Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp16939pxv; Wed, 21 Jul 2021 14:11:33 -0700 (PDT) X-Google-Smtp-Source: ABdhPJx9GbjXZeRuF3m89NcZ3dq/dH6UhKtNqaE+cjOsPHWFn+98aBSwcDAtlATDFW+0aMDa01gM X-Received: by 2002:a5d:89ce:: with SMTP id a14mr19603868iot.127.1626901527228; Wed, 21 Jul 2021 14:05:27 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626901527; cv=none; d=google.com; s=arc-20160816; b=s38gC9gthzXBerzwv7W+tzrbSydL+XbxzPHh8lsDt+uOgdZ3JS9ih3ocqyatqnqJle 1+QcBaADozszu09HlrwOmxlkfHg0xgBUX9PZhGAtiiK7vFDdq7Jx7Sly2r243TW4sk4P JP7VJrsU/cup6ZdT8roBsOg5fyk5pz0diq3lI9GZ3O/CmU1+x3GCwLjRnsd2fOcloXz6 9Qhf6b0yhz56Hk5vdf4725tVc4zY/4D55KZ0pddIomGZw9DCF7l0/fNFvchgCOgbGr34 4CL6zLqSQq8PqkfCxm/CMd4brVPCQFU9L27R5KyhwzexvMCXbeMC1XUSdWoDzOlTCZN2 qsCQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=pcQKZNCp6U9+Sk9F/lDLeM/Rbq4rVjhf6Fd05/gE7Ec=; b=0rh/R+FFOlrUyznq/jdsgG7M+FE+lIDmQh/pPgRyfffgNQlDEb2oDAsPxz15oCxmuv 2uRNX6mTcV1iWVYqZa2NptK124QtXmI1PmIrVhnhkOnbGz8zsnkqkJo5DZy58V/xu0ce 1a0SwhI+iHnKRw6RKTcHpu18nhcorNNdssYYjxZxBQW+ZvueBSrCHcjdF4pT/cQ3O9w4 Cocc+mRiEXYxAPIcoJV8AQBtWXTlSjTQs5Px7Xfzj70s1kUn8MTkQ+Sj5a2SeWrW+jDA SfPghQjLuD75E3jgXjUSPyKQd6muJ9XFEdnBSGAkaUwRUfZBI3rwFlzLcqY3Wta8aDsy K1ZA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h17si16308751jav.110.2021.07.21.14.05.14; Wed, 21 Jul 2021 14:05:27 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238832AbhGURlO (ORCPT + 99 others); Wed, 21 Jul 2021 13:41:14 -0400 Received: from foss.arm.com ([217.140.110.172]:33468 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238453AbhGURkm (ORCPT ); Wed, 21 Jul 2021 13:40:42 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6A3F411FB; Wed, 21 Jul 2021 11:21:18 -0700 (PDT) Received: from 010265703453.arm.com (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id EC58A3F694; Wed, 21 Jul 2021 11:21:16 -0700 (PDT) From: Robin Murphy To: joro@8bytes.org, will@kernel.org Cc: iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, baolu.lu@linux.intel.com, john.garry@huawei.com, dianders@chromium.org Subject: [PATCH 19/23] iommu: Expose DMA domain strictness via sysfs Date: Wed, 21 Jul 2021 19:20:30 +0100 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The sysfs interface for default domain types exists primarily so users can choose the performance/security tradeoff relevant to their own workload. As such, the choice between the policies for DMA domains fits perfectly as an additional point on that scale - downgrading a particular device from a strict default to non-strict may be enough to let it reach the desired level of performance, while still retaining more peace of mind than with a wide-open identity domain. Now that we've abstracted non-strict mode as a distinct type of DMA domain, allow it to be chosen through the user interface as well. Signed-off-by: Robin Murphy --- Documentation/ABI/testing/sysfs-kernel-iommu_groups | 2 ++ drivers/iommu/iommu.c | 2 ++ 2 files changed, 4 insertions(+) diff --git a/Documentation/ABI/testing/sysfs-kernel-iommu_groups b/Documentation/ABI/testing/sysfs-kernel-iommu_groups index eae2f1c1e11e..43ba764ba5b7 100644 --- a/Documentation/ABI/testing/sysfs-kernel-iommu_groups +++ b/Documentation/ABI/testing/sysfs-kernel-iommu_groups @@ -42,6 +42,8 @@ Description: /sys/kernel/iommu_groups//type shows the type of default ======== ====================================================== DMA All the DMA transactions from the device in this group are translated by the iommu. + DMA-FQ As above, but using batched invalidation to lazily + remove translations after use. identity All the DMA transactions from the device in this group are not translated by the iommu. auto Change to the type the device was booted with. diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c index d7eaacae0944..d3b562a33ac4 100644 --- a/drivers/iommu/iommu.c +++ b/drivers/iommu/iommu.c @@ -3195,6 +3195,8 @@ static ssize_t iommu_group_store_type(struct iommu_group *group, req_type = IOMMU_DOMAIN_IDENTITY; else if (sysfs_streq(buf, "DMA")) req_type = IOMMU_DOMAIN_DMA; + else if (sysfs_streq(buf, "DMA-FQ")) + req_type = IOMMU_DOMAIN_DMA_FQ; else if (sysfs_streq(buf, "auto")) req_type = 0; else -- 2.25.1