Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5364044pxv; Wed, 28 Jul 2021 09:03:26 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxEa+SfvGB+k0A/wntftsmky2Ygzrim3sJAfSxiidnxfYSyNtmpS8yb5XZRzePUMBNmKlvp X-Received: by 2002:a17:907:c26:: with SMTP id ga38mr224599ejc.38.1627488206351; Wed, 28 Jul 2021 09:03:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627488206; cv=none; d=google.com; s=arc-20160816; b=HeVjiYiKS+xKLMUHPb9RIZfpMJeHv7xB8kD0/c6metC2V4IZnfJPvlVpXIv3Xth/6/ 5wAFNw9GSNc+N3OS/juEnQV+YnqCoh893OMWgP+2f1jwcyC36bE+cyMdZH+JYx2mjxhN mv1LczQtKfJsA4TpHE/iDqqcGYl7tu+mmbyHzRwZWDz6QCBHOr33KaswQoJVM/+KiZ07 s52+LNzkAVj2xdq0y+1xbUQLgU+aCVVBPo/aEWSNa6wBpKLz5zgkB7m5UgSeAFwQOAyJ XmEhVVyJ5mQOGXYY50kL+QtGS+I9H31xVI8uAxX8D/qYnlmssswz+EX/KuwIj+9/PNDG YLIw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from; bh=0eLJTilxbeAbtz5sSfMrVZ2Uk2yn5IsNg0Ks5amkYG8=; b=nPhCtV8oon5nCSDqKcxtJinebdvSwhNOiM5kSzfHgBIYdWbkEpGMH0eZctP7nfre36 t1hhJ6koHnk7M4fExh0+alfm8LGzxC7ExoXUdjQ2/NRVVHV5Z1UVYjtfCfvXj2qaApEM dvx8Xg+FY7DIVFZ5mzwQFO/H3XuubhDzMHzCE8ULFr0GmeXidWHaS4n+BAeKvBLkF3Kg 5DBD+vbgn5fBbL83dY6iMPPzsoyJfs/aGfZe1VIdtnRrBu0gkEEfvCI5G5YCLv+RZkbO 0u1u7wLgm2l/HK9Oikpx6ErdVhXZoPAgyuCtHJdFnGms6Ni3K4yNxAHmVBgr9lPDpthY SIoA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id g7si183897ejh.141.2021.07.28.09.03.02; Wed, 28 Jul 2021 09:03:26 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237502AbhG1QAO (ORCPT + 99 others); Wed, 28 Jul 2021 12:00:14 -0400 Received: from foss.arm.com ([217.140.110.172]:59576 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S237517AbhG1P7p (ORCPT ); Wed, 28 Jul 2021 11:59:45 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 6C60713A1; Wed, 28 Jul 2021 08:59:43 -0700 (PDT) Received: from 010265703453.arm.com (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id F0CB83F70D; Wed, 28 Jul 2021 08:59:41 -0700 (PDT) From: Robin Murphy To: joro@8bytes.org, will@kernel.org Cc: iommu@lists.linux-foundation.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, suravee.suthikulpanit@amd.com, baolu.lu@linux.intel.com, john.garry@huawei.com, dianders@chromium.org Subject: [PATCH v2 21/24] iommu/dma: Factor out flush queue init Date: Wed, 28 Jul 2021 16:58:42 +0100 Message-Id: X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Factor out flush queue setup from the initial domain init so that we can potentially trigger it from sysfs later on in a domain's lifetime. Signed-off-by: Robin Murphy --- drivers/iommu/dma-iommu.c | 30 ++++++++++++++++++++---------- include/linux/dma-iommu.h | 9 ++++++--- 2 files changed, 26 insertions(+), 13 deletions(-) diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c index 7f3968865387..304a3ec71223 100644 --- a/drivers/iommu/dma-iommu.c +++ b/drivers/iommu/dma-iommu.c @@ -310,6 +310,25 @@ static bool dev_is_untrusted(struct device *dev) return dev_is_pci(dev) && to_pci_dev(dev)->untrusted; } +int iommu_dma_init_fq(struct iommu_domain *domain) +{ + struct iommu_dma_cookie *cookie = domain->iova_cookie; + + if (domain->type != IOMMU_DOMAIN_DMA_FQ) + return -EINVAL; + if (cookie->fq_domain) + return 0; + + if (init_iova_flush_queue(&cookie->iovad, iommu_dma_flush_iotlb_all, + iommu_dma_entry_dtor)) { + pr_warn("iova flush queue initialization failed\n"); + domain->type = IOMMU_DOMAIN_DMA; + return -ENODEV; + } + cookie->fq_domain = domain; + return 0; +} + /** * iommu_dma_init_domain - Initialise a DMA mapping domain * @domain: IOMMU domain previously prepared by iommu_get_dma_cookie() @@ -362,16 +381,7 @@ static int iommu_dma_init_domain(struct iommu_domain *domain, dma_addr_t base, } init_iova_domain(iovad, 1UL << order, base_pfn); - - if (domain->type == IOMMU_DOMAIN_DMA_FQ && !cookie->fq_domain) { - if (init_iova_flush_queue(iovad, iommu_dma_flush_iotlb_all, - iommu_dma_entry_dtor)) { - pr_warn("iova flush queue initialization failed\n"); - domain->type = IOMMU_DOMAIN_DMA; - } else { - cookie->fq_domain = domain; - } - } + iommu_dma_init_fq(domain); return iova_reserve_iommu_regions(dev, domain); } diff --git a/include/linux/dma-iommu.h b/include/linux/dma-iommu.h index 758ca4694257..81ab647f1618 100644 --- a/include/linux/dma-iommu.h +++ b/include/linux/dma-iommu.h @@ -20,6 +20,7 @@ void iommu_put_dma_cookie(struct iommu_domain *domain); /* Setup call for arch DMA mapping code */ void iommu_setup_dma_ops(struct device *dev, u64 dma_base, u64 dma_limit); +int iommu_dma_init_fq(struct iommu_domain *domain); /* The DMA API isn't _quite_ the whole story, though... */ /* @@ -37,9 +38,6 @@ void iommu_dma_compose_msi_msg(struct msi_desc *desc, void iommu_dma_get_resv_regions(struct device *dev, struct list_head *list); -void iommu_dma_free_cpu_cached_iovas(unsigned int cpu, - struct iommu_domain *domain); - extern bool iommu_dma_forcedac; #else /* CONFIG_IOMMU_DMA */ @@ -54,6 +52,11 @@ static inline void iommu_setup_dma_ops(struct device *dev, u64 dma_base, { } +static inline int iommu_dma_init_fq(struct iommu_domain *domain) +{ + return -EINVAL; +} + static inline int iommu_get_dma_cookie(struct iommu_domain *domain) { return -ENODEV; -- 2.25.1