iommu: Remove unused argument in is_attach_deferred
[linux-2.6-block.git] / drivers / iommu / amd / iommu_v2.c
CommitLineData
45051539 1// SPDX-License-Identifier: GPL-2.0-only
e3c495c7
JR
2/*
3 * Copyright (C) 2010-2012 Advanced Micro Devices, Inc.
63ce3ae8 4 * Author: Joerg Roedel <jroedel@suse.de>
e3c495c7
JR
5 */
6
101fa037
JR
7#define pr_fmt(fmt) "AMD-Vi: " fmt
8
8bc54824 9#include <linux/refcount.h>
8736b2c3 10#include <linux/mmu_notifier.h>
ed96f228
JR
11#include <linux/amd-iommu.h>
12#include <linux/mm_types.h>
8736b2c3 13#include <linux/profile.h>
e3c495c7 14#include <linux/module.h>
2d5503b6 15#include <linux/sched.h>
6e84f315 16#include <linux/sched/mm.h>
028eeacc 17#include <linux/wait.h>
ed96f228
JR
18#include <linux/pci.h>
19#include <linux/gfp.h>
e9d1d2bb 20#include <linux/cc_platform.h>
ed96f228 21
786dfe49 22#include "amd_iommu.h"
e3c495c7
JR
23
24MODULE_LICENSE("GPL v2");
63ce3ae8 25MODULE_AUTHOR("Joerg Roedel <jroedel@suse.de>");
e3c495c7 26
ed96f228
JR
27#define MAX_DEVICES 0x10000
28#define PRI_QUEUE_SIZE 512
29
30struct pri_queue {
31 atomic_t inflight;
32 bool finish;
028eeacc 33 int status;
ed96f228
JR
34};
35
36struct pasid_state {
37 struct list_head list; /* For global state-list */
8bc54824 38 refcount_t count; /* Reference count */
d73a6d72 39 unsigned mmu_notifier_count; /* Counting nested mmu_notifier
e79df31c 40 calls */
ed96f228 41 struct mm_struct *mm; /* mm_struct for the faults */
ff6d0cce 42 struct mmu_notifier mn; /* mmu_notifier handle */
ed96f228
JR
43 struct pri_queue pri[PRI_QUEUE_SIZE]; /* PRI tag states */
44 struct device_state *device_state; /* Link to our device_state */
c7b6bac9 45 u32 pasid; /* PASID index */
d9e1611e
JR
46 bool invalid; /* Used during setup and
47 teardown of the pasid */
d73a6d72
JR
48 spinlock_t lock; /* Protect pri_queues and
49 mmu_notifer_count */
028eeacc 50 wait_queue_head_t wq; /* To wait for count == 0 */
ed96f228
JR
51};
52
53struct device_state {
741669c7
JR
54 struct list_head list;
55 u16 devid;
ed96f228
JR
56 atomic_t count;
57 struct pci_dev *pdev;
58 struct pasid_state **states;
59 struct iommu_domain *domain;
60 int pasid_levels;
61 int max_pasids;
175d6146 62 amd_iommu_invalid_ppr_cb inv_ppr_cb;
bc21662f 63 amd_iommu_invalidate_ctx inv_ctx_cb;
ed96f228 64 spinlock_t lock;
028eeacc
JR
65 wait_queue_head_t wq;
66};
67
68struct fault {
69 struct work_struct work;
70 struct device_state *dev_state;
71 struct pasid_state *state;
72 struct mm_struct *mm;
73 u64 address;
74 u16 devid;
c7b6bac9 75 u32 pasid;
028eeacc
JR
76 u16 tag;
77 u16 finish;
78 u16 flags;
ed96f228
JR
79};
80
741669c7 81static LIST_HEAD(state_list);
106650f1 82static DEFINE_SPINLOCK(state_lock);
ed96f228 83
028eeacc
JR
84static struct workqueue_struct *iommu_wq;
85
2d5503b6 86static void free_pasid_states(struct device_state *dev_state);
ed96f228
JR
87
88static u16 device_id(struct pci_dev *pdev)
89{
90 u16 devid;
91
92 devid = pdev->bus->number;
93 devid = (devid << 8) | pdev->devfn;
94
95 return devid;
96}
97
b87d2d7c
JR
98static struct device_state *__get_device_state(u16 devid)
99{
741669c7
JR
100 struct device_state *dev_state;
101
102 list_for_each_entry(dev_state, &state_list, list) {
103 if (dev_state->devid == devid)
104 return dev_state;
105 }
106
107 return NULL;
b87d2d7c
JR
108}
109
ed96f228
JR
110static struct device_state *get_device_state(u16 devid)
111{
112 struct device_state *dev_state;
113 unsigned long flags;
114
115 spin_lock_irqsave(&state_lock, flags);
b87d2d7c 116 dev_state = __get_device_state(devid);
ed96f228
JR
117 if (dev_state != NULL)
118 atomic_inc(&dev_state->count);
119 spin_unlock_irqrestore(&state_lock, flags);
120
121 return dev_state;
122}
123
124static void free_device_state(struct device_state *dev_state)
125{
55c99a4d
JR
126 struct iommu_group *group;
127
2d5503b6
JR
128 /*
129 * First detach device from domain - No more PRI requests will arrive
130 * from that device after it is unbound from the IOMMUv2 domain.
