Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp1564204ybb; Thu, 9 Apr 2020 04:48:53 -0700 (PDT) X-Google-Smtp-Source: APiQypKDIQpoXwkHmnpoEjU7eHmCFJjKwXHXmQip+s4zMUX2couiMWAOI9rv3dql691cSA9nnjgU X-Received: by 2002:a37:bc47:: with SMTP id m68mr12609296qkf.8.1586432933460; Thu, 09 Apr 2020 04:48:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1586432933; cv=none; d=google.com; s=arc-20160816; b=Y4+eCB/u4GyIjmSaypwejotE0z5ZkXIkz1ZF4FwIEZOP1El6rQWNpa3rIQRRw7aRkO 1ol9ZgTNEBjHhslVsOGnc8lWhNoBd6mKqdX8zAViX/LoXaM4yjkfJBJm1t4ooIWd+wDy QocFWFrg0g+iAaSwvDN+tZQhz8FNd99++WytTz4sFKyxsv9XGMailtdoeYgpzR/+0hE5 B5LHKLMNk0JOSxdZ9iWP2CCVW/8dwzcxzby8Vf4GPh53AMymaumwIfT9L2QFj4GicsTC aWvI5n4YdAsgJIwIpY57M0Buog2j28W5MTLvKjRlMtd2+HcqiJy2yjTdJp99jDJ6Yl3T jzEA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=dqCJPyjS1lue9dYZ3X2mPGdWd+UP0kHaruWXq8OmybY=; b=P3vBQt75b5iEFIHebSQwp2yQOxru7KUK/udf9QlGXaFWdn4mdxl0mgMG+M1MCP+yCW zOdcV0nAZbYyX0kRtycLNd35H+p4ByCz9EaWpXHJXPyEVI1evFLo5hpW4Rqs4zqra2D3 z5OlhTbTR4b/cydCVF2paxlmHwe1Q8NkTqC4glsFm2d2b9xX6sKZS7jMdO1AssjRfTpV wfMf/kmnhw1jicSDa10/171eMR0OzTcGXk6mYV0y0N11DgXXwgVDQpDDOH4BXy5U6AeB uQxiGTL7j1Tu8EhSVmxdQVnqnhYMk5GHC6pw0Z+vTZ7d0RVsYBvZATlk70lbMl4Ozgcw H5Eg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h27si5497541qkl.222.2020.04.09.04.48.38; Thu, 09 Apr 2020 04:48:53 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726637AbgDILq1 (ORCPT + 99 others); Thu, 9 Apr 2020 07:46:27 -0400 Received: from 8bytes.org ([81.169.241.247]:58840 "EHLO theia.8bytes.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726082AbgDILq0 (ORCPT ); Thu, 9 Apr 2020 07:46:26 -0400 Received: by theia.8bytes.org (Postfix, from userid 1000) id 60A51398; Thu, 9 Apr 2020 13:46:25 +0200 (CEST) Date: Thu, 9 Apr 2020 13:46:20 +0200 From: Joerg Roedel To: Marek Szyprowski Cc: Will Deacon , Robin Murphy , Kukjin Kim , Krzysztof Kozlowski , David Woodhouse , Lu Baolu , Andy Gross , Bjorn Andersson , Matthias Brugger , Rob Clark , Heiko Stuebner , Gerald Schaefer , Thierry Reding , Jonathan Hunter , Jean-Philippe Brucker , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, linux-samsung-soc@vger.kernel.org, linux-arm-msm@vger.kernel.org, linux-mediatek@lists.infradead.org, linux-rockchip@lists.infradead.org, linux-s390@vger.kernel.org, linux-tegra@vger.kernel.org, virtualization@lists.linux-foundation.org, Joerg Roedel Subject: [PATCH] iommu/exynos: Get rid of 'struct exynos_iommu_owner' exynos_iommu_owner Message-ID: <20200409114620.GA16298@8bytes.org> References: <20200407183742.4344-1-joro@8bytes.org> <20200407183742.4344-32-joro@8bytes.org> <449e7f16-e719-9617-ec92-63b82c0bc33f@samsung.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Marek, I had some more thoughts and discussions with Robin about how to make this work with the Exynos driver. The result is the patch below, can you please test it and report back? Even better if you can fix up any breakage it might cause :) From 60a288509baa34df6a0bf437c977925a0a617c72 Mon Sep 17 00:00:00 2001 From: Joerg Roedel Date: Thu, 9 Apr 2020 13:38:18 +0200 Subject: [PATCH] iommu/exynos: Get rid of 'struct exynos_iommu_owner' Remove 'struct exynos_iommu_owner' and replace it with a single-linked list of 'struct sysmmu_drvdata'. The first item