Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp3863020imw; Mon, 11 Jul 2022 18:08:06 -0700 (PDT) X-Google-Smtp-Source: AGRyM1s2HNgObqj1RDYIab7Tc56/avvdePyLMDag2yytGDHgeE1OF5dkaH2aUgI///jt27qvFYWI X-Received: by 2002:a63:4903:0:b0:416:97f:6115 with SMTP id w3-20020a634903000000b00416097f6115mr6300232pga.198.1657588086320; Mon, 11 Jul 2022 18:08:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657588086; cv=none; d=google.com; s=arc-20160816; b=0aYPASyCumsjv85ChYCA69p337UDLQLWsYQRPP86kuwFkXH5V9Pn2cg/Z9Ph9Ai97a iGT2dNw4EHCjg1bwc0gIf3qvn876iiUFydpkPtr5afn8dgEVXZvn9KlYM2Ll4wM5OtcR aXR4+BvLa5VkWS47ADyc0reZDUHEig9DreqdGccZNB+hLNU5BsdMjEqJ9MYVDPtl4sAv xOm1QXlfN9g1lgek78bU2+dAaqjhKu9aX15SX2bDvJ5d+7Wh2vBjdP20NpK666wZDN5w O74JH3xL7miQepyLzzEuqffsLq1QqjS0CKzog+gz6atIwykf5oT+froIgLQA2q/EM6jq H4mA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=kqcjAr7PI2qMOQyMoXdzMPWGyIkakrHb2pvEmkR0WJo=; b=XD5spUFx4DIUh0mg77183nYUJLpd8uyxHAgpUQEFSYrebLHQUg6Se1pQsXpq9aIZ86 GM4paTjnkyr1zitITHWULlNLQx7f0nei/oikRMoxBUdX8u5Jqa532+IneH2QvP5B/MOz cIfiV0cmwypuhBIzjWs9pmR60ohNdY9LNeeifs+dK1Y/tLfBWwZwCiUiLMfktjPrWthO w2A1GQcwdAcHEsQFWvqrRzvHE6U0BFhRp96FvGLRtwVpPPW3AurGM/YQ+nTyZqprXmGZ OPXc0btVBs1aMmByD20KAjlLLYh8+jQEhBi+ZlMKt0YOtnRgwhtTClaXVQKWl6CMI5QS hjlQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=DNAcByYZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id pi19-20020a17090b1e5300b001ec99c0be33si13433867pjb.19.2022.07.11.18.07.54; Mon, 11 Jul 2022 18:08:06 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=DNAcByYZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231145AbiGLAOe (ORCPT + 99 others); Mon, 11 Jul 2022 20:14:34 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50234 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229476AbiGLAOP (ORCPT ); Mon, 11 Jul 2022 20:14:15 -0400 Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 033611FCC0 for ; Mon, 11 Jul 2022 17:13:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1657584838; x=1689120838; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=JZxZdCVM9VdvZ5C9SB8NDFeX/+e0lgtKOLXXi+obFWY=; b=DNAcByYZuiehcwD/g6UC9+Snn/PEfITXECKboDU39RsMEXl7F0ibR1nG F5t8w0i4kFeABGQhBIj2LY/lcyB8ayUfgwVQNLtpPDhGuRBhTvqlcYk8M V6fw5RGgWBvH8m4xOFUZy96my/ZpR/RerEILK5pI4MyiNrvVfZoZCKYAZ aaqwBrh6LjdGoMPqRF9ILh4VAeKW2tqQ4XurIkQHwzTEzsM2sFgrAfOas xLzoXpUsA9pqBQl4PB/SuatfrdOo6OBdZToqZlci0Vg2T8nesa+B9kw7l 1uIr9BkTbBVJz1Zd4tVvfeUkHQgLLpXdaMLmVf4cFhRQEoPGUoo86Mgaw g==; X-IronPort-AV: E=McAfee;i="6400,9594,10405"; a="284827958" X-IronPort-AV: E=Sophos;i="5.92,264,1650956400"; d="scan'208";a="284827958" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 11 Jul 2022 17:13:56 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.92,264,1650956400"; d="scan'208";a="592445746" Received: from allen-box.sh.intel.com ([10.239.159.48]) by orsmga007.jf.intel.com with ESMTP; 11 Jul 2022 17:13:54 -0700 From: Lu Baolu To: Joerg Roedel Cc: iommu@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH 10/25] iommu/vt-d: Remove clearing translation data in disable_dmar_iommu() Date: Tue, 12 Jul 2022 08:08:53 +0800 Message-Id: <20220712000908.3431936-11-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20220712000908.3431936-1-baolu.lu@linux.intel.com> References: <20220712000908.3431936-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_HI,SPF_HELO_NONE, SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org The disable_dmar_iommu() is called when IOMMU initialization fails or the IOMMU is hot-removed from the system. In both cases, there is no need to clear the IOMMU translation data structures for devices. On the initialization path, the device probing only happens after the IOMMU is initialized successfully, hence there're no translation data structures. On the hot-remove path, there is no real use case where the IOMMU is hot-removed, but the devices that it manages are still alive in the system. The translation data structures were torn down during device release, hence there's no need to repeat it in IOMMU hot-remove path either. This removes the unnecessary code and only leaves a check. Signed-off-by: Lu Baolu Reviewed-by: Kevin Tian Link: https://lore.kernel.org/r/20220706025524.2904370-3-baolu.lu@linux.intel.com --- drivers/iommu/intel/pasid.h | 1 + drivers/iommu/intel/iommu.c | 21 +++++++-------------- 2 files changed, 8 insertions(+), 14 deletions(-) diff --git a/drivers/iommu/intel/pasid.h b/drivers/iommu/intel/pasid.h index bf5b937848b4..20c54e50f533 100644 --- a/drivers/iommu/intel/pasid.h +++ b/drivers/iommu/intel/pasid.h @@ -39,6 +39,7 @@ * only and pass-through transfer modes. */ #define FLPT_DEFAULT_DID 1 +#define NUM_RESERVED_DID 2 /* * The SUPERVISOR_MODE flag indicates a first level translation which diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index 3b6571681bdd..43aaec5bdd84 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -1716,23 +1716,16 @@ static int iommu_init_domains(struct intel_iommu *iommu) static void disable_dmar_iommu(struct intel_iommu *iommu) { - struct device_domain_info *info, *tmp; - unsigned long flags; - if (!iommu->domain_ids) return; - spin_lock_irqsave(&device_domain_lock, flags); - list_for_each_entry_safe(info, tmp, &device_domain_list, global) { - if (info->iommu != iommu) - continue; - - if (!info->dev || !info->domain) - continue; - - __dmar_remove_one_dev_info(info); - } - spin_unlock_irqrestore(&device_domain_lock, flags); + /* + * All iommu domains must have been detached from the devices, + * hence there should be no domain IDs in use. + */ + if (WARN_ON(bitmap_weight(iommu->domain_ids, cap_ndoms(iommu->cap)) + > NUM_RESERVED_DID)) + return; if (iommu->gcmd & DMA_GCMD_TE) iommu_disable_translation(iommu); -- 2.25.1