xref: /linux/drivers/iommu/amd/pasid.c (revision 249ebf3f65f8530beb2cbfb91bff1d83ba88d23c)
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (C) 2024 Advanced Micro Devices, Inc.
4  */
5 
6 #define pr_fmt(fmt)     "AMD-Vi: " fmt
7 #define dev_fmt(fmt)    pr_fmt(fmt)
8 
9 #include <linux/iommu.h>
10 #include <linux/mm_types.h>
11 
12 #include "amd_iommu.h"
13 
14 static inline bool is_pasid_enabled(struct iommu_dev_data *dev_data)
15 {
16 	if (dev_data->pasid_enabled && dev_data->max_pasids &&
17 	    dev_data->gcr3_info.gcr3_tbl != NULL)
18 		return true;
19 
20 	return false;
21 }
22 
23 static inline bool is_pasid_valid(struct iommu_dev_data *dev_data,
24 				  ioasid_t pasid)
25 {
26 	if (pasid > 0 && pasid < dev_data->max_pasids)
27 		return true;
28 
29 	return false;
30 }
31 
32 static void remove_dev_pasid(struct pdom_dev_data *pdom_dev_data)
33 {
34 	/* Update GCR3 table and flush IOTLB */
35 	amd_iommu_clear_gcr3(pdom_dev_data->dev_data, pdom_dev_data->pasid);
36 
37 	list_del(&pdom_dev_data->list);
38 	kfree(pdom_dev_data);
39 }
40 
41 /* Clear PASID from device GCR3 table and remove pdom_dev_data from list */
42 static void remove_pdom_dev_pasid(struct protection_domain *pdom,
43 				  struct device *dev, ioasid_t pasid)
44 {
45 	struct pdom_dev_data *pdom_dev_data;
46 	struct iommu_dev_data *dev_data = dev_iommu_priv_get(dev);
47 
48 	lockdep_assert_held(&pdom->lock);
49 
50 	for_each_pdom_dev_data(pdom_dev_data, pdom) {
51 		if (pdom_dev_data->dev_data == dev_data &&
52 		    pdom_dev_data->pasid == pasid) {
53 			remove_dev_pasid(pdom_dev_data);
54 			break;
55 		}
56 	}
57 }
58 
59 static void sva_arch_invalidate_secondary_tlbs(struct mmu_notifier *mn,
60 				    struct mm_struct *mm,
61 				    unsigned long start, unsigned long end)
62 {
63 	struct pdom_dev_data *pdom_dev_data;
64 	struct protection_domain *sva_pdom;
65 	unsigned long flags;
66 
67 	sva_pdom = container_of(mn, struct protection_domain, mn);
68 
69 	spin_lock_irqsave(&sva_pdom->lock, flags);
70 
71 	for_each_pdom_dev_data(pdom_dev_data, sva_pdom) {
72 		amd_iommu_dev_flush_pasid_pages(pdom_dev_data->dev_data,
73 						pdom_dev_data->pasid,
74 						start, end - start);
75 	}
76 
77 	spin_unlock_irqrestore(&sva_pdom->lock, flags);
78 }
79 
80 static void sva_mn_release(struct mmu_notifier *mn, struct mm_struct *mm)
81 {
82 	struct pdom_dev_data *pdom_dev_data, *next;
83 	struct protection_domain *sva_pdom;
84 	unsigned long flags;
85 
86 	sva_pdom = container_of(mn, struct protection_domain, mn);
87 
88 	spin_lock_irqsave(&sva_pdom->lock, flags);
89 
90 	/* Assume dev_data_list contains same PASID with different devices */
91 	for_each_pdom_dev_data_safe(pdom_dev_data, next, sva_pdom)
92 		remove_dev_pasid(pdom_dev_data);
93 
94 	spin_unlock_irqrestore(&sva_pdom->lock, flags);
95 }
96 
97 static const struct mmu_notifier_ops sva_mn = {
