Flush queues are specific to DMA ops, which are now handled exclusively
by iommu-dma. As such, now that the historical artefacts from being
shared directly with drivers have been cleaned up, move the flush queue
code into iommu-dma itself to get it out of the way of other IOVA users.

This is pure code movement with no functional change; refactoring to
clean up the headers and definitions will follow.

Reviewed-by: John Garry <john.ga...@huawei.com>
Signed-off-by: Robin Murphy <robin.mur...@arm.com>
---
 drivers/iommu/dma-iommu.c | 177 +++++++++++++++++++++++++++++++++++++-
 drivers/iommu/iova.c      | 175 -------------------------------------
 2 files changed, 176 insertions(+), 176 deletions(-)

diff --git a/drivers/iommu/dma-iommu.c b/drivers/iommu/dma-iommu.c
index f139b77caee0..54be57fb08f0 100644
--- a/drivers/iommu/dma-iommu.c
+++ b/drivers/iommu/dma-iommu.c
@@ -64,6 +64,179 @@ static int __init iommu_dma_forcedac_setup(char *str)
 }
 early_param("iommu.forcedac", iommu_dma_forcedac_setup);
 
+#define fq_ring_for_each(i, fq) \
+       for ((i) = (fq)->head; (i) != (fq)->tail; (i) = ((i) + 1) % 
IOVA_FQ_SIZE)
+
+static inline bool fq_full(struct iova_fq *fq)
+{
+       assert_spin_locked(&fq->lock);
+       return (((fq->tail + 1) % IOVA_FQ_SIZE) == fq->head);
+}
+
+static inline unsigned fq_ring_add(struct iova_fq *fq)
+{
+       unsigned idx = fq->tail;
+
+       assert_spin_locked(&fq->lock);
+
+       fq->tail = (idx + 1) % IOVA_FQ_SIZE;
+
+       return idx;
+}
+
+static void fq_ring_free(struct iova_domain *iovad, struct iova_fq *fq)
+{
+       u64 counter = atomic64_read(&iovad->fq_flush_finish_cnt);
+       unsigned idx;
+
+       assert_spin_locked(&fq->lock);
+
+       fq_ring_for_each(idx, fq) {
+
+               if (fq->entries[idx].counter >= counter)
+                       break;
+
+               put_pages_list(&fq->entries[idx].freelist);
+               free_iova_fast(iovad,
+                              fq->entries[idx].iova_pfn,
+                              fq->entries[idx].pages);
+
+               fq->head = (fq->head + 1) % IOVA_FQ_SIZE;
+       }
+}
+
+static void iova_domain_flush(struct iova_domain *iovad)
+{
+       atomic64_inc(&iovad->fq_flush_start_cnt);
+       iovad->fq_domain->ops->flush_iotlb_all(iovad->fq_domain);
+       atomic64_inc(&iovad->fq_flush_finish_cnt);
+}
+
+static void fq_flush_timeout(struct timer_list *t)
+{
+       struct iova_domain *iovad = from_timer(iovad, t, fq_timer);
+       int cpu;
+
+       atomic_set(&iovad->fq_timer_on, 0);
+       iova_domain_flush(iovad);
+
+       for_each_possible_cpu(cpu) {
+               unsigned long flags;
+               struct iova_fq *fq;
+
+               fq = per_cpu_ptr(iovad->fq, cpu);
+               spin_lock_irqsave(&fq->lock, flags);
+               fq_ring_free(iovad, fq);
+               spin_unlock_irqrestore(&fq->lock, flags);
+       }
+}
+
+void queue_iova(struct iova_domain *iovad,
+               unsigned long pfn, unsigned long pages,
+               struct list_head *freelist)
+{
+       struct iova_fq *fq;
+       unsigned long flags;
+       unsigned idx;
+
+       /*
+        * Order against the IOMMU driver's pagetable update from unmapping
+        * @pte, to guarantee that iova_domain_flush() observes that if called
+        * from a different CPU before we release the lock below. Full barrier
+        * so it also pairs with iommu_dma_init_fq() to avoid seeing partially
+        * written fq state here.
+        */
+       smp_mb();
+
+       fq = raw_cpu_ptr(iovad->fq);
+       spin_lock_irqsave(&fq->lock, flags);
+
+       /*
+        * First remove all entries from the flush queue that have already been
+        * flushed out on another CPU. This makes the fq_full() check below less
+        * likely to be true.
+        */
+       fq_ring_free(iovad, fq);
+
+       if (fq_full(fq)) {
+               iova_domain_flush(iovad);
+               fq_ring_free(iovad, fq);
+       }
+
+       idx = fq_ring_add(fq);
+
+       fq->entries[idx].iova_pfn = pfn;
+       fq->entries[idx].pages    = pages;
+       fq->entries[idx].counter  = atomic64_read(&iovad->fq_flush_start_cnt);
+       list_splice(freelist, &fq->entries[idx].freelist);
+
+       spin_unlock_irqrestore(&fq->lock, flags);
+
+       /* Avoid false sharing as much as possible. */
+       if (!atomic_read(&iovad->fq_timer_on) &&
+           !atomic_xchg(&iovad->fq_timer_on, 1))
+               mod_timer(&iovad->fq_timer,
+                         jiffies + msecs_to_jiffies(IOVA_FQ_TIMEOUT));
+}
+
+static void free_iova_flush_queue(struct iova_domain *iovad)
+{
+       int cpu, idx;
+
+       if (!iovad->fq)
+               return;
+
+       del_timer_sync(&iovad->fq_timer);
+       /*
+        * This code runs when the iova_domain is being detroyed, so don't
+        * bother to free iovas, just free any remaining pagetable pages.
+        */
+       for_each_possible_cpu(cpu) {
+               struct iova_fq *fq = per_cpu_ptr(iovad->fq, cpu);
+
+               fq_ring_for_each(idx, fq)
+                       put_pages_list(&fq->entries[idx].freelist);
+       }
+
+       free_percpu(iovad->fq);
+
+       iovad->fq = NULL;
+       iovad->fq_domain = NULL;
+}
+
+int init_iova_flush_queue(struct iova_domain *iovad, struct iommu_domain 
*fq_domain)
+{
+       struct iova_fq __percpu *queue;
+       int i, cpu;
+
+       atomic64_set(&iovad->fq_flush_start_cnt,  0);
+       atomic64_set(&iovad->fq_flush_finish_cnt, 0);
+
+       queue = alloc_percpu(struct iova_fq);
+       if (!queue)
+               return -ENOMEM;
+
+       for_each_possible_cpu(cpu) {
+               struct iova_fq *fq = per_cpu_ptr(queue, cpu);
+
+               fq->head = 0;
+               fq->tail = 0;
+
+               spin_lock_init(&fq->lock);
+
+               for (i = 0; i < IOVA_FQ_SIZE; i++)
+                       INIT_LIST_HEAD(&fq->entries[i].freelist);
+       }
+
+       iovad->fq_domain = fq_domain;
+       iovad->fq = queue;
+
+       timer_setup(&iovad->fq_timer, fq_flush_timeout, 0);
+       atomic_set(&iovad->fq_timer_on, 0);
+
+       return 0;
+}
+
 static inline size_t cookie_msi_granule(struct iommu_dma_cookie *cookie)
 {
        if (cookie->type == IOMMU_DMA_IOVA_COOKIE)
@@ -144,8 +317,10 @@ void iommu_put_dma_cookie(struct iommu_domain *domain)
        if (!cookie)
                return;
 
