iommu/vt-d: Add cache tag assignment interface
Caching tag is a combination of tags used by the hardware to cache various translations. Whenever a mapping in a domain is changed, the IOMMU driver should invalidate the caches with the caching tags. The VT-d specification describes caching tags in section 6.2.1, Tagging of Cached Translations. Add interface to assign caching tags to an IOMMU domain when attached to a RID or PASID, and unassign caching tags when a domain is detached from a RID or PASID. All caching tags are listed in the per-domain tag list and are protected by a dedicated lock. In addition to the basic IOTLB and devTLB caching tag types, NESTING_IOTLB and NESTING_DEVTLB tag types are also introduced. These tags are used for caches that store translations for DMA accesses through a nested user domain. They are affected by changes to mappings in the parent domain. Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Reviewed-by: Kevin Tian <kevin.tian@intel.com> Link: https://lore.kernel.org/r/20240416080656.60968-2-baolu.lu@linux.intel.com Signed-off-by: Joerg Roedel <jroedel@suse.de>
This commit is contained in:
parent
304b3bde24
commit
3b1d9e2b2d
@ -1,6 +1,6 @@
|
|||||||
# SPDX-License-Identifier: GPL-2.0
|
# SPDX-License-Identifier: GPL-2.0
|
||||||
obj-$(CONFIG_DMAR_TABLE) += dmar.o
|
obj-$(CONFIG_DMAR_TABLE) += dmar.o
|
||||||
obj-$(CONFIG_INTEL_IOMMU) += iommu.o pasid.o nested.o
|
obj-$(CONFIG_INTEL_IOMMU) += iommu.o pasid.o nested.o cache.o
|
||||||
obj-$(CONFIG_DMAR_TABLE) += trace.o cap_audit.o
|
obj-$(CONFIG_DMAR_TABLE) += trace.o cap_audit.o
|
||||||
obj-$(CONFIG_DMAR_PERF) += perf.o
|
obj-$(CONFIG_DMAR_PERF) += perf.o
|
||||||
obj-$(CONFIG_INTEL_IOMMU_DEBUGFS) += debugfs.o
|
obj-$(CONFIG_INTEL_IOMMU_DEBUGFS) += debugfs.o
|
||||||
|
214
drivers/iommu/intel/cache.c
Normal file
214
drivers/iommu/intel/cache.c
Normal file
@ -0,0 +1,214 @@
|
|||||||
|
// SPDX-License-Identifier: GPL-2.0
|
||||||
|
/*
|
||||||
|
* cache.c - Intel VT-d cache invalidation
|
||||||
|
*
|
||||||
|
* Copyright (C) 2024 Intel Corporation
|
||||||
|
*
|
||||||
|
* Author: Lu Baolu <baolu.lu@linux.intel.com>
|
||||||
|
*/
|
||||||
|
|
||||||
|
#define pr_fmt(fmt) "DMAR: " fmt
|
||||||
|
|
||||||
|
#include <linux/dmar.h>
|
||||||
|
#include <linux/iommu.h>
|
||||||
|
#include <linux/memory.h>
|
||||||
|
#include <linux/spinlock.h>
|
||||||
|
|
||||||
|
#include "iommu.h"
|
||||||
|
#include "pasid.h"
|
||||||
|
|
||||||
|
/* Check if an existing cache tag can be reused for a new association. */
|
||||||
|
static bool cache_tage_match(struct cache_tag *tag, u16 domain_id,
|
||||||
|
struct intel_iommu *iommu, struct device *dev,
|
||||||
|
ioasid_t pasid, enum cache_tag_type type)
|
||||||
|
{
|
||||||
|
if (tag->type != type)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if (tag->domain_id != domain_id || tag->pasid != pasid)
|
||||||
|
return false;
|
||||||
|
|
||||||
|
if (type == CACHE_TAG_IOTLB || type == CACHE_TAG_NESTING_IOTLB)
|
||||||
|
return tag->iommu == iommu;
|
||||||
|
|
||||||
|
if (type == CACHE_TAG_DEVTLB || type == CACHE_TAG_NESTING_DEVTLB)
|
||||||
|
return tag->dev == dev;
|
||||||
|
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Assign a cache tag with specified type to domain. */
|
||||||
|
static int cache_tag_assign(struct dmar_domain *domain, u16 did,
|
||||||
|
struct device *dev, ioasid_t pasid,
|
||||||
|
enum cache_tag_type type)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
struct intel_iommu *iommu = info->iommu;
|
||||||
|
struct cache_tag *tag, *temp;
|
||||||
|
unsigned long flags;
|
||||||
|
|
||||||
|
tag = kzalloc(sizeof(*tag), GFP_KERNEL);
|
||||||
|
if (!tag)
|
||||||
|
return -ENOMEM;
|
||||||
|
|
||||||
|
tag->type = type;
|
||||||
|
tag->iommu = iommu;
|
||||||
|
tag->domain_id = did;
|
||||||
|
tag->pasid = pasid;
|