131 */
55c99a4d
JR
132 group = iommu_group_get(&dev_state->pdev->dev);
133 if (WARN_ON(!group))
134 return;
135
136 iommu_detach_group(dev_state->domain, group);
137
138 iommu_group_put(group);
2d5503b6
JR
139
140 /* Everything is down now, free the IOMMUv2 domain */
ed96f228 141 iommu_domain_free(dev_state->domain);
2d5503b6
JR
142
143 /* Finally get rid of the device-state */
ed96f228
JR
144 kfree(dev_state);
145}
146
147static void put_device_state(struct device_state *dev_state)
148{
149 if (atomic_dec_and_test(&dev_state->count))
028eeacc 150 wake_up(&dev_state->wq);
ed96f228
JR
151}
152
2d5503b6
JR
153/* Must be called under dev_state->lock */
154static struct pasid_state **__get_pasid_state_ptr(struct device_state *dev_state,
c7b6bac9 155 u32 pasid, bool alloc)
2d5503b6
JR
156{
157 struct pasid_state **root, **ptr;
158 int level, index;
159
160 level = dev_state->pasid_levels;
161 root = dev_state->states;
162
163 while (true) {
164
165 index = (pasid >> (9 * level)) & 0x1ff;
166 ptr = &root[index];
167
168 if (level == 0)
169 break;
170
171 if (*ptr == NULL) {
172 if (!alloc)
173 return NULL;
174
175 *ptr = (void *)get_zeroed_page(GFP_ATOMIC);
176 if (*ptr == NULL)
177 return NULL;
178 }
179
180 root = (struct pasid_state **)*ptr;
181 level -= 1;
182 }
183
184 return ptr;
185}
186
187static int set_pasid_state(struct device_state *dev_state,
188 struct pasid_state *pasid_state,
c7b6bac9 189 u32 pasid)
2d5503b6
JR
190{
191 struct pasid_state **ptr;
192 unsigned long flags;
193 int ret;
194
195 spin_lock_irqsave(&dev_state->lock, flags);
196 ptr = __get_pasid_state_ptr(dev_state, pasid, true);
197
198 ret = -ENOMEM;
199 if (ptr == NULL)
200 goto out_unlock;
201
202 ret = -ENOMEM;
203 if (*ptr != NULL)
204 goto out_unlock;
205
206 *ptr = pasid_state;
207
208 ret = 0;
209
210out_unlock:
211 spin_unlock_irqrestore(&dev_state->lock, flags);
212
213 return ret;
214}
215
c7b6bac9 216static void clear_pasid_state(struct device_state *dev_state, u32 pasid)
2d5503b6
JR
217{
218 struct pasid_state **ptr;
219 unsigned long flags;
220
221 spin_lock_irqsave(&dev_state->lock, flags);
222 ptr = __get_pasid_state_ptr(dev_state, pasid, true);
223
224 if (ptr == NULL)
225 goto out_unlock;
226
227 *ptr = NULL;
228
229out_unlock:
230 spin_unlock_irqrestore(&dev_state->lock, flags);
231}
232
233static struct pasid_state *get_pasid_state(struct device_state *dev_state,
c7b6bac9 234 u32 pasid)
2d5503b6
JR
235{
236 struct pasid_state **ptr, *ret = NULL;
237 unsigned long flags;
238
239 spin_lock_irqsave(&dev_state->lock, flags);
240 ptr = __get_pasid_state_ptr(dev_state, pasid, false);
241
242 if (ptr == NULL)
243 goto out_unlock;
244
245 ret = *ptr;
246 if (ret)
8bc54824 247 refcount_inc(&ret->count);
2d5503b6
JR
248
249out_unlock:
250 spin_unlock_irqrestore(&dev_state->lock, flags);
251
252 return ret;
253}
254
255static void free_pasid_state(struct pasid_state *pasid_state)
256{
257 kfree(pasid_state);
258}
259
260static void put_pasid_state(struct pasid_state *pasid_state)
261{
8bc54824 262 if (refcount_dec_and_test(&pasid_state->count))
028eeacc 263 wake_up(&pasid_state->wq);
2d5503b6
JR
264}
265
028eeacc
JR
266static void put_pasid_state_wait(struct pasid_state *pasid_state)
267{
8bc54824
XY
268 refcount_dec(&pasid_state->count);
269 wait_event(pasid_state->wq, !refcount_read(&pasid_state->count));
028eeacc
JR
270 free_pasid_state(pasid_state);
271}
272
61feb438 273static void unbind_pasid(struct pasid_state *pasid_state)
8736b2c3
JR
274{
275 struct iommu_domain *domain;
276
277 domain = pasid_state->device_state->domain;
278
53d340ef
JR
279 /*
280 * Mark pasid_state as invalid, no more faults will we added to the
281 * work queue after this is visible everywhere.
