From patchwork Tue Mar 1 18:27:43 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Eric Auger X-Patchwork-Id: 8468791 Return-Path: X-Original-To: patchwork-kvm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 139689F9A0 for ; Tue, 1 Mar 2016 18:34:38 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 4199A20115 for ; Tue, 1 Mar 2016 18:34:37 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 091782034B for ; Tue, 1 Mar 2016 18:34:36 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753089AbcCASec (ORCPT ); Tue, 1 Mar 2016 13:34:32 -0500 Received: from mail-wm0-f53.google.com ([74.125.82.53]:36010 "EHLO mail-wm0-f53.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752797AbcCAS21 (ORCPT ); Tue, 1 Mar 2016 13:28:27 -0500 Received: by mail-wm0-f53.google.com with SMTP id n186so50783245wmn.1 for ; Tue, 01 Mar 2016 10:28:26 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=cCga9q5pin3x7h0AgdkylSmu1u29iKJDNy3yTSITpz9c4jQRYHuKpK5uCqZGjFoL57 pTMiyx3Ard0378FlCNpXvtWW+4HUGyhCBEmzed6Iq9XyGY7jdePxwo7gG5KwIRkGrzJA jr+80B/r6lV5CsyQ3C6GzgmQ/tHJl/53R5xnE= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references; bh=qd3ZjnVDQXnkcPy0qUc9ovY0A9+LAe1KHGYe5DgWtJ4=; b=jiX1LJW3D7nphSTdPsOs0/4HQKjhm9QOn6YTUzArkwjRy3jGBaLgEeAO/slYF3mJWZ wEBtKpg+Usz+2p1D6qpqv/tQOw+ex3Io9flvATJxs5+kRObnArYFEzZdB4dSi9Y2n8pj rUAa1WUZDY+m78pw+caZxNRFcFKyLuJ+D1xintZv2+/5KWIdKHuEot0zAK6oruVxG76g 1aXCLUBCm4txd7Jj3cirQlZ1tiBlS850U/gIbTLoW84DXocF3f2EvbKeMUkTcQZ3W87f e4O6pjrmR3htZCiNcChCqcnPyqe6J8vEFDTjk9UnTHFLAgTiPErWY3CST7f+YqOI8j7a 3FDQ== X-Gm-Message-State: AD7BkJIfmrD7IQniFHC2KJ6cLHXpQHA96sFOyspuI0lLvwu9Sf2useAJo4wXDoo0ZUeQVZFq X-Received: by 10.194.95.40 with SMTP id dh8mr24652871wjb.146.1456856901080; Tue, 01 Mar 2016 10:28:21 -0800 (PST) Received: from new-host-8.home (LMontsouris-657-1-37-90.w80-11.abo.wanadoo.fr. [80.11.198.90]) by smtp.gmail.com with ESMTPSA id k8sm32176385wjr.38.2016.03.01.10.28.17 (version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Tue, 01 Mar 2016 10:28:19 -0800 (PST) From: Eric Auger To: eric.auger@st.com, eric.auger@linaro.org, robin.murphy@arm.com, alex.williamson@redhat.com, will.deacon@arm.com, joro@8bytes.org, tglx@linutronix.de, jason@lakedaemon.net, marc.zyngier@arm.com, christoffer.dall@linaro.org, linux-arm-kernel@lists.infradead.org, kvmarm@lists.cs.columbia.edu, kvm@vger.kernel.org Cc: suravee.suthikulpanit@amd.com, patches@linaro.org, linux-kernel@vger.kernel.org, Manish.Jaggi@caviumnetworks.com, Bharat.Bhushan@freescale.com, pranav.sawargaonkar@gmail.com, p.fedin@samsung.com, iommu@lists.linux-foundation.org Subject: [RFC v5 03/17] iommu: introduce a reserved iova cookie Date: Tue, 1 Mar 2016 18:27:43 +0000 Message-Id: <1456856877-4817-4-git-send-email-eric.auger@linaro.org> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1456856877-4817-1-git-send-email-eric.auger@linaro.org> References: <1456856877-4817-1-git-send-email-eric.auger@linaro.org> Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, RCVD_IN_DNSWL_HI,RP_MATCHES_RCVD,T_DKIM_INVALID,UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP This patch introduces some new fields in the iommu_domain struct, dedicated to reserved iova management. In a similar way as DMA mapping IOVA window, we need to store information related to a reserved IOVA window. The reserved_iova_cookie will store the reserved iova_domain handle. An RB tree indexed by physical address is introduced to store the host physical addresses bound to reserved IOVAs. Those physical addresses will correspond to MSI frame base addresses, also referred to as doorbells. Their number should be quite limited per domain. Also a mutex is introduced to protect accesses to the iova_domain and RB tree. Signed-off-by: Eric Auger --- drivers/iommu/iommu.c | 1 + include/linux/iommu.h | 5 +++++ 2 files changed, 6 insertions(+) diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index 0e3b009..7b2bb94 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -1072,6 +1072,7 @@ static struct iommu_domain *__iommu_domain_alloc(struct bus_type *bus, domain->ops = bus->iommu_ops; domain->type = type; + mutex_init(&domain->reserved_mutex); return domain; } diff --git a/include/linux/iommu.h b/include/linux/iommu.h index a4fe04a..0189144 100644 --- a/include/linux/iommu.h +++ b/include/linux/iommu.h @@ -82,6 +82,11 @@ struct iommu_domain { void *handler_token; struct iommu_domain_geometry geometry; void *iova_cookie; + void *reserved_iova_cookie; + /* rb tree indexed by PA, for reserved bindings only */ + struct rb_root reserved_binding_list; + /* protects reserved cookie and rbtree manipulation */ + struct mutex reserved_mutex; }; enum iommu_cap {