||||||
|
tag->users = 1;
|
||||||
|
|
||||||
|
if (type == CACHE_TAG_DEVTLB || type == CACHE_TAG_NESTING_DEVTLB)
|
||||||
|
tag->dev = dev;
|
||||||
|
else
|
||||||
|
tag->dev = iommu->iommu.dev;
|
||||||
|
|
||||||
|
spin_lock_irqsave(&domain->cache_lock, flags);
|
||||||
|
list_for_each_entry(temp, &domain->cache_tags, node) {
|
||||||
|
if (cache_tage_match(temp, did, iommu, dev, pasid, type)) {
|
||||||
|
temp->users++;
|
||||||
|
spin_unlock_irqrestore(&domain->cache_lock, flags);
|
||||||
|
kfree(tag);
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
list_add_tail(&tag->node, &domain->cache_tags);
|
||||||
|
spin_unlock_irqrestore(&domain->cache_lock, flags);
|
||||||
|
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* Unassign a cache tag with specified type from domain. */
|
||||||
|
static void cache_tag_unassign(struct dmar_domain *domain, u16 did,
|
||||||
|
struct device *dev, ioasid_t pasid,
|
||||||
|
enum cache_tag_type type)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
struct intel_iommu *iommu = info->iommu;
|
||||||
|
struct cache_tag *tag;
|
||||||
|
unsigned long flags;
|
||||||
|
|
||||||
|
spin_lock_irqsave(&domain->cache_lock, flags);
|
||||||
|
list_for_each_entry(tag, &domain->cache_tags, node) {
|
||||||
|
if (cache_tage_match(tag, did, iommu, dev, pasid, type)) {
|
||||||
|
if (--tag->users == 0) {
|
||||||
|
list_del(&tag->node);
|
||||||
|
kfree(tag);
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
spin_unlock_irqrestore(&domain->cache_lock, flags);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int __cache_tag_assign_domain(struct dmar_domain *domain, u16 did,
|
||||||
|
struct device *dev, ioasid_t pasid)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
ret = cache_tag_assign(domain, did, dev, pasid, CACHE_TAG_IOTLB);
|
||||||
|
if (ret || !info->ats_enabled)
|
||||||
|
return ret;
|
||||||
|
|
||||||
|
ret = cache_tag_assign(domain, did, dev, pasid, CACHE_TAG_DEVTLB);
|
||||||
|
if (ret)
|
||||||
|
cache_tag_unassign(domain, did, dev, pasid, CACHE_TAG_IOTLB);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void __cache_tag_unassign_domain(struct dmar_domain *domain, u16 did,
|
||||||
|
struct device *dev, ioasid_t pasid)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
|
||||||
|
cache_tag_unassign(domain, did, dev, pasid, CACHE_TAG_IOTLB);
|
||||||
|
|
||||||
|
if (info->ats_enabled)
|
||||||
|
cache_tag_unassign(domain, did, dev, pasid, CACHE_TAG_DEVTLB);
|
||||||
|
}
|
||||||
|
|
||||||
|
static int __cache_tag_assign_parent_domain(struct dmar_domain *domain, u16 did,
|
||||||
|
struct device *dev, ioasid_t pasid)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
ret = cache_tag_assign(domain, did, dev, pasid, CACHE_TAG_NESTING_IOTLB);
|
||||||
|
if (ret || !info->ats_enabled)
|
||||||
|
return ret;
|
||||||
|
|
||||||
|
ret = cache_tag_assign(domain, did, dev, pasid, CACHE_TAG_NESTING_DEVTLB);
|
||||||
|
if (ret)
|
||||||
|
cache_tag_unassign(domain, did, dev, pasid, CACHE_TAG_NESTING_IOTLB);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
static void __cache_tag_unassign_parent_domain(struct dmar_domain *domain, u16 did,
|
||||||
|
struct device *dev, ioasid_t pasid)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
|
||||||
|
cache_tag_unassign(domain, did, dev, pasid, CACHE_TAG_NESTING_IOTLB);
|
||||||
|
|
||||||
|
if (info->ats_enabled)
|
||||||
|
cache_tag_unassign(domain, did, dev, pasid, CACHE_TAG_NESTING_DEVTLB);
|
||||||
|
}
|
||||||
|
|
||||||
|
static u16 domain_get_id_for_dev(struct dmar_domain *domain, struct device *dev)
|
||||||
|
{
|
||||||
|
struct device_domain_info *info = dev_iommu_priv_get(dev);
|
||||||
|
struct intel_iommu *iommu = info->iommu;
|
||||||
|
|
||||||
|
/*
|
||||||
|
* The driver assigns different domain IDs for all domains except
|
||||||
|
* the SVA type.