282 */
283 pasid_state->invalid = true;
284
285 /* Make sure this is visible */
286 smp_wmb();
287
288 /* After this the device/pasid can't access the mm anymore */
8736b2c3 289 amd_iommu_domain_clear_gcr3(domain, pasid_state->pasid);
8736b2c3
JR
290
291 /* Make sure no more pending faults are in the queue */
292 flush_workqueue(iommu_wq);
8736b2c3
JR
293}
294
2d5503b6
JR
295static void free_pasid_states_level1(struct pasid_state **tbl)
296{
297 int i;
298
299 for (i = 0; i < 512; ++i) {
300 if (tbl[i] == NULL)
301 continue;
302
303 free_page((unsigned long)tbl[i]);
304 }
305}
306
307static void free_pasid_states_level2(struct pasid_state **tbl)
308{
309 struct pasid_state **ptr;
310 int i;
311
312 for (i = 0; i < 512; ++i) {
313 if (tbl[i] == NULL)
314 continue;
315
316 ptr = (struct pasid_state **)tbl[i];
317 free_pasid_states_level1(ptr);
318 }
319}
320
321static void free_pasid_states(struct device_state *dev_state)
322{
323 struct pasid_state *pasid_state;
324 int i;
325
326 for (i = 0; i < dev_state->max_pasids; ++i) {
327 pasid_state = get_pasid_state(dev_state, i);
328 if (pasid_state == NULL)
329 continue;
330
2d5503b6 331 put_pasid_state(pasid_state);
a40d4c67
JR
332
333 /*
334 * This will call the mn_release function and
335 * unbind the PASID
336 */
337 mmu_notifier_unregister(&pasid_state->mn, pasid_state->mm);
c5db16ad
JR
338
339 put_pasid_state_wait(pasid_state); /* Reference taken in
daff2f9c 340 amd_iommu_bind_pasid */
75058a30
JR
341
342 /* Drop reference taken in amd_iommu_bind_pasid */
343 put_device_state(dev_state);
2d5503b6
JR
344 }
345
346 if (dev_state->pasid_levels == 2)
347 free_pasid_states_level2(dev_state->states);
348 else if (dev_state->pasid_levels == 1)
349 free_pasid_states_level1(dev_state->states);
23d3a98c
JR
350 else
351 BUG_ON(dev_state->pasid_levels != 0);
2d5503b6
JR
352
353 free_page((unsigned long)dev_state->states);
354}
355
8736b2c3
JR
356static struct pasid_state *mn_to_state(struct mmu_notifier *mn)
357{
358 return container_of(mn, struct pasid_state, mn);
359}
360
e7cc3dd4
JR
361static void mn_invalidate_range(struct mmu_notifier *mn,
362 struct mm_struct *mm,
363 unsigned long start, unsigned long end)
8736b2c3
JR
364{
365 struct pasid_state *pasid_state;
366 struct device_state *dev_state;
367
368 pasid_state = mn_to_state(mn);
369 dev_state = pasid_state->device_state;
370
e7cc3dd4
JR
371 if ((start ^ (end - 1)) < PAGE_SIZE)
372 amd_iommu_flush_page(dev_state->domain, pasid_state->pasid,
373 start);
374 else
375 amd_iommu_flush_tlb(dev_state->domain, pasid_state->pasid);
8736b2c3
JR
376}
377
a40d4c67
JR
378static void mn_release(struct mmu_notifier *mn, struct mm_struct *mm)
379{
380 struct pasid_state *pasid_state;
381 struct device_state *dev_state;
d9e1611e 382 bool run_inv_ctx_cb;
a40d4c67
JR
383
384 might_sleep();
385
d9e1611e
JR
386 pasid_state = mn_to_state(mn);
387 dev_state = pasid_state->device_state;
388 run_inv_ctx_cb = !pasid_state->invalid;
a40d4c67 389
940f700d 390 if (run_inv_ctx_cb && dev_state->inv_ctx_cb)
a40d4c67
JR
391 dev_state->inv_ctx_cb(dev_state->pdev, pasid_state->pasid);
392
61feb438 393 unbind_pasid(pasid_state);
a40d4c67
JR
394}
395
759ce23b 396static const struct mmu_notifier_ops iommu_mn = {
a40d4c67 397 .release = mn_release,
e7cc3dd4 398 .invalidate_range = mn_invalidate_range,
8736b2c3
JR
399};
400
028eeacc
