Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp1331065imm; Wed, 11 Jul 2018 23:20:14 -0700 (PDT) X-Google-Smtp-Source: AAOMgpeQM1HG1tJ7UrUKnWqetwP49qwEt1mHuoFyBATspge7/jKIr+J3BITffMuteBZFRvCK58OV X-Received: by 2002:a62:d693:: with SMTP id a19-v6mr978698pfl.248.1531376414092; Wed, 11 Jul 2018 23:20:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531376414; cv=none; d=google.com; s=arc-20160816; b=vwXPk308HBo1DkE7ENYZ54fjlId9HMCV3S03ii1b4qQSUoE9DRttSTbGmSlxRQtHy3 7bCABFTQ8gqp/SyRffut2eRvPziXTk2yK5A5e213Ruywg7iSKhdywTUCIv3WidH7K1t2 Cc3lTIX0KygBEiqQpKRU7sA8RZYZeOMepo/WnD2Jq2bf6p1hexs9wvS0J/GcKeT8sI8p AJfSmmhWKzkkghPkoFtNPyitIZeRUghHNAVO3aRQIgfMIv1g676FSgVtRVgeUZzf/sjq y7hwODOpbcUW+Iq6h3/kYV3bYIsBnm6WEqlSYx2aurC1OE3VDuDlWqFk8m1hTnbH3DlJ 67Tg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:arc-authentication-results; bh=Y2+p1O9jEqtldX4F8u9tfk07x9I2K98fNte2KfG2HT0=; b=GGVv1v3xzjNNKcynTQJgTzh56gXuf/5551uXSBFTmprTGb7wUG0WEHUAxGco1/Rqb+ zAaEHrl97tmrNuyIgcjd8WjjyPkrAqa6gPgoYuc9iKFVF8WJ7Hjg/AsHRUAKRDS1gS9T FvMs14jJ0pYAyh2PJ1/Y92Lmm4PzKd8qYIbpNwwM66IroFb35GxNbLfo+5vkuTCXCy+V sxk6UegZply7IzaNeclHmW819tFLLZEQ2EzzfRBtQm8AZwdAwgB1/H7nPQum5bG0BfDn lzJoNvrFSROleAaQZqkJ08GJKvDmwTLvdZdBRd8OakIGV1JEFfpZxmdHhTjt2v4yYk23 MiAA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id l1-v6si19786020pgb.464.2018.07.11.23.19.57; Wed, 11 Jul 2018 23:20:14 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727658AbeGLG1U (ORCPT + 99 others); Thu, 12 Jul 2018 02:27:20 -0400 Received: from szxga06-in.huawei.com ([45.249.212.32]:48763 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1726584AbeGLG1S (ORCPT ); Thu, 12 Jul 2018 02:27:18 -0400 Received: from DGGEMS402-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 8D210874C7C9A; Thu, 12 Jul 2018 14:19:12 +0800 (CST) Received: from localhost (10.177.23.164) by DGGEMS402-HUB.china.huawei.com (10.3.19.202) with Microsoft SMTP Server id 14.3.382.0; Thu, 12 Jul 2018 14:19:06 +0800 From: Zhen Lei To: Jean-Philippe Brucker , Robin Murphy , Will Deacon , Joerg Roedel , linux-arm-kernel , iommu , linux-kernel CC: Zhen Lei Subject: [PATCH v3 5/6] iommu/arm-smmu-v3: add support for non-strict mode Date: Thu, 12 Jul 2018 14:18:31 +0800 Message-ID: <1531376312-2192-6-git-send-email-thunder.leizhen@huawei.com> X-Mailer: git-send-email 1.9.5.msysgit.0 In-Reply-To: <1531376312-2192-1-git-send-email-thunder.leizhen@huawei.com> References: <1531376312-2192-1-git-send-email-thunder.leizhen@huawei.com> MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.177.23.164] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 1. Add IOMMU_CAP_NON_STRICT capability. 2. Dynamic choose strict or non-strict mode base on the iommu domain type. Signed-off-by: Zhen Lei --- drivers/iommu/arm-smmu-v3.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/drivers/iommu/arm-smmu-v3.c b/drivers/iommu/arm-smmu-v3.c index 4402187..4a198a0 100644 --- a/drivers/iommu/arm-smmu-v3.c +++ b/drivers/iommu/arm-smmu-v3.c @@ -1440,6 +1440,8 @@ static bool arm_smmu_capable(enum iommu_cap cap) return true; case IOMMU_CAP_NOEXEC: return true; + case IOMMU_CAP_NON_STRICT: + return true; default: return false; } @@ -1767,7 +1769,7 @@ static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova, if (!ops) return 0; - return ops->unmap(ops, iova, size); + return ops->unmap(ops, iova | IOMMU_DOMAIN_STRICT_MODE(domain), size); } static void arm_smmu_flush_iotlb_all(struct iommu_domain *domain) @@ -1782,7 +1784,7 @@ static void arm_smmu_iotlb_sync(struct iommu_domain *domain) { struct arm_smmu_device *smmu = to_smmu_domain(domain)->smmu; - if (smmu) + if (smmu && (IOMMU_DOMAIN_STRICT_MODE(domain) == IOMMU_STRICT)) __arm_smmu_tlb_sync(smmu); } -- 1.8.3