClhE8xlNQY8sx0Y8oTg9O706LbalGMAU 5VVPsCqHewGKWpRMXw2FKL/SLxP/eiOzQiiBbsndnEO2DOhP9iJZBFW33Ccx3OkAs9px GfQ0SNOzvAFs32+2d6O2D59ALGUA+dIClroufscAkZfWbKncwfnXaBLi9votsnBwfPFY qDkgd5J2FA+i+kfHu2WG2G/RqROd7jtUUA/daRH9QExY3qxaJPRcL/kKhzr9pB1EVruO 1bjg== X-Gm-Message-State: AD7BkJLt5WeFJaNdoJ9KPaVBHpDPFPeTusIAPJWM+IyNJWc8L3vJJuWJAyElIlXRbI7rvgb1 X-Received: by 10.194.114.133 with SMTP id jg5mr2639224wjb.99.1456508168525; Fri, 26 Feb 2016 09:36:08 -0800 (PST) Received: from new-host-8.home (LMontsouris-657-1-37-90.w80-11.abo.wanadoo.fr. [80.11.198.90]) by smtp.gmail.com with ESMTPSA id 77sm3750373wmp.18.2016.02.26.09.36.05 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Fri, 26 Feb 2016 09:36:06 -0800 (PST) From: Eric Auger To: eric.auger@st.com, eric.auger@linaro.org, robin.murphy@arm.com, alex.williamson@redhat.com, will.deacon@arm.com, joro@8bytes.org, tglx@linutronix.de, jason@lakedaemon.net, marc.zyngier@arm.com, christoffer.dall@linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org Cc: suravee.suthikulpanit@amd.com, patches@linaro.org, linux-kernel@vger.kernel.org, Manish.Jaggi@caviumnetworks.com, Bharat.Bhushan@freescale.com, pranav.sawargaonkar@gmail.com, p.fedin@samsung.com, iommu@lists.linux-foundation.org Subject: [RFC v4 02/14] iommu: introduce a reserved iova cookie Date: Fri, 26 Feb 2016 17:35:42 +0000 Message-Id: <1456508154-2253-3-git-send-email-eric.auger@linaro.org> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1456508154-2253-1-git-send-email-eric.auger@linaro.org> References: <1456508154-2253-1-git-send-email-eric.auger@linaro.org> Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY autolearn=ham version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This patch introduces some new fields in the iommu_domain struct, dedicated to reserved iova management. In a similar way as DMA mapping IOVA window, we need to store information related to a reserved IOVA window. The reserved_iova_cookie will store the reserved iova_domain handle. An RB tree indexed by physical address is introduced to store the host physical addresses bound to reserved IOVAs. Those physical addresses will correspond to MSI frame base addresses, also referred to as doorbells. Their number should be quite limited per domain. Also a mutex is introduced to protect accesses to the iova_domain and RB tree. Signed-off-by: Eric Auger --- drivers/iommu/iommu.c | 1 + include/linux/iommu.h | 5 +++++ 2 files changed, 6 insertions(+) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 0e3b009..7b2bb94 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1072,6 +1072,7 @@ static struct iommu_domain *__iommu_domain_alloc(struct bus_type *bus, domain->ops = bus->iommu_ops; domain->type = type; + mutex_init(&domain->reserved_mutex); return domain; } diff --git a/include/linux/iommu.h b/include/linux/iommu.h index a4fe04a..0189144 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -82,6 +82,11 @@ struct iommu_domain { void *handler_token; struct iommu_domain_geometry geometry; void *iova_cookie; + void *reserved_iova_cookie; + /* rb tree indexed by PA, for reserved bindings only */ + struct rb_root reserved_binding_list; + /* protects reserved cookie and rbtree manipulation */ + struct mutex reserved_mutex; }; enum iommu_cap {