JR
401static void set_pri_tag_status(struct pasid_state *pasid_state,
402 u16 tag, int status)
403{
404 unsigned long flags;
405
406 spin_lock_irqsave(&pasid_state->lock, flags);
407 pasid_state->pri[tag].status = status;
408 spin_unlock_irqrestore(&pasid_state->lock, flags);
409}
410
411static void finish_pri_tag(struct device_state *dev_state,
412 struct pasid_state *pasid_state,
413 u16 tag)
414{
415 unsigned long flags;
416
417 spin_lock_irqsave(&pasid_state->lock, flags);
418 if (atomic_dec_and_test(&pasid_state->pri[tag].inflight) &&
419 pasid_state->pri[tag].finish) {
420 amd_iommu_complete_ppr(dev_state->pdev, pasid_state->pasid,
421 pasid_state->pri[tag].status, tag);
422 pasid_state->pri[tag].finish = false;
423 pasid_state->pri[tag].status = PPR_SUCCESS;
424 }
425 spin_unlock_irqrestore(&pasid_state->lock, flags);
426}
427
9dc00f4c
JB
428static void handle_fault_error(struct fault *fault)
429{
430 int status;
431
432 if (!fault->dev_state->inv_ppr_cb) {
433 set_pri_tag_status(fault->state, fault->tag, PPR_INVALID);
434 return;
435 }
436
437 status = fault->dev_state->inv_ppr_cb(fault->dev_state->pdev,
438 fault->pasid,
439 fault->address,
440 fault->flags);
441 switch (status) {
442 case AMD_IOMMU_INV_PRI_RSP_SUCCESS:
443 set_pri_tag_status(fault->state, fault->tag, PPR_SUCCESS);
444 break;
445 case AMD_IOMMU_INV_PRI_RSP_INVALID:
446 set_pri_tag_status(fault->state, fault->tag, PPR_INVALID);
447 break;
448 case AMD_IOMMU_INV_PRI_RSP_FAIL:
449 set_pri_tag_status(fault->state, fault->tag, PPR_FAILURE);
450 break;
451 default:
452 BUG();
453 }
454}
455
7b5cc1a9
JR
456static bool access_error(struct vm_area_struct *vma, struct fault *fault)
457{
458 unsigned long requested = 0;
459
460 if (fault->flags & PPR_FAULT_EXEC)
461 requested |= VM_EXEC;
462
463 if (fault->flags & PPR_FAULT_READ)
464 requested |= VM_READ;
465
466 if (fault->flags & PPR_FAULT_WRITE)
467 requested |= VM_WRITE;
468
469 return (requested & ~vma->vm_flags) != 0;
470}
471
028eeacc
JR
472static void do_fault(struct work_struct *work)
473{
474 struct fault *fault = container_of(work, struct fault, work);
9dc00f4c 475 struct vm_area_struct *vma;
50a7ca3c 476 vm_fault_t ret = VM_FAULT_ERROR;
43c0ea20
JR
477 unsigned int flags = 0;
478 struct mm_struct *mm;
9dc00f4c 479 u64 address;
028eeacc 480
9dc00f4c
JB
481 mm = fault->state->mm;
482 address = fault->address;
483
43c0ea20
JR
484 if (fault->flags & PPR_FAULT_USER)
485 flags |= FAULT_FLAG_USER;
486 if (fault->flags & PPR_FAULT_WRITE)
487 flags |= FAULT_FLAG_WRITE;
1b2ee126 488 flags |= FAULT_FLAG_REMOTE;
43c0ea20 489
d8ed45c5 490 mmap_read_lock(mm);
9dc00f4c 491 vma = find_extend_vma(mm, address);
492e7459 492 if (!vma || address < vma->vm_start)
9dc00f4c 493 /* failed to get a vma in the right range */
9dc00f4c 494 goto out;
028eeacc 495
7b5cc1a9 496 /* Check if we have the right permissions on the vma */
492e7459 497 if (access_error(vma, fault))
d14f6fce 498 goto out;
d14f6fce 499
bce617ed 500 ret = handle_mm_fault(vma, address, flags, NULL);
492e7459 501out:
d8ed45c5 502 mmap_read_unlock(mm);
9dc00f4c 503
492e7459
JR
504 if (ret & VM_FAULT_ERROR)
505 /* failed to service fault */
506 handle_fault_error(fault);
507
028eeacc
JR
508 finish_pri_tag(fault->dev_state, fault->state, fault->tag);
509
510 put_pasid_state(fault->state);
511
512 kfree(fault);
513}
514