in the list acts as a replacement for the previous exynos_iommu_owner structure. The iommu_device member of the first list item is reported to the IOMMU core code for the master device. Signed-off-by: Joerg Roedel --- drivers/iommu/exynos-iommu.c | 155 ++++++++++++++++++++--------------- 1 file changed, 88 insertions(+), 67 deletions(-) diff --git a/drivers/iommu/exynos-iommu.c b/drivers/iommu/exynos-iommu.c index 186ff5cc975c..e70eb360093f 100644 --- a/drivers/iommu/exynos-iommu.c +++ b/drivers/iommu/exynos-iommu.c @@ -225,18 +225,6 @@ static const struct sysmmu_fault_info sysmmu_v5_faults[] = { { 20, REG_V5_FAULT_AW_VA, "AW SECURITY PROTECTION", IOMMU_FAULT_WRITE }, }; -/* - * This structure is attached to dev.archdata.iommu of the master device - * on device add, contains a list of SYSMMU controllers defined by device tree, - * which are bound to given master device. It is usually referenced by 'owner' - * pointer. -*/ -struct exynos_iommu_owner { - struct list_head controllers; /* list of sysmmu_drvdata.owner_node */ - struct iommu_domain *domain; /* domain this device is attached */ - struct mutex rpm_lock; /* for runtime pm of all sysmmus */ -}; - /* * This structure exynos specific generalization of struct iommu_domain. * It contains list of SYSMMU controllers from all master devices, which has @@ -271,13 +259,23 @@ struct sysmmu_drvdata { bool active; /* current status */ struct exynos_iommu_domain *domain; /* domain we belong to */ struct list_head domain_node; /* node for domain clients list */ - struct list_head owner_node; /* node for owner controllers list */ + struct sysmmu_drvdata *next; /* Single-linked list to group SMMUs for + one master. NULL means not in any + list, ERR_PTR(-ENODEV) means end of + list */ + struct mutex rpm_lock; /* for runtime pm of all sysmmus */ phys_addr_t pgtable; /* assigned page table structure */ unsigned int version; /* our version */ struct iommu_device iommu; /* IOMMU core handle */ }; +/* Helper to iterate over all SYSMMUs for a given platform device */ +#define for_each_sysmmu(dev, drvdata) \ + for (drvdata = (dev)->archdata.iommu; \ + drvdata != ERR_PTR(-ENODEV); \ + drvdata = drvdata->next) + static struct exynos_iommu_domain *to_exynos_domain(struct iommu_domain *dom) { return container_of(dom, struct exynos_iommu_domain, domain); @@ -624,6 +622,8 @@ static int exynos_sysmmu_probe(struct platform_device *pdev) data->sysmmu = dev; spin_lock_init(&data->lock); + data->next = NULL; + mutex_init(&data->rpm_lock); ret = iommu_device_sysfs_add(&data->iommu, &pdev->dev, NULL, dev_name(data->sysmmu)); @@ -668,17 +668,20 @@ static int __maybe_unused exynos_sysmmu_suspend(struct device *dev) { struct sysmmu_drvdata *data = dev_get_drvdata(dev); struct device *master = data->master; + struct sysmmu_drvdata *master_data; - if (master) { - struct exynos_iommu_owner *owner = master->archdata.iommu; + if (!master) + return 0; - mutex_lock(&owner->rpm_lock); - if (data->domain) { - dev_dbg(data->sysmmu, "saving state\n"); - __sysmmu_disable(data); - } - mutex_unlock(&owner->rpm_lock); + master_data = master->archdata.iommu; + + mutex_lock(&master_data->rpm_lock); + if (data->domain) { + dev_dbg(data->sysmmu, "saving