With the def_domain_type introduced, iommu default domain framework
is now able to determine a proper default domain for a group. Let's
use this to configure a group's default domain.

If unlikely a device requires a special default domain type other
than that in use, iommu probe procedure will either allocate a new
domain according to the specified domain type, or (if the group has
other devices sitting in it) change the default domain. The vendor
iommu driver which exposes the def_domain_type callback should
guarantee that there're no multiple devices in a same group requires
differnt types of default domain.

Signed-off-by: Sai Praneeth Prakhya <sai.praneeth.prak...@intel.com>
Signed-off-by: Lu Baolu <baolu...@linux.intel.com>
---
 drivers/iommu/iommu.c | 103 ++++++++++++++++++++++++++++++++++++++++--
 1 file changed, 100 insertions(+), 3 deletions(-)

diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
index 3e3528436e0b..8db670196706 100644
--- a/drivers/iommu/iommu.c
+++ b/drivers/iommu/iommu.c
@@ -1361,6 +1361,89 @@ struct iommu_group *fsl_mc_device_group(struct device 
*dev)
 }
 EXPORT_SYMBOL_GPL(fsl_mc_device_group);
 
+static int pre_def_domain_change(struct device *dev, void *data)
+{
+       struct iommu_group *group = data;
+
+       if (device_is_bound(dev))
+               return -EINVAL;
+
+       return iommu_group_create_direct_mappings(group, dev);
+}
+
+static int post_def_domain_change(struct device *dev, void *data)
+{
+       struct iommu_domain *domain = data;
+
+       return domain->ops->add_device(dev);
+}
+
+/**
+ * Changes the default domain of a group
+ *
+ * @group: The group for which the default domain should be changed
+ * @type: The new default domain type
+ *
+ * The caller should hold the group->mutex before call into this function.
+ * Returns 0 on success and error code on failure.
+ */
+static int iommu_group_change_def_domain(struct iommu_group *group, int type)
+{
+       struct iommu_domain *new, *old;
+       const struct iommu_ops *ops;
+       int ret;
+
+       if ((type != IOMMU_DOMAIN_IDENTITY && type != IOMMU_DOMAIN_DMA) ||
+           !group->default_domain || type == group->default_domain->type ||
+           !group->default_domain->ops)
+               return -EINVAL;
+
+       if (group->domain != group->default_domain)
+               return -EBUSY;
+
+       iommu_group_ref_get(group);
+       old = group->default_domain;
+       ops = group->default_domain->ops;
+
+       /* Allocate a new domain of requested type. */
+       new = ops->domain_alloc(type);
+       if (!new) {
+               iommu_group_put(group);
+               return -ENOMEM;
+       }
+       new->type = type;
+       new->ops = ops;
+       new->pgsize_bitmap = old->pgsize_bitmap;
+       group->default_domain = new;
+       group->domain = new;
+
+       ret = __iommu_group_for_each_dev(group, group, pre_def_domain_change);
+       if (ret)
+               goto err_out;
+
+       ret = __iommu_attach_group(new, group);
+       if (ret)
+               goto err_out;
+
+       ret = __iommu_group_for_each_dev(group, new, post_def_domain_change);
+       if (ret)
+               goto err_out;
+
+       iommu_domain_free(old);
+       iommu_group_put(group);
+
+       return 0;
+
+err_out:
+       group->default_domain = old;
+       group->domain = old;
+       __iommu_attach_group(old, group);
+       iommu_domain_free(new);
+       iommu_group_put(group);
+
+       return ret;
+}
+
 /**
  * iommu_group_get_for_dev - Find or create the IOMMU group for a device
  * @dev: target device
@@ -1375,6 +1458,7 @@ struct iommu_group *iommu_group_get_for_dev(struct device 
*dev)
 {
        const struct iommu_ops *ops = dev->bus->iommu_ops;
        struct iommu_group *group;
+       int dev_def_type = 0;
        int ret;
 
        group = iommu_group_get(dev);
@@ -1391,20 +1475,24 @@ struct iommu_group *iommu_group_get_for_dev(struct 
device *dev)
        if (IS_ERR(group))
                return group;
 
+       if (ops->def_domain_type)
+               dev_def_type = ops->def_domain_type(dev);
+
        /*
         * Try to allocate a default domain - needs support from the
         * IOMMU driver.
         */
        if (!group->default_domain) {
                struct iommu_domain *dom;
+               int type = dev_def_type ? : iommu_def_domain_type;
 
-               dom = __iommu_domain_alloc(dev->bus, iommu_def_domain_type);
-               if (!dom && iommu_def_domain_type != IOMMU_DOMAIN_DMA) {
+               dom = __iommu_domain_alloc(dev->bus, type);
+               if (!dom && type != IOMMU_DOMAIN_DMA) {
                        dom = __iommu_domain_alloc(dev->bus, IOMMU_DOMAIN_DMA);
                        if (dom) {
                                dev_warn(dev,
                                         "failed to allocate default IOMMU 
domain of type %u; falling back to IOMMU_DOMAIN_DMA",
-                                        iommu_def_domain_type);
+                                        type);
                        }
                }
 
@@ -1418,6 +1506,15 @@ struct iommu_group *iommu_group_get_for_dev(struct 
device *dev)
                                              DOMAIN_ATTR_DMA_USE_FLUSH_QUEUE,
                                              &attr);
                }
+       } else if (dev_def_type &&
+                  dev_def_type != group->default_domain->type) {
+               mutex_lock(&group->mutex);
+               ret = iommu_group_change_def_domain(group, dev_def_type);
+               mutex_unlock(&group->mutex);
+               if (ret) {
+                       iommu_group_put(group);
+                       return ERR_PTR(ret);
+               }
        }
 
        ret = iommu_group_add_device(group, dev);
-- 
2.17.1

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Reply via email to