515static int ppr_notifier(struct notifier_block *nb, unsigned long e, void *data)
516{
517 struct amd_iommu_fault *iommu_fault;
518 struct pasid_state *pasid_state;
519 struct device_state *dev_state;
fb1b6955 520 struct pci_dev *pdev = NULL;
028eeacc
JR
521 unsigned long flags;
522 struct fault *fault;
523 bool finish;
daae2d25 524 u16 tag, devid;
028eeacc
JR
525 int ret;
526
527 iommu_fault = data;
528 tag = iommu_fault->tag & 0x1ff;
529 finish = (iommu_fault->tag >> 9) & 1;
530
daae2d25 531 devid = iommu_fault->device_id;
d5bf0f4f
SK
532 pdev = pci_get_domain_bus_and_slot(0, PCI_BUS_NUM(devid),
533 devid & 0xff);
daae2d25
BH
534 if (!pdev)
535 return -ENODEV;
daae2d25 536
028eeacc 537 ret = NOTIFY_DONE;
fb1b6955
JR
538
539 /* In kdump kernel pci dev is not initialized yet -> send INVALID */
41bb23e7 540 if (amd_iommu_is_attach_deferred(&pdev->dev)) {
daae2d25
BH
541 amd_iommu_complete_ppr(pdev, iommu_fault->pasid,
542 PPR_INVALID, tag);
543 goto out;
544 }
545
028eeacc
JR
546 dev_state = get_device_state(iommu_fault->device_id);
547 if (dev_state == NULL)
548 goto out;
549
550 pasid_state = get_pasid_state(dev_state, iommu_fault->pasid);
53d340ef 551 if (pasid_state == NULL || pasid_state->invalid) {
028eeacc
JR
552 /* We know the device but not the PASID -> send INVALID */
553 amd_iommu_complete_ppr(dev_state->pdev, iommu_fault->pasid,
554 PPR_INVALID, tag);
555 goto out_drop_state;
556 }
557
558 spin_lock_irqsave(&pasid_state->lock, flags);
559 atomic_inc(&pasid_state->pri[tag].inflight);
560 if (finish)
561 pasid_state->pri[tag].finish = true;
562 spin_unlock_irqrestore(&pasid_state->lock, flags);
563
564 fault = kzalloc(sizeof(*fault), GFP_ATOMIC);
565 if (fault == NULL) {
566 /* We are OOM - send success and let the device re-fault */
567 finish_pri_tag(dev_state, pasid_state, tag);
568 goto out_drop_state;
569 }
570
571 fault->dev_state = dev_state;
572 fault->address = iommu_fault->address;
573 fault->state = pasid_state;
574 fault->tag = tag;
575 fault->finish = finish;
b00675b8 576 fault->pasid = iommu_fault->pasid;
028eeacc
JR
577 fault->flags = iommu_fault->flags;
578 INIT_WORK(&fault->work, do_fault);
579
580 queue_work(iommu_wq, &fault->work);
581
582 ret = NOTIFY_OK;
583
584out_drop_state:
dc88db7e
JR
585
586 if (ret != NOTIFY_OK && pasid_state)
587 put_pasid_state(pasid_state);
588
028eeacc
JR
589 put_device_state(dev_state);
590
591out:
592 return ret;
593}
594
595static struct notifier_block ppr_nb = {
596 .notifier_call = ppr_notifier,
597};
598
c7b6bac9 599int amd_iommu_bind_pasid(struct pci_dev *pdev, u32 pasid,
2d5503b6
JR
600 struct task_struct *task)
601{
602 struct pasid_state *pasid_state;
603 struct device_state *dev_state;
f0aac63b 604 struct mm_struct *mm;
2d5503b6
JR
605 u16 devid;
606 int ret;
607
608 might_sleep();
609
610 if (!amd_iommu_v2_supported())
611 return -ENODEV;
612
613 devid = device_id(pdev);
614 dev_state = get_device_state(devid);
615
616 if (dev_state == NULL)
617 return -EINVAL;
618
619 ret = -EINVAL;
c7b6bac9 620 if (pasid >= dev_state->max_pasids)
2d5503b6
JR
621 goto out;
622
623 ret = -ENOMEM;
624 pasid_state = kzalloc(sizeof(*pasid_state), GFP_KERNEL);
625 if (pasid_state == NULL)
626 goto out;
627
f0aac63b 628
8bc54824 629 refcount_set(&pasid_state->count, 1);
028eeacc 630 init_waitqueue_head(&pasid_state->wq);
2c13d47a
JR