|
||||||
|
*/
|
||||||
|
if (domain->domain.type == IOMMU_DOMAIN_SVA)
|
||||||
|
return FLPT_DEFAULT_DID;
|
||||||
|
|
||||||
|
return domain_id_iommu(domain, iommu);
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Assign cache tags to a domain when it's associated with a device's
|
||||||
|
* PASID using a specific domain ID.
|
||||||
|
*
|
||||||
|
* On success (return value of 0), cache tags are created and added to the
|
||||||
|
* domain's cache tag list. On failure (negative return value), an error
|
||||||
|
* code is returned indicating the reason for the failure.
|
||||||
|
*/
|
||||||
|
int cache_tag_assign_domain(struct dmar_domain *domain,
|
||||||
|
struct device *dev, ioasid_t pasid)
|
||||||
|
{
|
||||||
|
u16 did = domain_get_id_for_dev(domain, dev);
|
||||||
|
int ret;
|
||||||
|
|
||||||
|
ret = __cache_tag_assign_domain(domain, did, dev, pasid);
|
||||||
|
if (ret || domain->domain.type != IOMMU_DOMAIN_NESTED)
|
||||||
|
return ret;
|
||||||
|
|
||||||
|
ret = __cache_tag_assign_parent_domain(domain->s2_domain, did, dev, pasid);
|
||||||
|
if (ret)
|
||||||
|
__cache_tag_unassign_domain(domain, did, dev, pasid);
|
||||||
|
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
|
/*
|
||||||
|
* Remove the cache tags associated with a device's PASID when the domain is
|
||||||
|
* detached from the device.
|
||||||
|
*
|
||||||
|
* The cache tags must be previously assigned to the domain by calling the
|
||||||
|
* assign interface.
|
||||||
|
*/
|
||||||
|
void cache_tag_unassign_domain(struct dmar_domain *domain,
|
||||||
|
struct device *dev, ioasid_t pasid)
|
||||||
|
{
|
||||||
|
u16 did = domain_get_id_for_dev(domain, dev);
|
||||||
|
|
||||||
|
__cache_tag_unassign_domain(domain, did, dev, pasid);
|
||||||
|
if (domain->domain.type == IOMMU_DOMAIN_NESTED)
|
||||||
|
__cache_tag_unassign_parent_domain(domain->s2_domain, did, dev, pasid);
|
||||||
|
}
|
@ -1746,7 +1746,9 @@ static struct dmar_domain *alloc_domain(unsigned int type)
|
|||||||
domain->has_iotlb_device = false;
|
domain->has_iotlb_device = false;
|
||||||
INIT_LIST_HEAD(&domain->devices);
|
INIT_LIST_HEAD(&domain->devices);
|
||||||
INIT_LIST_HEAD(&domain->dev_pasids);
|
INIT_LIST_HEAD(&domain->dev_pasids);
|
||||||
|
INIT_LIST_HEAD(&domain->cache_tags);
|
||||||
spin_lock_init(&domain->lock);
|
spin_lock_init(&domain->lock);
|
||||||
|
spin_lock_init(&domain->cache_lock);
|
||||||
xa_init(&domain->iommu_array);
|
xa_init(&domain->iommu_array);
|
||||||
|
|
||||||
return domain;
|
return domain;
|
||||||
@ -1758,6 +1760,9 @@ int domain_attach_iommu(struct dmar_domain *domain, struct intel_iommu *iommu)
|
|||||||
unsigned long ndomains;
|
unsigned long ndomains;
|
||||||
int num, ret = -ENOSPC;
|
int num, ret = -ENOSPC;
|
||||||
|
|
||||||
|
if (domain->domain.type == IOMMU_DOMAIN_SVA)
|
||||||
|
return 0;
|
||||||
|
|
||||||
info = kzalloc(sizeof(*info), GFP_KERNEL);
|
