Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Jean-Philippe Brucker | 1968 | 84.57% | 11 | 44.00% |
Lu Baolu | 279 | 11.99% | 2 | 8.00% |
Will Deacon | 41 | 1.76% | 1 | 4.00% |
Arvind Yadav | 16 | 0.69% | 1 | 4.00% |
Joerg Roedel | 6 | 0.26% | 1 | 4.00% |
Nicolin Chen | 5 | 0.21% | 1 | 4.00% |
Robin Murphy | 4 | 0.17% | 2 | 8.00% |
Mark Brown | 3 | 0.13% | 2 | 8.00% |
Lorenzo Pieralisi | 2 | 0.09% | 1 | 4.00% |
Rikard Falkeborn | 1 | 0.04% | 1 | 4.00% |
Fenghua Yu | 1 | 0.04% | 1 | 4.00% |
Andrew Murray | 1 | 0.04% | 1 | 4.00% |
Total | 2327 | 25 |
// SPDX-License-Identifier: GPL-2.0 /* * Implementation of the IOMMU SVA API for the ARM SMMUv3 */ #include <linux/mm.h> #include <linux/mmu_context.h> #include <linux/mmu_notifier.h> #include <linux/sched/mm.h> #include <linux/slab.h> #include "arm-smmu-v3.h" #include "../../iommu-sva.h" #include "../../io-pgtable-arm.h" struct arm_smmu_mmu_notifier { struct mmu_notifier mn; struct arm_smmu_ctx_desc *cd; bool cleared; refcount_t refs; struct list_head list; struct arm_smmu_domain *domain; }; #define mn_to_smmu(mn) container_of(mn, struct arm_smmu_mmu_notifier, mn) struct arm_smmu_bond { struct iommu_sva sva; struct mm_struct *mm; struct arm_smmu_mmu_notifier *smmu_mn; struct list_head list; refcount_t refs; }; #define sva_to_bond(handle) \ container_of(handle, struct arm_smmu_bond, sva) static DEFINE_MUTEX(sva_lock); /* * Check if the CPU ASID is available on the SMMU side. If a private context * descriptor is using it, try to replace it. */ static struct arm_smmu_ctx_desc * arm_smmu_share_asid(struct mm_struct *mm, u16 asid) { int ret; u32 new_asid; struct arm_smmu_ctx_desc *cd; struct arm_smmu_device *smmu; struct arm_smmu_domain *smmu_domain; cd = xa_load(&arm_smmu_asid_xa, asid); if (!cd) return NULL; if (cd->mm) { if (WARN_ON(cd->mm != mm)) return ERR_PTR(-EINVAL); /* All devices bound to this mm use the same cd struct. */ refcount_inc(&cd->refs); return cd; } smmu_domain = container_of(cd, struct arm_smmu_domain, s1_cfg.cd); smmu = smmu_domain->smmu; ret = xa_alloc(&arm_smmu_asid_xa, &new_asid, cd, XA_LIMIT(1, (1 << smmu->asid_bits) - 1), GFP_KERNEL); if (ret) return ERR_PTR(-ENOSPC); /* * Race with unmap: TLB invalidations will start targeting the new ASID, * which isn't assigned yet. We'll do an invalidate-all on the old ASID * later, so it doesn't matter. */ cd->asid = new_asid; /* * Update ASID and invalidate CD in all associated masters. There will * be some overlap between use of both ASIDs, until we invalidate the * TLB. */ arm_smmu_write_ctx_desc(smmu_domain, 0, cd); /* Invalidate TLB entries previously associated with that context */ arm_smmu_tlb_inv_asid(smmu, asid); xa_erase(&arm_smmu_asid_xa, asid); return NULL; } static struct arm_smmu_ctx_desc *arm_smmu_alloc_shared_cd(struct mm_struct *mm) { u16 asid; int err = 0; u64 tcr, par, reg; struct arm_smmu_ctx_desc *cd; struct arm_smmu_ctx_desc *ret = NULL; /* Don't free the mm until we release the ASID */ mmgrab(mm); asid = arm64_mm_context_get(mm); if (!asid) { err = -ESRCH; goto out_drop_mm; } cd = kzalloc(sizeof(*cd), GFP_KERNEL); if (!cd) { err = -ENOMEM; goto out_put_context; } refcount_set(&cd->refs, 1); mutex_lock(&arm_smmu_asid_lock); ret = arm_smmu_share_asid(mm, asid); if (ret) { mutex_unlock(&arm_smmu_asid_lock); goto out_free_cd; } err = xa_insert(&arm_smmu_asid_xa, asid, cd, GFP_KERNEL); mutex_unlock(&arm_smmu_asid_lock); if (err) goto out_free_asid; tcr = FIELD_PREP(CTXDESC_CD_0_TCR_T0SZ, 64ULL - vabits_actual) | FIELD_PREP(CTXDESC_CD_0_TCR_IRGN0, ARM_LPAE_TCR_RGN_WBWA) | FIELD_PREP(CTXDESC_CD_0_TCR_ORGN0, ARM_LPAE_TCR_RGN_WBWA) | FIELD_PREP(CTXDESC_CD_0_TCR_SH0, ARM_LPAE_TCR_SH_IS) | CTXDESC_CD_0_TCR_EPD1 | CTXDESC_CD_0_AA64; switch (PAGE_SIZE) { case SZ_4K: tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_TG0, ARM_LPAE_TCR_TG0_4K); break; case SZ_16K: tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_TG0, ARM_LPAE_TCR_TG0_16K); break; case SZ_64K: tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_TG0, ARM_LPAE_TCR_TG0_64K); break; default: WARN_ON(1); err = -EINVAL; goto out_free_asid; } reg = read_sanitised_ftr_reg(SYS_ID_AA64MMFR0_EL1); par = cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR0_EL1_PARANGE_SHIFT); tcr |= FIELD_PREP(CTXDESC_CD_0_TCR_IPS, par); cd->ttbr = virt_to_phys(mm->pgd); cd->tcr = tcr; /* * MAIR value is pretty much constant and global, so we can just get it * from the current CPU register */ cd->mair = read_sysreg(mair_el1); cd->asid = asid; cd->mm = mm; return cd; out_free_asid: arm_smmu_free_asid(cd); out_free_cd: kfree(cd); out_put_context: arm64_mm_context_put(mm); out_drop_mm: mmdrop(mm); return err < 0 ? ERR_PTR(err) : ret; } static void arm_smmu_free_shared_cd(struct arm_smmu_ctx_desc *cd) { if (arm_smmu_free_asid(cd)) { /* Unpin ASID */ arm64_mm_context_put(cd->mm); mmdrop(cd->mm); kfree(cd); } } static void arm_smmu_mm_invalidate_range(struct mmu_notifier *mn, struct mm_struct *mm, unsigned long start, unsigned long end) { struct arm_smmu_mmu_notifier *smmu_mn = mn_to_smmu(mn); struct arm_smmu_domain *smmu_domain = smmu_mn->domain; size_t size; /* * The mm_types defines vm_end as the first byte after the end address, * different from IOMMU subsystem using the last address of an address * range. So do a simple translation here by calculating size correctly. */ size = end - start; if (!(smmu_domain->smmu->features & ARM_SMMU_FEAT_BTM)) arm_smmu_tlb_inv_range_asid(start, size, smmu_mn->cd->asid, PAGE_SIZE, false, smmu_domain); arm_smmu_atc_inv_domain(smmu_domain, mm->pasid, start, size); } static void arm_smmu_mm_release(struct mmu_notifier *mn, struct mm_struct *mm) { struct arm_smmu_mmu_notifier *smmu_mn = mn_to_smmu(mn); struct arm_smmu_domain *smmu_domain = smmu_mn->domain; mutex_lock(&sva_lock); if (smmu_mn->cleared) { mutex_unlock(&sva_lock); return; } /* * DMA may still be running. Keep the cd valid to avoid C_BAD_CD events, * but disable translation. */ arm_smmu_write_ctx_desc(smmu_domain, mm->pasid, &quiet_cd); arm_smmu_tlb_inv_asid(smmu_domain->smmu, smmu_mn->cd->asid); arm_smmu_atc_inv_domain(smmu_domain, mm->pasid, 0, 0); smmu_mn->cleared = true; mutex_unlock(&sva_lock); } static void arm_smmu_mmu_notifier_free(struct mmu_notifier *mn) { kfree(mn_to_smmu(mn)); } static const struct mmu_notifier_ops arm_smmu_mmu_notifier_ops = { .invalidate_range = arm_smmu_mm_invalidate_range, .release = arm_smmu_mm_release, .free_notifier = arm_smmu_mmu_notifier_free, }; /* Allocate or get existing MMU notifier for this {domain, mm} pair */ static struct arm_smmu_mmu_notifier * arm_smmu_mmu_notifier_get(struct arm_smmu_domain *smmu_domain, struct mm_struct *mm) { int ret; struct arm_smmu_ctx_desc *cd; struct arm_smmu_mmu_notifier *smmu_mn; list_for_each_entry(smmu_mn, &smmu_domain->mmu_notifiers, list) { if (smmu_mn->mn.mm == mm) { refcount_inc(&smmu_mn->refs); return smmu_mn; } } cd = arm_smmu_alloc_shared_cd(mm); if (IS_ERR(cd)) return ERR_CAST(cd); smmu_mn = kzalloc(sizeof(*smmu_mn), GFP_KERNEL); if (!smmu_mn) { ret = -ENOMEM; goto err_free_cd; } refcount_set(&smmu_mn->refs, 1); smmu_mn->cd = cd; smmu_mn->domain = smmu_domain; smmu_mn->mn.ops = &arm_smmu_mmu_notifier_ops; ret = mmu_notifier_register(&smmu_mn->mn, mm); if (ret) { kfree(smmu_mn); goto err_free_cd; } ret = arm_smmu_write_ctx_desc(smmu_domain, mm->pasid, cd); if (ret) goto err_put_notifier; list_add(&smmu_mn->list, &smmu_domain->mmu_notifiers); return smmu_mn; err_put_notifier: /* Frees smmu_mn */ mmu_notifier_put(&smmu_mn->mn); err_free_cd: arm_smmu_free_shared_cd(cd); return ERR_PTR(ret); } static void arm_smmu_mmu_notifier_put(struct arm_smmu_mmu_notifier *smmu_mn) { struct mm_struct *mm = smmu_mn->mn.mm; struct arm_smmu_ctx_desc *cd = smmu_mn->cd; struct arm_smmu_domain *smmu_domain = smmu_mn->domain; if (!refcount_dec_and_test(&smmu_mn->refs)) return; list_del(&smmu_mn->list); arm_smmu_write_ctx_desc(smmu_domain, mm->pasid, NULL); /* * If we went through clear(), we've already invalidated, and no * new TLB entry can have been formed. */ if (!smmu_mn->cleared) { arm_smmu_tlb_inv_asid(smmu_domain->smmu, cd->asid); arm_smmu_atc_inv_domain(smmu_domain, mm->pasid, 0, 0); } /* Frees smmu_mn */ mmu_notifier_put(&smmu_mn->mn); arm_smmu_free_shared_cd(cd); } static struct iommu_sva * __arm_smmu_sva_bind(struct device *dev, struct mm_struct *mm) { int ret; struct arm_smmu_bond *bond; struct arm_smmu_master *master = dev_iommu_priv_get(dev); struct iommu_domain *domain = iommu_get_domain_for_dev(dev); struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); if (!master || !master->sva_enabled) return ERR_PTR(-ENODEV); /* If bind() was already called for this {dev, mm} pair, reuse it. */ list_for_each_entry(bond, &master->bonds, list) { if (bond->mm == mm) { refcount_inc(&bond->refs); return &bond->sva; } } bond = kzalloc(sizeof(*bond), GFP_KERNEL); if (!bond) return ERR_PTR(-ENOMEM); bond->mm = mm; bond->sva.dev = dev; refcount_set(&bond->refs, 1); bond->smmu_mn = arm_smmu_mmu_notifier_get(smmu_domain, mm); if (IS_ERR(bond->smmu_mn)) { ret = PTR_ERR(bond->smmu_mn); goto err_free_bond; } list_add(&bond->list, &master->bonds); return &bond->sva; err_free_bond: kfree(bond); return ERR_PTR(ret); } bool arm_smmu_sva_supported(struct arm_smmu_device *smmu) { unsigned long reg, fld; unsigned long oas; unsigned long asid_bits; u32 feat_mask = ARM_SMMU_FEAT_COHERENCY; if (vabits_actual == 52) feat_mask |= ARM_SMMU_FEAT_VAX; if ((smmu->features & feat_mask) != feat_mask) return false; if (!(smmu->pgsize_bitmap & PAGE_SIZE)) return false; /* * Get the smallest PA size of all CPUs (sanitized by cpufeature). We're * not even pretending to support AArch32 here. Abort if the MMU outputs * addresses larger than what we support. */ reg = read_sanitised_ftr_reg(SYS_ID_AA64MMFR0_EL1); fld = cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR0_EL1_PARANGE_SHIFT); oas = id_aa64mmfr0_parange_to_phys_shift(fld); if (smmu->oas < oas) return false; /* We can support bigger ASIDs than the CPU, but not smaller */ fld = cpuid_feature_extract_unsigned_field(reg, ID_AA64MMFR0_EL1_ASIDBITS_SHIFT); asid_bits = fld ? 16 : 8; if (smmu->asid_bits < asid_bits) return false; /* * See max_pinned_asids in arch/arm64/mm/context.c. The following is * generally the maximum number of bindable processes. */ if (arm64_kernel_unmapped_at_el0()) asid_bits--; dev_dbg(smmu->dev, "%d shared contexts\n", (1 << asid_bits) - num_possible_cpus() - 2); return true; } bool arm_smmu_master_iopf_supported(struct arm_smmu_master *master) { /* We're not keeping track of SIDs in fault events */ if (master->num_streams != 1) return false; return master->stall_enabled; } bool arm_smmu_master_sva_supported(struct arm_smmu_master *master) { if (!