631 spin_lock_init(&pasid_state->lock);
632
f0aac63b 633 mm = get_task_mm(task);
f0aac63b 634 pasid_state->mm = mm;
2d5503b6
JR
635 pasid_state->device_state = dev_state;
636 pasid_state->pasid = pasid;
d9e1611e
JR
637 pasid_state->invalid = true; /* Mark as valid only if we are
638 done with setting up the pasid */
8736b2c3 639 pasid_state->mn.ops = &iommu_mn;
2d5503b6
JR
640
641 if (pasid_state->mm == NULL)
642 goto out_free;
643
f0aac63b 644 mmu_notifier_register(&pasid_state->mn, mm);
8736b2c3 645
2d5503b6
JR
646 ret = set_pasid_state(dev_state, pasid_state, pasid);
647 if (ret)
8736b2c3 648 goto out_unregister;
2d5503b6
JR
649
650 ret = amd_iommu_domain_set_gcr3(dev_state->domain, pasid,
651 __pa(pasid_state->mm->pgd));
652 if (ret)
653 goto out_clear_state;
654
d9e1611e
JR
655 /* Now we are ready to handle faults */
656 pasid_state->invalid = false;
657
f0aac63b
JR
658 /*
659 * Drop the reference to the mm_struct here. We rely on the
660 * mmu_notifier release call-back to inform us when the mm
661 * is going away.
662 */
663 mmput(mm);
664
2d5503b6
JR
665 return 0;
666
667out_clear_state:
668 clear_pasid_state(dev_state, pasid);
669
8736b2c3 670out_unregister:
f0aac63b 671 mmu_notifier_unregister(&pasid_state->mn, mm);
73dbd4a4 672 mmput(mm);
8736b2c3 673
2d5503b6 674out_free:
028eeacc 675 free_pasid_state(pasid_state);
2d5503b6
JR
676
677out:
678 put_device_state(dev_state);
679
680 return ret;
681}
682EXPORT_SYMBOL(amd_iommu_bind_pasid);
683
c7b6bac9 684void amd_iommu_unbind_pasid(struct pci_dev *pdev, u32 pasid)
2d5503b6 685{
a40d4c67 686 struct pasid_state *pasid_state;
2d5503b6
JR
687 struct device_state *dev_state;
688 u16 devid;
689
690 might_sleep();
691
692 if (!amd_iommu_v2_supported())
693 return;
694
695 devid = device_id(pdev);
696 dev_state = get_device_state(devid);
697 if (dev_state == NULL)
698 return;
699
c7b6bac9 700 if (pasid >= dev_state->max_pasids)
2d5503b6
JR
701 goto out;
702
a40d4c67
JR
703 pasid_state = get_pasid_state(dev_state, pasid);
704 if (pasid_state == NULL)
705 goto out;
706 /*
707 * Drop reference taken here. We are safe because we still hold
708 * the reference taken in the amd_iommu_bind_pasid function.
709 */
710 put_pasid_state(pasid_state);
711
53d340ef
JR
712 /* Clear the pasid state so that the pasid can be re-used */
713 clear_pasid_state(dev_state, pasid_state->pasid);
714
f0aac63b 715 /*
fcaa9606
JR
716 * Call mmu_notifier_unregister to drop our reference
717 * to pasid_state->mm
f0aac63b 718 */
fcaa9606 719 mmu_notifier_unregister(&pasid_state->mn, pasid_state->mm);
2d5503b6 720
c5db16ad 721 put_pasid_state_wait(pasid_state); /* Reference taken in
daff2f9c 722 amd_iommu_bind_pasid */
2d5503b6 723out:
75058a30
JR
724 /* Drop reference taken in this function */
725 put_device_state(dev_state);
726
727 /* Drop reference taken in amd_iommu_bind_pasid */
2d5503b6
JR
728 put_device_state(dev_state);
729}
730EXPORT_SYMBOL(amd_iommu_unbind_pasid);
731
ed96f228
JR
732int amd_iommu_init_device(struct pci_dev *pdev, int pasids)
733{
734 struct device_state *dev_state;
55c99a4d 735 struct iommu_group *group;
ed96f228
JR
736 unsigned long flags;
737 int ret, tmp;
738 u16 devid;
739
740 might_sleep();
741
2822e582
JR
742 /*
743 * When memory encryption is active the device is likely not in a
744 * direct-mapped domain. Forbid using IOMMUv2 functionality for now.