info = kzalloc(sizeof(*info), GFP_KERNEL);
|
||||||
if (!info)
|
if (!info)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
@ -1805,6 +1810,9 @@ void domain_detach_iommu(struct dmar_domain *domain, struct intel_iommu *iommu)
|
|||||||
{
|
{
|
||||||
struct iommu_domain_info *info;
|
struct iommu_domain_info *info;
|
||||||
|
|
||||||
|
if (domain->domain.type == IOMMU_DOMAIN_SVA)
|
||||||
|
return;
|
||||||
|
|
||||||
spin_lock(&iommu->lock);
|
spin_lock(&iommu->lock);
|
||||||
info = xa_load(&domain->iommu_array, iommu->seq_id);
|
info = xa_load(&domain->iommu_array, iommu->seq_id);
|
||||||
if (--info->refcnt == 0) {
|
if (--info->refcnt == 0) {
|
||||||
@ -2323,6 +2331,13 @@ static int dmar_domain_attach_device(struct dmar_domain *domain,
|
|||||||
ret = domain_attach_iommu(domain, iommu);
|
ret = domain_attach_iommu(domain, iommu);
|
||||||
if (ret)
|
if (ret)
|
||||||
return ret;
|
return ret;
|
||||||
|
|
||||||
|
ret = cache_tag_assign_domain(domain, dev, IOMMU_NO_PASID);
|
||||||
|
if (ret) {
|
||||||
|
domain_detach_iommu(domain, iommu);
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
|
||||||
info->domain = domain;
|
info->domain = domain;
|
||||||
spin_lock_irqsave(&domain->lock, flags);
|
spin_lock_irqsave(&domain->lock, flags);
|
||||||
list_add(&info->link, &domain->devices);
|
list_add(&info->link, &domain->devices);
|
||||||
@ -3811,6 +3826,7 @@ void device_block_translation(struct device *dev)
|
|||||||
list_del(&info->link);
|
list_del(&info->link);
|
||||||
spin_unlock_irqrestore(&info->domain->lock, flags);
|
spin_unlock_irqrestore(&info->domain->lock, flags);
|
||||||
|
|
||||||
|
cache_tag_unassign_domain(info->domain, dev, IOMMU_NO_PASID);
|
||||||
domain_detach_iommu(info->domain, iommu);
|
domain_detach_iommu(info->domain, iommu);
|
||||||
info->domain = NULL;
|
info->domain = NULL;
|
||||||
}
|
}
|
||||||
@ -4598,6 +4614,7 @@ static void intel_iommu_remove_dev_pasid(struct device *dev, ioasid_t pasid)
|
|||||||
domain = iommu_get_domain_for_dev_pasid(dev, pasid, 0);
|
domain = iommu_get_domain_for_dev_pasid(dev, pasid, 0);
|
||||||
if (WARN_ON_ONCE(!domain))
|
if (WARN_ON_ONCE(!domain))
|
||||||
goto out_tear_down;
|
goto out_tear_down;
|
||||||
|
dmar_domain = to_dmar_domain(domain);
|
||||||
|
|
||||||
/*
|
/*
|
||||||
* The SVA implementation needs to handle its own stuffs like the mm
|
* The SVA implementation needs to handle its own stuffs like the mm
|
||||||
@ -4606,10 +4623,10 @@ static void intel_iommu_remove_dev_pasid(struct device *dev, ioasid_t pasid)
|
|||||||
*/
|
*/
|
||||||
if (domain->type == IOMMU_DOMAIN_SVA) {
|
if (domain->type == IOMMU_DOMAIN_SVA) {
|
||||||
intel_svm_remove_dev_pasid(dev, pasid);
|
intel_svm_remove_dev_pasid(dev, pasid);
|
||||||
|
cache_tag_unassign_domain(dmar_domain, dev, pasid);
|
||||||
goto out_tear_down;
|
goto out_tear_down;
|
||||||
}
|
}
|
||||||
|
|
||||||
dmar_domain = to_dmar_domain(domain);
|
|