98 	.arch_invalidate_secondary_tlbs = sva_arch_invalidate_secondary_tlbs,
99 	.release = sva_mn_release,
100 };
101 
102 int iommu_sva_set_dev_pasid(struct iommu_domain *domain,
103 			    struct device *dev, ioasid_t pasid)
104 {
105 	struct pdom_dev_data *pdom_dev_data;
106 	struct protection_domain *sva_pdom = to_pdomain(domain);
107 	struct iommu_dev_data *dev_data = dev_iommu_priv_get(dev);
108 	unsigned long flags;
109 	int ret = -EINVAL;
110 
111 	/* PASID zero is used for requests from the I/O device without PASID */
112 	if (!is_pasid_valid(dev_data, pasid))
113 		return ret;
114 
115 	/* Make sure PASID is enabled */
116 	if (!is_pasid_enabled(dev_data))
117 		return ret;
118 
119 	/* Add PASID to protection domain pasid list */
120 	pdom_dev_data = kzalloc(sizeof(*pdom_dev_data), GFP_KERNEL);
121 	if (pdom_dev_data == NULL)
122 		return ret;
123 
124 	pdom_dev_data->pasid = pasid;
125 	pdom_dev_data->dev_data = dev_data;
126 
127 	spin_lock_irqsave(&sva_pdom->lock, flags);
128 
129 	/* Setup GCR3 table */
130 	ret = amd_iommu_set_gcr3(dev_data, pasid,
131 				 iommu_virt_to_phys(domain->mm->pgd));
132 	if (ret) {
133 		kfree(pdom_dev_data);
134 		goto out_unlock;
135 	}
136 
137 	list_add(&pdom_dev_data->list, &sva_pdom->dev_data_list);
138 
139 out_unlock:
140 	spin_unlock_irqrestore(&sva_pdom->lock, flags);
141 	return ret;
142 }
143 
144 void amd_iommu_remove_dev_pasid(struct device *dev, ioasid_t pasid,
145 				struct iommu_domain *domain)
146 {
147 	struct protection_domain *sva_pdom;
148 	unsigned long flags;
149 
150 	if (!is_pasid_valid(dev_iommu_priv_get(dev), pasid))
151 		return;
152 
153 	sva_pdom = to_pdomain(domain);
154 
155 	spin_lock_irqsave(&sva_pdom->lock, flags);
156 
157 	/* Remove PASID from dev_data_list */
158 	remove_pdom_dev_pasid(sva_pdom, dev, pasid);
159 
160 	spin_unlock_irqrestore(&sva_pdom->lock, flags);
161 }
162 
163 static void iommu_sva_domain_free(struct iommu_domain *domain)
164 {
165 	struct protection_domain *sva_pdom = to_pdomain(domain);
166 
167 	if (sva_pdom->mn.ops)
168 		mmu_notifier_unregister(&sva_pdom->mn, domain->mm);
169 
170 	amd_iommu_domain_free(domain);
171 }
172 
173 static const struct iommu_domain_ops amd_sva_domain_ops = {
174 	.set_dev_pasid = iommu_sva_set_dev_pasid,
175 	.free	       = iommu_sva_domain_free
176 };
177 
178 struct iommu_domain *amd_iommu_domain_alloc_sva(struct device *dev,
179 						struct mm_struct *mm)
180 {
181 	struct protection_domain *pdom;
182 	int ret;
183 
184 	pdom = protection_domain_alloc(IOMMU_DOMAIN_SVA);
185 	if (!pdom)
186 		return ERR_PTR(-ENOMEM);
187 
188 	pdom->domain.ops = &amd_sva_domain_ops;
189 	pdom->mn.ops = &sva_mn;
190 
191 	ret = mmu_notifier_register(&pdom->mn, mm);
192 	if (ret) {
193 		protection_domain_free(pdom);
194 		return ERR_PTR(ret);
195 	}
196 
197 	return &pdom->domain;
198 }
199