745 */
e9d1d2bb 746 if (cc_platform_has(CC_ATTR_MEM_ENCRYPT))
2822e582
JR
747 return -ENODEV;
748
ed96f228
JR
749 if (!amd_iommu_v2_supported())
750 return -ENODEV;
751
752 if (pasids <= 0 || pasids > (PASID_MASK + 1))
753 return -EINVAL;
754
755 devid = device_id(pdev);
756
757 dev_state = kzalloc(sizeof(*dev_state), GFP_KERNEL);
758 if (dev_state == NULL)
759 return -ENOMEM;
760
761 spin_lock_init(&dev_state->lock);
028eeacc 762 init_waitqueue_head(&dev_state->wq);
741669c7
JR
763 dev_state->pdev = pdev;
764 dev_state->devid = devid;
ed96f228
JR
765
766 tmp = pasids;
767 for (dev_state->pasid_levels = 0; (tmp - 1) & ~0x1ff; tmp >>= 9)
768 dev_state->pasid_levels += 1;
769
770 atomic_set(&dev_state->count, 1);
771 dev_state->max_pasids = pasids;
772
773 ret = -ENOMEM;
774 dev_state->states = (void *)get_zeroed_page(GFP_KERNEL);
775 if (dev_state->states == NULL)
776 goto out_free_dev_state;
777
778 dev_state->domain = iommu_domain_alloc(&pci_bus_type);
779 if (dev_state->domain == NULL)
780 goto out_free_states;
781
782 amd_iommu_domain_direct_map(dev_state->domain);
783
784 ret = amd_iommu_domain_enable_v2(dev_state->domain, pasids);
785 if (ret)
786 goto out_free_domain;
787
55c99a4d 788 group = iommu_group_get(&pdev->dev);
24c790fb
DC
789 if (!group) {
790 ret = -EINVAL;
ed96f228 791 goto out_free_domain;
24c790fb 792 }
ed96f228 793
55c99a4d
JR
794 ret = iommu_attach_group(dev_state->domain, group);
795 if (ret != 0)
796 goto out_drop_group;
797
798 iommu_group_put(group);
799
ed96f228
JR
800 spin_lock_irqsave(&state_lock, flags);
801
741669c7 802 if (__get_device_state(devid) != NULL) {
ed96f228
JR
803 spin_unlock_irqrestore(&state_lock, flags);
804 ret = -EBUSY;
805 goto out_free_domain;
806 }
807
741669c7 808 list_add_tail(&dev_state->list, &state_list);
ed96f228
JR
809
810 spin_unlock_irqrestore(&state_lock, flags);
811
812 return 0;
813
55c99a4d
JR
814out_drop_group:
815 iommu_group_put(group);
816
ed96f228
JR
817out_free_domain:
818 iommu_domain_free(dev_state->domain);
819
820out_free_states:
821 free_page((unsigned long)dev_state->states);
822
823out_free_dev_state:
824 kfree(dev_state);
825
826 return ret;
827}
828EXPORT_SYMBOL(amd_iommu_init_device);
829
830void amd_iommu_free_device(struct pci_dev *pdev)
831{
832 struct device_state *dev_state;
833 unsigned long flags;
834 u16 devid;
835
836 if (!amd_iommu_v2_supported())
837 return;
838
839 devid = device_id(pdev);
840
841 spin_lock_irqsave(&state_lock, flags);
842
b87d2d7c 843 dev_state = __get_device_state(devid);
ed96f228
JR
844 if (dev_state == NULL) {
845 spin_unlock_irqrestore(&state_lock, flags);
846 return;
847 }
848
741669c7 849 list_del(&dev_state->list);
ed96f228
JR
850
851 spin_unlock_irqrestore(&state_lock, flags);
852
2d5503b6
JR
853 /* Get rid of any remaining pasid states */
854 free_pasid_states(dev_state);
855
91f65fac
PZ
856 put_device_state(dev_state);
857 /*
858 * Wait until the last reference is dropped before freeing
859 * the device state.