state\n"); + __sysmmu_disable(data); } + mutex_unlock(&master_data->rpm_lock); + return 0; } @@ -686,17 +689,20 @@ static int __maybe_unused exynos_sysmmu_resume(struct device *dev) { struct sysmmu_drvdata *data = dev_get_drvdata(dev); struct device *master = data->master; + struct sysmmu_drvdata *master_data; - if (master) { - struct exynos_iommu_owner *owner = master->archdata.iommu; + if (!master) + return 0; - mutex_lock(&owner->rpm_lock); - if (data->domain) { - dev_dbg(data->sysmmu, "restoring state\n"); - __sysmmu_enable(data); - } - mutex_unlock(&owner->rpm_lock); + master_data = master->archdata.iommu; + + mutex_lock(&master_data->rpm_lock); + if (data->domain) { + dev_dbg(data->sysmmu, "restoring state\n"); + __sysmmu_enable(data); } + mutex_unlock(&master_data->rpm_lock); + return 0; } @@ -834,21 +840,21 @@ static void exynos_iommu_domain_free(struct iommu_domain *iommu_domain) kfree(domain); } -static void exynos_iommu_detach_device(struct iommu_domain *iommu_domain, - struct device *dev) +static void __exynos_iommu_detach_device(struct exynos_iommu_domain *domain, + struct device *dev) { - struct exynos_iommu_owner *owner = dev->archdata.iommu; - struct exynos_iommu_domain *domain = to_exynos_domain(iommu_domain); phys_addr_t pagetable = virt_to_phys(domain->pgtable); - struct sysmmu_drvdata *data, *next; + struct sysmmu_drvdata *dev_data, *data, *next; unsigned long flags; - if (!has_sysmmu(dev) || owner->domain != iommu_domain) + dev_data = dev->archdata.iommu; + + if (!has_sysmmu(dev) || dev_data->domain != domain) return; - mutex_lock(&owner->rpm_lock); + mutex_lock(&dev_data->rpm_lock); - list_for_each_entry(data, &owner->controllers, owner_node) { + for_each_sysmmu(dev, data) { pm_runtime_get_noresume(data->sysmmu); if (pm_runtime_active(data->sysmmu)) __sysmmu_disable(data); @@ -863,51 +869,59 @@ static void exynos_iommu_detach_device(struct iommu_domain *iommu_domain, list_del_init(&data->domain_node); spin_unlock(&data->lock); } - owner->domain = NULL; spin_unlock_irqrestore(&domain->lock, flags); - mutex_unlock(&owner->rpm_lock); + mutex_unlock(&dev_data->rpm_lock); dev_dbg(dev, "%s: Detached IOMMU with pgtable %pa\n", __func__, &pagetable); } +static void exynos_iommu_detach_device(struct iommu_domain *iommu_domain, + struct device *dev) +{ + struct exynos_iommu_domain *domain = to_exynos_domain(iommu_domain); + + __exynos_iommu_detach_device(domain, dev); +} + static int exynos_iommu_attach_device(struct iommu_domain *iommu_domain, struct device *dev) { - struct exynos_iommu_owner *owner = dev->archdata.iommu; struct exynos_iommu_domain *domain = to_exynos_domain(iommu_domain); - struct sysmmu_drvdata *data; + struct sysmmu_drvdata *dev_data, *data; phys_addr_t pagetable = virt_to_phys(domain->pgtable); unsigned long flags; if (!has_sysmmu(dev)) return -ENODEV; - if (owner->domain) - exynos_iommu_detach_device(owner->domain, dev); + dev_data = dev->archdata.iommu; - mutex_lock(&owner->rpm_lock); + if (dev_data->domain) + __exynos_iommu_detach_device(dev_data->domain, dev); + + mutex_lock(&dev_data->rpm_lock); spin_lock_irqsave(&domain->lock, flags); - list_for_each_entry(data, &owner->controllers, owner_node) { + for_each_sysmmu(dev, data) { spin_lock(&data->lock); data->pgtable = pagetable; data->domain = domain; list_add_tail(&data->domain_node, &domain->clients); spin_unlock(&data->lock); } - owner->domain = iommu_domain; spin_unlock_irqrestore(&domain->lock, flags); - list_for_each_entry(data, &owner->controllers, owner_node) { + + for_each_sysmmu(dev, data) { pm_runtime_get_noresume(data->sysmmu); if (pm_runtime_active(data->sysmmu)) __sysmmu_enable(data); pm_runtime_put(data->sysmmu); } - mutex_unlock(&owner->rpm_lock); + mutex_unlock(&dev_data->rpm_lock); dev_dbg(dev, "%s: Attached IOMMU with pgtable %pa\n", __func__, &pagetable); @@ -1237,7 +1251,6 @@ static phys_addr_t exynos_iommu_iova_to_phys(struct iommu_domain *iommu_domain, static int exynos_iommu_add_device(struct device *dev) { - struct exynos_iommu_owner *owner = dev->archdata.iommu; struct sysmmu_drvdata *data; struct iommu_group *group; @@ -1249,7 +1262,7 @@ static int exynos_iommu_add_device(struct device *dev) if (IS_ERR(group)) return PTR_ERR(group); - list_for_each_entry(data, &owner->controllers, owner_node) { + for_each_sysmmu(dev, data) { /* * SYSMMU will be runtime activated via device link * (dependency) to its master device, so there are no @@ -1261,37 +1274,39 @@ static int exynos_iommu_add_device(struct device *dev) } iommu_group_put(group); + data = dev->archdata.iommu; + iommu_device_link(&data->iommu, dev); + return 0; } static void exynos_iommu_remove_device(struct device *dev) { - struct exynos_iommu_owner *owner = dev->archdata.iommu; - struct sysmmu_drvdata *data; + struct sysmmu_drvdata *data = dev->archdata.iommu; if (!has_sysmmu(dev)) return; - if (owner->domain) { + if (data->domain) { struct iommu_group *group = iommu_group_get(dev); if (group) { - WARN_ON(owner->domain != + WARN_ON(&data->domain->domain != iommu_group_default_domain(group)); - exynos_iommu_detach_device(owner->domain, dev); + __exynos_iommu_detach_device(data->domain, dev); iommu_group_put(group); } } + iommu_device_unlink(&data->iommu, dev); iommu_group_remove_device(dev); - list_for_each_entry(data, &owner->controllers, owner_node) + for_each_sysmmu(dev, data) device_link_del(data->link); } static int exynos_iommu_of_xlate(struct device *dev, struct of_phandle_args *spec) { - struct exynos_iommu_owner *owner = dev->archdata.iommu; struct platform_device *sysmmu = of_find_device_by_node(spec->np); struct sysmmu_drvdata *data, *entry; @@ -1302,22 +1317,28 @@ static int exynos_iommu_of_xlate(struct device *dev, if (!data) return -ENODEV; - if (!owner) { - owner = kzalloc(sizeof(*owner), GFP_KERNEL); - if (!owner) - return -ENOMEM; + data->master = dev; - INIT_LIST_HEAD(&owner->controllers); - mutex_init(&owner->rpm_lock); - dev->archdata.iommu = owner; + if (!dev->archdata.iommu) { + WARN_ON(data->next != NULL); + + /* SYSMMU list is empty - add drvdata and return */ + data->next = ERR_PTR(-ENODEV); + dev->archdata.iommu = data; + + return 0; } - list_for_each_entry(entry, &owner->controllers, owner_node) + /* Check if SYSMMU is already in the list */ + for_each_sysmmu(dev, entry) if (entry == data) return 0; - list_add_tail(&data->owner_node, &owner->controllers); - data->master = dev; + /* Not in the list yet */ + WARN_ON(data->next != NULL); + entry = dev->archdata.iommu; + data->next = entry->next; + entry->next = data; return 0; } -- 2.25.1