(master->smmu->features & ARM_SMMU_FEAT_SVA)) return false; /* SSID support is mandatory for the moment */ return master->ssid_bits; } bool arm_smmu_master_sva_enabled(struct arm_smmu_master *master) { bool enabled; mutex_lock(&sva_lock); enabled = master->sva_enabled; mutex_unlock(&sva_lock); return enabled; } static int arm_smmu_master_sva_enable_iopf(struct arm_smmu_master *master) { int ret; struct device *dev = master->dev; /* * Drivers for devices supporting PRI or stall should enable IOPF first. * Others have device-specific fault handlers and don't need IOPF. */ if (!arm_smmu_master_iopf_supported(master)) return 0; if (!master->iopf_enabled) return -EINVAL; ret = iopf_queue_add_device(master->smmu->evtq.iopf, dev); if (ret) return ret; ret = iommu_register_device_fault_handler(dev, iommu_queue_iopf, dev); if (ret) { iopf_queue_remove_device(master->smmu->evtq.iopf, dev); return ret; } return 0; } static void arm_smmu_master_sva_disable_iopf(struct arm_smmu_master *master) { struct device *dev = master->dev; if (!master->iopf_enabled) return; iommu_unregister_device_fault_handler(dev); iopf_queue_remove_device(master->smmu->evtq.iopf, dev); } int arm_smmu_master_enable_sva(struct arm_smmu_master *master) { int ret; mutex_lock(&sva_lock); ret = arm_smmu_master_sva_enable_iopf(master); if (!ret) master->sva_enabled = true; mutex_unlock(&sva_lock); return ret; } int arm_smmu_master_disable_sva(struct arm_smmu_master *master) { mutex_lock(&sva_lock); if (!list_empty(&master->bonds)) { dev_err(master->dev, "cannot disable SVA, device is bound\n"); mutex_unlock(&sva_lock); return -EBUSY; } arm_smmu_master_sva_disable_iopf(master); master->sva_enabled = false; mutex_unlock(&sva_lock); return 0; } void arm_smmu_sva_notifier_synchronize(void) { /* * Some MMU notifiers may still be waiting to be freed, using * arm_smmu_mmu_notifier_free(). Wait for them. */ mmu_notifier_synchronize(); } void arm_smmu_sva_remove_dev_pasid(struct iommu_domain *domain, struct device *dev, ioasid_t id) { struct mm_struct *mm = domain->mm; struct arm_smmu_bond *bond = NULL, *t; struct arm_smmu_master *master = dev_iommu_priv_get(dev); mutex_lock(&sva_lock); list_for_each_entry(t, &master->bonds, list) { if (t->mm == mm) { bond = t; break; } } if (!WARN_ON(!bond) && refcount_dec_and_test(&bond->refs)) { list_del(&bond->list); arm_smmu_mmu_notifier_put(bond->smmu_mn); kfree(bond); } mutex_unlock(&sva_lock); } static int arm_smmu_sva_set_dev_pasid(struct iommu_domain *domain, struct device *dev, ioasid_t id) { int ret = 0; struct iommu_sva *handle; struct mm_struct *mm = domain->mm; mutex_lock(&sva_lock); handle = __arm_smmu_sva_bind(dev, mm); if (IS_ERR(handle)) ret = PTR_ERR(handle); mutex_unlock(&sva_lock); return ret; } static void arm_smmu_sva_domain_free(struct iommu_domain *domain) { kfree(domain); } static const struct iommu_domain_ops arm_smmu_sva_domain_ops = { .set_dev_pasid = arm_smmu_sva_set_dev_pasid, .free = arm_smmu_sva_domain_free }; struct iommu_domain *arm_smmu_sva_domain_alloc(void) { struct iommu_domain *domain; domain = kzalloc(sizeof(*domain), GFP_KERNEL); if (!domain) return NULL; domain->ops = &arm_smmu_sva_domain_ops; return domain; }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1