860 */
861 wait_event(dev_state->wq, !atomic_read(&dev_state->count));
862 free_device_state(dev_state);
ed96f228
JR
863}
864EXPORT_SYMBOL(amd_iommu_free_device);
865
175d6146
JR
866int amd_iommu_set_invalid_ppr_cb(struct pci_dev *pdev,
867 amd_iommu_invalid_ppr_cb cb)
868{
869 struct device_state *dev_state;
870 unsigned long flags;
871 u16 devid;
872 int ret;
873
874 if (!amd_iommu_v2_supported())
875 return -ENODEV;
876
877 devid = device_id(pdev);
878
879 spin_lock_irqsave(&state_lock, flags);
880
881 ret = -EINVAL;
b87d2d7c 882 dev_state = __get_device_state(devid);
175d6146
JR
883 if (dev_state == NULL)
884 goto out_unlock;
885
886 dev_state->inv_ppr_cb = cb;
887
888 ret = 0;
889
890out_unlock:
891 spin_unlock_irqrestore(&state_lock, flags);
892
893 return ret;
894}
895EXPORT_SYMBOL(amd_iommu_set_invalid_ppr_cb);
896
bc21662f
JR
897int amd_iommu_set_invalidate_ctx_cb(struct pci_dev *pdev,
898 amd_iommu_invalidate_ctx cb)
899{
900 struct device_state *dev_state;
901 unsigned long flags;
902 u16 devid;
903 int ret;
904
905 if (!amd_iommu_v2_supported())
906 return -ENODEV;
907
908 devid = device_id(pdev);
909
910 spin_lock_irqsave(&state_lock, flags);
911
912 ret = -EINVAL;
b87d2d7c 913 dev_state = __get_device_state(devid);
bc21662f
JR
914 if (dev_state == NULL)
915 goto out_unlock;
916
917 dev_state->inv_ctx_cb = cb;
918
919 ret = 0;
920
921out_unlock:
922 spin_unlock_irqrestore(&state_lock, flags);
923
924 return ret;
925}
926EXPORT_SYMBOL(amd_iommu_set_invalidate_ctx_cb);
927
e3c495c7
JR
928static int __init amd_iommu_v2_init(void)
929{
028eeacc 930 int ret;
ed96f228 931
474d567d 932 if (!amd_iommu_v2_supported()) {
717e88aa 933 pr_info("AMD IOMMUv2 functionality not available on this system - This is not a bug.\n");
474d567d
JR
934 /*
935 * Load anyway to provide the symbols to other modules
936 * which may use AMD IOMMUv2 optionally.
937 */
938 return 0;
939 }
e3c495c7 940
028eeacc 941 ret = -ENOMEM;
cf7513e7 942 iommu_wq = alloc_workqueue("amd_iommu_v2", WQ_MEM_RECLAIM, 0);
8736b2c3 943 if (iommu_wq == NULL)
741669c7 944 goto out;
8736b2c3 945
028eeacc
JR
946 amd_iommu_register_ppr_notifier(&ppr_nb);
947
717e88aa
JR
948 pr_info("AMD IOMMUv2 loaded and initialized\n");
949
e3c495c7 950 return 0;
028eeacc 951
741669c7 952out:
028eeacc 953 return ret;
e3c495c7
JR
954}
955
956static void __exit amd_iommu_v2_exit(void)
957{
ed96f228 958 struct device_state *dev_state;
ed96f228
JR
959 int i;
960
474d567d
JR
961 if (!amd_iommu_v2_supported())
962 return;
963
028eeacc
JR
964 amd_iommu_unregister_ppr_notifier(&ppr_nb);
965
966 flush_workqueue(iommu_wq);
967
968 /*
969 * The loop below might call flush_workqueue(), so call
970 * destroy_workqueue() after it
971 */
ed96f228
JR
972 for (i = 0; i < MAX_DEVICES; ++i) {
973 dev_state = get_device_state(i);
974
975 if (dev_state == NULL)
976 continue;
977
978 WARN_ON_ONCE(1);
979
ed96f228 980 put_device_state(dev_state);
028eeacc 981 amd_iommu_free_device(dev_state->pdev);
ed96f228
JR
982 }
983
028eeacc 984 destroy_workqueue(iommu_wq);
e3c495c7
JR
985}
986
987module_init(amd_iommu_v2_init);
988module_exit(amd_iommu_v2_exit);