-       if (cookie->type == IOMMU_DMA_IOVA_COOKIE && cookie->iovad.granule)
+       if (cookie->type == IOMMU_DMA_IOVA_COOKIE && cookie->iovad.granule) {
+               free_iova_flush_queue(&cookie->iovad);
                put_iova_domain(&cookie->iovad);
+       }
 
        list_for_each_entry_safe(msi, tmp, &cookie->msi_page_list, list) {
                list_del(&msi->list);
diff --git a/drivers/iommu/iova.c b/drivers/iommu/iova.c
index c19f9a749070..6673dfa8e7c5 100644
--- a/drivers/iommu/iova.c
+++ b/drivers/iommu/iova.c
@@ -481,179 +481,6 @@ free_iova_fast(struct iova_domain *iovad, unsigned long 
pfn, unsigned long size)
 }
 EXPORT_SYMBOL_GPL(free_iova_fast);
 
-#define fq_ring_for_each(i, fq) \
-       for ((i) = (fq)->head; (i) != (fq)->tail; (i) = ((i) + 1) % 
IOVA_FQ_SIZE)
-
-static inline bool fq_full(struct iova_fq *fq)
-{
-       assert_spin_locked(&fq->lock);
-       return (((fq->tail + 1) % IOVA_FQ_SIZE) == fq->head);
-}
-
-static inline unsigned fq_ring_add(struct iova_fq *fq)
-{
-       unsigned idx = fq->tail;
-
-       assert_spin_locked(&fq->lock);
-
-       fq->tail = (idx + 1) % IOVA_FQ_SIZE;
-
-       return idx;
-}
-
-static void fq_ring_free(struct iova_domain *iovad, struct iova_fq *fq)
-{
-       u64 counter = atomic64_read(&iovad->fq_flush_finish_cnt);
-       unsigned idx;
-
-       assert_spin_locked(&fq->lock);
-
-       fq_ring_for_each(idx, fq) {
-
-               if (fq->entries[idx].counter >= counter)
-                       break;
-
-               put_pages_list(&fq->entries[idx].freelist);
-               free_iova_fast(iovad,
-                              fq->entries[idx].iova_pfn,
-                              fq->entries[idx].pages);
-
-               fq->head = (fq->head + 1) % IOVA_FQ_SIZE;
-       }
-}
-
-static void iova_domain_flush(struct iova_domain *iovad)
-{
-       atomic64_inc(&iovad->fq_flush_start_cnt);
-       iovad->fq_domain->ops->flush_iotlb_all(iovad->fq_domain);
-       atomic64_inc(&iovad->fq_flush_finish_cnt);
-}
-
-static void fq_flush_timeout(struct timer_list *t)
-{
-       struct iova_domain *iovad = from_timer(iovad, t, fq_timer);
-       int cpu;
-
-       atomic_set(&iovad->fq_timer_on, 0);
-       iova_domain_flush(iovad);
-
-       for_each_possible_cpu(cpu) {
-               unsigned long flags;
-               struct iova_fq *fq;
-
-               fq = per_cpu_ptr(iovad->fq, cpu);
-               spin_lock_irqsave(&fq->lock, flags);
-               fq_ring_free(iovad, fq);
-               spin_unlock_irqrestore(&fq->lock, flags);
-       }
-}
-
-void queue_iova(struct iova_domain *iovad,
-               unsigned long pfn, unsigned long pages,
-               struct list_head *freelist)
-{
-       struct iova_fq *fq;
-       unsigned long flags;
-       unsigned idx;
-
-       /*
-        * Order against the IOMMU driver's pagetable update from unmapping
-        * @pte, to guarantee that iova_domain_flush() observes that if called
-        * from a different CPU before we release the lock below. Full barrier
-        * so it also pairs with iommu_dma_init_fq() to avoid seeing partially
-        * written fq state here.
-        */
-       smp_mb();
-