||||||
spin_lock_irqsave(&dmar_domain->lock, flags);
|
spin_lock_irqsave(&dmar_domain->lock, flags);
|
||||||
list_for_each_entry(curr, &dmar_domain->dev_pasids, link_domain) {
|
list_for_each_entry(curr, &dmar_domain->dev_pasids, link_domain) {
|
||||||
if (curr->dev == dev && curr->pasid == pasid) {
|
if (curr->dev == dev && curr->pasid == pasid) {
|
||||||
@ -4621,6 +4638,7 @@ static void intel_iommu_remove_dev_pasid(struct device *dev, ioasid_t pasid)
|
|||||||
WARN_ON_ONCE(!dev_pasid);
|
WARN_ON_ONCE(!dev_pasid);
|
||||||
spin_unlock_irqrestore(&dmar_domain->lock, flags);
|
spin_unlock_irqrestore(&dmar_domain->lock, flags);
|
||||||
|
|
||||||
|
cache_tag_unassign_domain(dmar_domain, dev, pasid);
|
||||||
domain_detach_iommu(dmar_domain, iommu);
|
domain_detach_iommu(dmar_domain, iommu);
|
||||||
intel_iommu_debugfs_remove_dev_pasid(dev_pasid);
|
intel_iommu_debugfs_remove_dev_pasid(dev_pasid);
|
||||||
kfree(dev_pasid);
|
kfree(dev_pasid);
|
||||||
@ -4660,6 +4678,10 @@ static int intel_iommu_set_dev_pasid(struct iommu_domain *domain,
|
|||||||
if (ret)
|
if (ret)
|
||||||
goto out_free;
|
goto out_free;
|
||||||
|
|
||||||
|
ret = cache_tag_assign_domain(dmar_domain, dev, pasid);
|
||||||
|
if (ret)
|
||||||
|
goto out_detach_iommu;
|
||||||
|
|
||||||
if (domain_type_is_si(dmar_domain))
|
if (domain_type_is_si(dmar_domain))
|
||||||
ret = intel_pasid_setup_pass_through(iommu, dev, pasid);
|
ret = intel_pasid_setup_pass_through(iommu, dev, pasid);
|
||||||
else if (dmar_domain->use_first_level)
|
else if (dmar_domain->use_first_level)
|
||||||
@ -4669,7 +4691,7 @@ static int intel_iommu_set_dev_pasid(struct iommu_domain *domain,
|
|||||||
ret = intel_pasid_setup_second_level(iommu, dmar_domain,
|
ret = intel_pasid_setup_second_level(iommu, dmar_domain,
|
||||||
dev, pasid);
|
dev, pasid);
|
||||||
if (ret)
|
if (ret)
|
||||||
goto out_detach_iommu;
|
goto out_unassign_tag;
|
||||||
|
|
||||||
dev_pasid->dev = dev;
|
dev_pasid->dev = dev;
|
||||||
dev_pasid->pasid = pasid;
|
dev_pasid->pasid = pasid;
|
||||||
@ -4681,6 +4703,8 @@ static int intel_iommu_set_dev_pasid(struct iommu_domain *domain,
|
|||||||
intel_iommu_debugfs_create_dev_pasid(dev_pasid);
|
intel_iommu_debugfs_create_dev_pasid(dev_pasid);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
out_unassign_tag:
|
||||||
|
cache_tag_unassign_domain(dmar_domain, dev, pasid);
|
||||||
out_detach_iommu:
|
out_detach_iommu:
|
||||||
domain_detach_iommu(dmar_domain, iommu);
|
domain_detach_iommu(dmar_domain, iommu);
|
||||||
out_free:
|
out_free:
|
||||||
|
@ -606,6 +606,9 @@ struct dmar_domain {
|
|||||||
struct list_head devices; /* all devices' list */
|
struct list_head devices; /* all devices' list */
|
||||||
struct list_head dev_pasids; /* all attached pasids */
|
struct list_head dev_pasids; /* all attached pasids */
|
||||||
|
|
||||||
|
spinlock_t cache_lock; /* Protect the cache tag list */
|
||||||
|
