Add iommu ops for enabling and disabling multiple domains per
device.

Cc: Ashok Raj <[email protected]>
Cc: Jacob Pan <[email protected]>
Cc: Kevin Tian <[email protected]>
Signed-off-by: Lu Baolu <[email protected]>
Signed-off-by: Liu Yi L <[email protected]>
---
 drivers/iommu/intel-iommu.c | 65 ++++++++++++++++++++++++++++++++++++-
 include/linux/intel-iommu.h |  1 +
 2 files changed, 65 insertions(+), 1 deletion(-)

diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c
index 298f7a3fafe8..2c86ac71c774 100644
--- a/drivers/iommu/intel-iommu.c
+++ b/drivers/iommu/intel-iommu.c
@@ -2476,6 +2476,7 @@ static struct dmar_domain 
*dmar_insert_one_dev_info(struct intel_iommu *iommu,
        info->domain = domain;
        info->iommu = iommu;
        info->pasid_table = NULL;
+       info->auxd_enabled = 0;
 
        if (dev && dev_is_pci(dev)) {
                struct pci_dev *pdev = to_pci_dev(info->dev);
@@ -5353,13 +5354,74 @@ static int intel_iommu_get_dev_attr(struct device *dev,
                                    enum iommu_dev_attr attr, void *data)
 {
        int ret = 0;
-       bool *auxd_capable;
+       struct device_domain_info *info;
+       bool *auxd_capable, *auxd_enabled;
 
        switch (attr) {
        case IOMMU_DEV_ATTR_AUXD_CAPABILITY:
                auxd_capable = data;
                *auxd_capable = scalable_mode_support();
                break;
+       case IOMMU_DEV_ATTR_AUXD_ENABLED:
+               auxd_enabled = data;
+               info = dev->archdata.iommu;
+               *auxd_enabled = info && info->auxd_enabled;
+               break;
+       default:
+               ret = -EINVAL;
+               break;
+       }
+
+       return ret;
+}
+
+static int intel_iommu_enable_auxd(struct device *dev)
+{
+       struct device_domain_info *info;
+       struct dmar_domain *domain;
+       unsigned long flags;
+
+       if (!scalable_mode_support())
+               return -ENODEV;
+
+       domain = get_valid_domain_for_dev(dev);
+       if (!domain)
+               return -ENODEV;
+
+       spin_lock_irqsave(&device_domain_lock, flags);
+       info = dev->archdata.iommu;
+       info->auxd_enabled = 1;
+       spin_unlock_irqrestore(&device_domain_lock, flags);
+
+       return 0;
+}
+
+static int intel_iommu_disable_auxd(struct device *dev)
+{
+       struct device_domain_info *info;
+       unsigned long flags;
+
+       spin_lock_irqsave(&device_domain_lock, flags);
+       info = dev->archdata.iommu;
+       if (!WARN_ON(!info))
+               info->auxd_enabled = 0;
+       spin_unlock_irqrestore(&device_domain_lock, flags);
+
+       return 0;
+}
+
+static int intel_iommu_set_dev_attr(struct device *dev,
+                                   enum iommu_dev_attr attr, void *data)
+{
+       int ret = 0;
+
+       switch (attr) {
+       case IOMMU_DEV_ATTR_AUXD_ENABLE:
+               ret = intel_iommu_enable_auxd(dev);
+               break;
+       case IOMMU_DEV_ATTR_AUXD_DISABLE:
+               ret = intel_iommu_disable_auxd(dev);
+               break;
        default:
                ret = -EINVAL;
                break;
@@ -5383,6 +5445,7 @@ const struct iommu_ops intel_iommu_ops = {
        .put_resv_regions       = intel_iommu_put_resv_regions,
        .device_group           = pci_device_group,
        .get_dev_attr           = intel_iommu_get_dev_attr,
+       .set_dev_attr           = intel_iommu_set_dev_attr,
        .pgsize_bitmap          = INTEL_IOMMU_PGSIZES,
 };
 
diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h
index d174724e131f..6b198e13e75e 100644
--- a/include/linux/intel-iommu.h
+++ b/include/linux/intel-iommu.h
@@ -552,6 +552,7 @@ struct device_domain_info {
        u8 pri_enabled:1;
        u8 ats_supported:1;
        u8 ats_enabled:1;
+       u8 auxd_enabled:1;      /* Multiple domains per device */
        u8 ats_qdep;
        struct device *dev; /* it's NULL for PCIe-to-PCI bridge */
        struct intel_iommu *iommu; /* IOMMU used by this device */
-- 
2.17.1

_______________________________________________
iommu mailing list
[email protected]
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Reply via email to