-       fq = raw_cpu_ptr(iovad->fq);
-       spin_lock_irqsave(&fq->lock, flags);
-
-       /*
-        * First remove all entries from the flush queue that have already been
-        * flushed out on another CPU. This makes the fq_full() check below less
-        * likely to be true.
-        */
-       fq_ring_free(iovad, fq);
-
-       if (fq_full(fq)) {
-               iova_domain_flush(iovad);
-               fq_ring_free(iovad, fq);
-       }
-
-       idx = fq_ring_add(fq);
-
-       fq->entries[idx].iova_pfn = pfn;
-       fq->entries[idx].pages    = pages;
-       fq->entries[idx].counter  = atomic64_read(&iovad->fq_flush_start_cnt);
-       list_splice(freelist, &fq->entries[idx].freelist);
-
-       spin_unlock_irqrestore(&fq->lock, flags);
-
-       /* Avoid false sharing as much as possible. */
-       if (!atomic_read(&iovad->fq_timer_on) &&
-           !atomic_xchg(&iovad->fq_timer_on, 1))
-               mod_timer(&iovad->fq_timer,
-                         jiffies + msecs_to_jiffies(IOVA_FQ_TIMEOUT));
-}
-
-static void free_iova_flush_queue(struct iova_domain *iovad)
-{
-       int cpu, idx;
-
-       if (!iovad->fq)
-               return;
-
-       del_timer_sync(&iovad->fq_timer);
-       /*
-        * This code runs when the iova_domain is being detroyed, so don't
-        * bother to free iovas, just free any remaining pagetable pages.
-        */
-       for_each_possible_cpu(cpu) {
-               struct iova_fq *fq = per_cpu_ptr(iovad->fq, cpu);
-
-               fq_ring_for_each(idx, fq)
-                       put_pages_list(&fq->entries[idx].freelist);
-       }
-
-       free_percpu(iovad->fq);
-
-       iovad->fq = NULL;
-       iovad->fq_domain = NULL;
-}
-
-int init_iova_flush_queue(struct iova_domain *iovad, struct iommu_domain 
*fq_domain)
-{
-       struct iova_fq __percpu *queue;
-       int i, cpu;
-
-       atomic64_set(&iovad->fq_flush_start_cnt,  0);
-       atomic64_set(&iovad->fq_flush_finish_cnt, 0);
-
-       queue = alloc_percpu(struct iova_fq);
-       if (!queue)
-               return -ENOMEM;
-
-       for_each_possible_cpu(cpu) {
-               struct iova_fq *fq = per_cpu_ptr(queue, cpu);
-
-               fq->head = 0;
-               fq->tail = 0;
-
-               spin_lock_init(&fq->lock);
-
-               for (i = 0; i < IOVA_FQ_SIZE; i++)
-                       INIT_LIST_HEAD(&fq->entries[i].freelist);
-       }
-
-       iovad->fq_domain = fq_domain;
-       iovad->fq = queue;
-
-       timer_setup(&iovad->fq_timer, fq_flush_timeout, 0);
-       atomic_set(&iovad->fq_timer_on, 0);
-
-       return 0;
-}
-
 /**
  * put_iova_domain - destroys the iova domain
  * @iovad: - iova domain in question.
@@ -665,8 +492,6 @@ void put_iova_domain(struct iova_domain *iovad)
 
        cpuhp_state_remove_instance_nocalls(CPUHP_IOMMU_IOVA_DEAD,
                                            &iovad->cpuhp_dead);
-
-       free_iova_flush_queue(iovad);
        free_iova_rcaches(iovad);
        rbtree_postorder_for_each_entry_safe(iova, tmp, &iovad->rbroot, node)
                free_iova_mem(iova);
-- 
2.28.0.dirty

_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

Reply via email to