struct list_head cache_tags; /* Cache tag list */
|
||||||
|
|
||||||
int iommu_superpage;/* Level of superpages supported:
|
int iommu_superpage;/* Level of superpages supported:
|
||||||
0 == 4KiB (no superpages), 1 == 2MiB,
|
0 == 4KiB (no superpages), 1 == 2MiB,
|
||||||
2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
|
2 == 1GiB, 3 == 512GiB, 4 == 1TiB */
|
||||||
@ -1091,6 +1094,34 @@ struct iommu_domain *intel_nested_domain_alloc(struct iommu_domain *parent,
|
|||||||
const struct iommu_user_data *user_data);
|
const struct iommu_user_data *user_data);
|
||||||
struct device *device_rbtree_find(struct intel_iommu *iommu, u16 rid);
|
struct device *device_rbtree_find(struct intel_iommu *iommu, u16 rid);
|
||||||
|
|
||||||
|
enum cache_tag_type {
|
||||||
|
CACHE_TAG_IOTLB,
|
||||||
|
CACHE_TAG_DEVTLB,
|
||||||
|
CACHE_TAG_NESTING_IOTLB,
|
||||||
|
CACHE_TAG_NESTING_DEVTLB,
|
||||||
|
};
|
||||||
|
|
||||||
|
struct cache_tag {
|
||||||
|
struct list_head node;
|
||||||
|
enum cache_tag_type type;
|
||||||
|
struct intel_iommu *iommu;
|
||||||
|
/*
|
||||||
|
* The @dev field represents the location of the cache. For IOTLB, it
|
||||||
|
* resides on the IOMMU hardware. @dev stores the device pointer to
|
||||||
|
* the IOMMU hardware. For DevTLB, it locates in the PCIe endpoint.
|
||||||
|
* @dev stores the device pointer to that endpoint.
|
||||||
|
*/
|
||||||
|
struct device *dev;
|
||||||
|
u16 domain_id;
|
||||||
|
ioasid_t pasid;
|
||||||
|
unsigned int users;
|
||||||
|
};
|
||||||
|
|
||||||
|
int cache_tag_assign_domain(struct dmar_domain *domain,
|
||||||
|
struct device *dev, ioasid_t pasid);
|
||||||
|
void cache_tag_unassign_domain(struct dmar_domain *domain,
|
||||||
|
struct device *dev, ioasid_t pasid);
|
||||||
|
|
||||||
#ifdef CONFIG_INTEL_IOMMU_SVM
|
#ifdef CONFIG_INTEL_IOMMU_SVM
|
||||||
void intel_svm_check(struct intel_iommu *iommu);
|
void intel_svm_check(struct intel_iommu *iommu);
|
||||||
int intel_svm_enable_prq(struct intel_iommu *iommu);
|
int intel_svm_enable_prq(struct intel_iommu *iommu);
|
||||||
|
@ -52,13 +52,14 @@ static int intel_nested_attach_dev(struct iommu_domain *domain,
|
|||||||
return ret;
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ret = cache_tag_assign_domain(dmar_domain, dev, IOMMU_NO_PASID);
|
||||||
|
if (ret)
|
||||||
|
goto detach_iommu;
|
||||||
|
|
||||||
ret = intel_pasid_setup_nested(iommu, dev,
|
ret = intel_pasid_setup_nested(iommu, dev,
|
||||||
IOMMU_NO_PASID, dmar_domain);
|
IOMMU_NO_PASID, dmar_domain);
|
||||||
if (ret) {
|
if (ret)
|
||||||
domain_detach_iommu(dmar_domain, iommu);
|
goto unassign_tag;
|
||||||
dev_err_ratelimited(dev, "Failed to setup pasid entry\n");
|
|
||||||
return ret;
|
|
||||||
}
|
|
||||||
|
|
||||||
info->domain = dmar_domain;
|
info->domain = dmar_domain;
|
||||||
spin_lock_irqsave(&dmar_domain->lock, flags);
|
spin_lock_irqsave(&dmar_domain->lock, flags);
|
