Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5360688pxv; Wed, 28 Jul 2021 09:00:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwOl0Y9CYdNNzx8Ig7fJcB90vuJRRjYGASfwvo2PgL32EhVOvmUZB2qULtMJkEZi1lfypwf X-Received: by 2002:a92:8707:: with SMTP id m7mr356027ild.177.1627488001091; Wed, 28 Jul 2021 09:00:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627488001; cv=none; d=google.com; s=arc-20160816; b=M1lS068JgIUN4XcI7N4hmZR8Fhk7tZ9FJg7dV/2vw5geIlQdbCEUXfojPV20433fSY jhAANJktjkGS/k9R9mTuL3GMCoxID5TO7YloaMB7w1225p0u8DaHJhSWXySQrHPb1TAY eW/XH7d2r+UVntNy6fxw4mFFxWy8B/ew4icO2hgRrbStaBX8SFelA0EDDTnFjjW27zKv tke6tjNWElGvb+kHfcypKlf9cCXZSPJCj7s5FT0TSsbxErgHoe8/d4AxAq2diPIwrblg 8dMmRvWKv0tYc+DoZ7SolbYms3XjabUhWyqVyl3BKO7/6ZNDfUtZvddgxyxWufygx5eJ +FZw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from; bh=DF7XcMx11iO5x7oS/wBCFtBQiZSD5kKb630cdzBEkHk=; b=VnAy3VPz9acl9plXf+BJ+NaMGXDXFHsFNF911i+mSP3g46zGr0UEsRaw9rB7SevLTP /NOWZNK23uxs5qkdggYOizjMsJs0Qx3dvUH8t6aFPYj5ABJOLhows1L3xE+H1laW4wa/ m552xQgNMzRTLLgTRoiLIn2gWh9i1gDcjrDtTvew+q67mm0czD/5HW5YnHMtFzyDRxL5 Y59Kd5nxFdGw8k5yE6N1eJLZ1enJP0t+7zs7IeejZsQC/dpm07cyvIKOU1ydm31Tqb9u +Ha5tembkYQy3n9XVv3A4BQcWCMK5tAh9BTsiiXdFOVesD2w/iDaKi/YQoVqFXO1C/l/ pWaw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id r20si218594jan.108.2021.07.28.08.59.48; Wed, 28 Jul 2021 09:00:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235710AbhG1P7G (ORCPT + 99 others); Wed, 28 Jul 2021 11:59:06 -0400 Received: from foss.arm.com ([217.140.110.172]:59134 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229880AbhG1P7F (ORCPT ); Wed, 28 Jul 2021 11:59:05 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 4EEFA1FB; Wed, 28 Jul 2021 08:59:03 -0700 (PDT) Received: from 010265703453.arm.com (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id C8AF33F70D; Wed, 28 Jul 2021 08:59:00 -0700 (PDT) From: Robin Murphy To: joro@8bytes.org, will@kernel.org Cc: iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, baolu.lu@linux.intel.com, john.garry@huawei.com, dianders@chromium.org, Marek Szyprowski , Yoshihiro Shimoda , Geert Uytterhoeven , Yong Wu , Heiko Stuebner , Chunyan Zhang , Maxime Ripard , Jean-Philippe Brucker Subject: [PATCH v2 00/24] iommu: Refactor DMA domain strictness Date: Wed, 28 Jul 2021 16:58:21 +0100 Message-Id: X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi all, Here's v2 where things start to look more realistic, hence the expanded CC list. The patches are now based on the current iommu/core branch to take John's iommu_set_dma_strict() cleanup into account. The series remiains in two (or possibly 3) logical parts - for people CC'd on cookie cleanup patches, the later parts should not affect you since your drivers don't implement non-strict mode anyway; the cleanup is all pretty straightforward, but please do yell at me if I've managed to let a silly mistake slip through and broken your driver. This time I have also build-tested x86 as well as arm64 :) Changes in v2: - Add iommu_is_dma_domain() helper to abstract flag check (and help avoid silly typos like the one in v1). - Tweak a few commit messages for spelling and (hopefully) clarity. - Move the iommu_create_device_direct_mappings() update to patch #14 where it should have been. - Rewrite patch #20 as a conversion of the now-existing option. - Clean up the ops->flush_iotlb_all check which is also made redundant by the new domain type - Add patch #24, which is arguably tangential, but it was something I spotted during the rebase, so... Once again, the whole lot is available on a branch here: https://gitlab.arm.com/linux-arm/linux-rm/-/tree/iommu/fq Thanks, Robin. CC: Marek Szyprowski CC: Yoshihiro Shimoda CC: Geert Uytterhoeven CC: Yong Wu CC: Heiko Stuebner CC: Chunyan Zhang CC: Chunyan Zhang CC: Maxime Ripard CC: Jean-Philippe Brucker Robin Murphy (24): iommu: Pull IOVA cookie management into the core iommu/amd: Drop IOVA cookie management iommu/arm-smmu: Drop IOVA cookie management iommu/vt-d: Drop IOVA cookie management iommu/exynos: Drop IOVA cookie management iommu/ipmmu-vmsa: Drop IOVA cookie management iommu/mtk: Drop IOVA cookie management iommu/rockchip: Drop IOVA cookie management iommu/sprd: Drop IOVA cookie management iommu/sun50i: Drop IOVA cookie management iommu/virtio: Drop IOVA cookie management iommu/dma: Unexport IOVA cookie management iommu/dma: Remove redundant "!dev" checks iommu: Introduce explicit type for non-strict DMA domains iommu/amd: Prepare for multiple DMA domain types iommu/arm-smmu: Prepare for multiple DMA domain types iommu/vt-d: Prepare for multiple DMA domain types iommu: Express DMA strictness via the domain type iommu: Expose DMA domain strictness via sysfs iommu: Merge strictness and domain type configs iommu/dma: Factor out flush queue init iommu: Allow enabling non-strict mode dynamically iommu/arm-smmu: Allow non-strict in pgtable_quirks interface iommu: Only log strictness for DMA domains .../ABI/testing/sysfs-kernel-iommu_groups | 2 + drivers/iommu/Kconfig | 80 +++++++++---------- drivers/iommu/amd/iommu.c | 21 +---- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 25 ++++-- drivers/iommu/arm/arm-smmu/arm-smmu.c | 29 ++++--- drivers/iommu/arm/arm-smmu/qcom_iommu.c | 8 -- drivers/iommu/dma-iommu.c | 44 +++++----- drivers/iommu/exynos-iommu.c | 18 +---- drivers/iommu/intel/iommu.c | 23 ++---- drivers/iommu/iommu.c | 53 +++++++----- drivers/iommu/ipmmu-vmsa.c | 27 +------ drivers/iommu/mtk_iommu.c | 6 -- drivers/iommu/rockchip-iommu.c | 11 +-- drivers/iommu/sprd-iommu.c | 6 -- drivers/iommu/sun50i-iommu.c | 12 +-- drivers/iommu/virtio-iommu.c | 8 -- include/linux/dma-iommu.h | 9 ++- include/linux/iommu.h | 15 +++- 18 files changed, 171 insertions(+), 226 deletions(-) -- 2.25.1