||||||
@ -68,6 +69,12 @@ static int intel_nested_attach_dev(struct iommu_domain *domain,
|
|||||||
domain_update_iotlb(dmar_domain);
|
domain_update_iotlb(dmar_domain);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
unassign_tag:
|
||||||
|
cache_tag_unassign_domain(dmar_domain, dev, IOMMU_NO_PASID);
|
||||||
|
detach_iommu:
|
||||||
|
domain_detach_iommu(dmar_domain, iommu);
|
||||||
|
|
||||||
|
return ret;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void intel_nested_domain_free(struct iommu_domain *domain)
|
static void intel_nested_domain_free(struct iommu_domain *domain)
|
||||||
@ -206,7 +213,9 @@ struct iommu_domain *intel_nested_domain_alloc(struct iommu_domain *parent,
|
|||||||
domain->domain.type = IOMMU_DOMAIN_NESTED;
|
domain->domain.type = IOMMU_DOMAIN_NESTED;
|
||||||
INIT_LIST_HEAD(&domain->devices);
|
INIT_LIST_HEAD(&domain->devices);
|
||||||
INIT_LIST_HEAD(&domain->dev_pasids);
|
INIT_LIST_HEAD(&domain->dev_pasids);
|
||||||
|
INIT_LIST_HEAD(&domain->cache_tags);
|
||||||
spin_lock_init(&domain->lock);
|
spin_lock_init(&domain->lock);
|
||||||
|
spin_lock_init(&domain->cache_lock);
|
||||||
xa_init(&domain->iommu_array);
|
xa_init(&domain->iommu_array);
|
||||||
|
|
||||||
spin_lock(&s2_domain->s1_lock);
|
spin_lock(&s2_domain->s1_lock);
|
||||||
|
@ -366,17 +366,23 @@ static int intel_svm_set_dev_pasid(struct iommu_domain *domain,
|
|||||||
sdev->qdep = 0;
|
sdev->qdep = 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
ret = cache_tag_assign_domain(to_dmar_domain(domain), dev, pasid);
|
||||||
|
if (ret)
|
||||||
|
goto free_sdev;
|
||||||
|
|
||||||
/* Setup the pasid table: */
|
/* Setup the pasid table: */
|
||||||
sflags = cpu_feature_enabled(X86_FEATURE_LA57) ? PASID_FLAG_FL5LP : 0;
|
sflags = cpu_feature_enabled(X86_FEATURE_LA57) ? PASID_FLAG_FL5LP : 0;
|
||||||
ret = intel_pasid_setup_first_level(iommu, dev, mm->pgd, pasid,
|
ret = intel_pasid_setup_first_level(iommu, dev, mm->pgd, pasid,
|
||||||
FLPT_DEFAULT_DID, sflags);
|
FLPT_DEFAULT_DID, sflags);
|
||||||
if (ret)
|
if (ret)
|
||||||
goto free_sdev;
|
goto unassign_tag;
|
||||||
|
|
||||||
list_add_rcu(&sdev->list, &svm->devs);
|
list_add_rcu(&sdev->list, &svm->devs);
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
|
unassign_tag:
|
||||||
|
cache_tag_unassign_domain(to_dmar_domain(domain), dev, pasid);
|
||||||
free_sdev:
|
free_sdev:
|
||||||
kfree(sdev);
|
kfree(sdev);
|
||||||
free_svm:
|
free_svm:
|
||||||
@ -741,6 +747,8 @@ struct iommu_domain *intel_svm_domain_alloc(void)
|
|||||||
if (!domain)
|
if (!domain)
|
||||||
return NULL;
|
return NULL;
|
||||||
domain->domain.ops = &intel_svm_domain_ops;
|
domain->domain.ops = &intel_svm_domain_ops;
|
||||||
|
INIT_LIST_HEAD(&domain->cache_tags);
|
||||||
|
spin_lock_init(&domain->cache_lock);
|
||||||
|
|
||||||
return &domain->domain;
|
return &domain->domain;
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user