• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3  * Copyright (C) 2010-2012 Advanced Micro Devices, Inc.
4  * Author: Joerg Roedel <jroedel@suse.de>
5  */
6 
7 #define pr_fmt(fmt)     "AMD-Vi: " fmt
8 
9 #include <linux/mmu_notifier.h>
10 #include <linux/amd-iommu.h>
11 #include <linux/mm_types.h>
12 #include <linux/profile.h>
13 #include <linux/module.h>
14 #include <linux/sched.h>
15 #include <linux/sched/mm.h>
16 #include <linux/iommu.h>
17 #include <linux/wait.h>
18 #include <linux/pci.h>
19 #include <linux/gfp.h>
20 
21 #include "amd_iommu_types.h"
22 #include "amd_iommu_proto.h"
23 
24 MODULE_LICENSE("GPL v2");
25 MODULE_AUTHOR("Joerg Roedel <jroedel@suse.de>");
26 
27 #define MAX_DEVICES		0x10000
28 #define PRI_QUEUE_SIZE		512
29 
30 struct pri_queue {
31 	atomic_t inflight;
32 	bool finish;
33 	int status;
34 };
35 
36 struct pasid_state {
37 	struct list_head list;			/* For global state-list */
38 	atomic_t count;				/* Reference count */
39 	unsigned mmu_notifier_count;		/* Counting nested mmu_notifier
40 						   calls */
41 	struct mm_struct *mm;			/* mm_struct for the faults */
42 	struct mmu_notifier mn;                 /* mmu_notifier handle */
43 	struct pri_queue pri[PRI_QUEUE_SIZE];	/* PRI tag states */
44 	struct device_state *device_state;	/* Link to our device_state */
45 	int pasid;				/* PASID index */
46 	bool invalid;				/* Used during setup and
47 						   teardown of the pasid */
48 	spinlock_t lock;			/* Protect pri_queues and
49 						   mmu_notifer_count */
50 	wait_queue_head_t wq;			/* To wait for count == 0 */
51 };
52 
53 struct device_state {
54 	struct list_head list;
55 	u16 devid;
56 	atomic_t count;
57 	struct pci_dev *pdev;
58 	struct pasid_state **states;
59 	struct iommu_domain *domain;
60 	int pasid_levels;
61 	int max_pasids;
62 	amd_iommu_invalid_ppr_cb inv_ppr_cb;
63 	amd_iommu_invalidate_ctx inv_ctx_cb;
64 	spinlock_t lock;
65 	wait_queue_head_t wq;
66 };
67 
68 struct fault {
69 	struct work_struct work;
70 	struct device_state *dev_state;
71 	struct pasid_state *state;
72 	struct mm_struct *mm;
73 	u64 address;
74 	u16 devid;
75 	u16 pasid;
76 	u16 tag;
77 	u16 finish;
78 	u16 flags;
79 };
80 
81 static LIST_HEAD(state_list);
82 static spinlock_t state_lock;
83 
84 static struct workqueue_struct *iommu_wq;
85 
86 static void free_pasid_states(struct device_state *dev_state);
87 
device_id(struct pci_dev * pdev)88 static u16 device_id(struct pci_dev *pdev)
89 {
90 	u16 devid;
91 
92 	devid = pdev->bus->number;
93 	devid = (devid << 8) | pdev->devfn;
94 
95 	return devid;
96 }
97 
__get_device_state(u16 devid)98 static struct device_state *__get_device_state(u16 devid)
99 {
100 	struct device_state *dev_state;
101 
102 	list_for_each_entry(dev_state, &state_list, list) {
103 		if (dev_state->devid == devid)
104 			return dev_state;
105 	}
106 
107 	return NULL;
108 }
109 
get_device_state(u16 devid)110 static struct device_state *get_device_state(u16 devid)
111 {
112 	struct device_state *dev_state;
113 	unsigned long flags;
114 
115 	spin_lock_irqsave(&state_lock, flags);
116 	dev_state = __get_device_state(devid);
117 	if (dev_state != NULL)
118 		atomic_inc(&dev_state->count);
119 	spin_unlock_irqrestore(&state_lock, flags);
120 
121 	return dev_state;
122 }
123 
free_device_state(struct device_state * dev_state)124 static void free_device_state(struct device_state *dev_state)
125 {
126 	struct iommu_group *group;
127 
128 	/*
129 	 * First detach device from domain - No more PRI requests will arrive
130 	 * from that device after it is unbound from the IOMMUv2 domain.
131 	 */
132 	group = iommu_group_get(&dev_state->pdev->dev);
133 	if (WARN_ON(!group))
134 		return;
135 
136 	iommu_detach_group(dev_state->domain, group);
137 
138 	iommu_group_put(group);
139 
140 	/* Everything is down now, free the IOMMUv2 domain */
141 	iommu_domain_free(dev_state->domain);
142 
143 	/* Finally get rid of the device-state */
144 	kfree(dev_state);
145 }
146 
put_device_state(struct device_state * dev_state)147 static void put_device_state(struct device_state *dev_state)
148 {
149 	if (atomic_dec_and_test(&dev_state->count))
150 		wake_up(&dev_state->wq);
151 }
152 
153 /* Must be called under dev_state->lock */
__get_pasid_state_ptr(struct device_state * dev_state,int pasid,bool alloc)154 static struct pasid_state **__get_pasid_state_ptr(struct device_state *dev_state,
155 						  int pasid, bool alloc)
156 {
157 	struct pasid_state **root, **ptr;
158 	int level, index;
159 
160 	level = dev_state->pasid_levels;
161 	root  = dev_state->states;
162 
163 	while (true) {
164 
165 		index = (pasid >> (9 * level)) & 0x1ff;
166 		ptr   = &root[index];
167 
168 		if (level == 0)
169 			break;
170 
171 		if (*ptr == NULL) {
172 			if (!alloc)
173 				return NULL;
174 
175 			*ptr = (void *)get_zeroed_page(GFP_ATOMIC);
176 			if (*ptr == NULL)
177 				return NULL;
178 		}
179 
180 		root   = (struct pasid_state **)*ptr;
181 		level -= 1;
182 	}
183 
184 	return ptr;
185 }
186 
set_pasid_state(struct device_state * dev_state,struct pasid_state * pasid_state,int pasid)187 static int set_pasid_state(struct device_state *dev_state,
188 			   struct pasid_state *pasid_state,
189 			   int pasid)
190 {
191 	struct pasid_state **ptr;
192 	unsigned long flags;
193 	int ret;
194 
195 	spin_lock_irqsave(&dev_state->lock, flags);
196 	ptr = __get_pasid_state_ptr(dev_state, pasid, true);
197 
198 	ret = -ENOMEM;
199 	if (ptr == NULL)
200 		goto out_unlock;
201 
202 	ret = -ENOMEM;
203 	if (*ptr != NULL)
204 		goto out_unlock;
205 
206 	*ptr = pasid_state;
207 
208 	ret = 0;
209 
210 out_unlock:
211 	spin_unlock_irqrestore(&dev_state->lock, flags);
212 
213 	return ret;
214 }
215 
clear_pasid_state(struct device_state * dev_state,int pasid)216 static void clear_pasid_state(struct device_state *dev_state, int pasid)
217 {
218 	struct pasid_state **ptr;
219 	unsigned long flags;
220 
221 	spin_lock_irqsave(&dev_state->lock, flags);
222 	ptr = __get_pasid_state_ptr(dev_state, pasid, true);
223 
224 	if (ptr == NULL)
225 		goto out_unlock;
226 
227 	*ptr = NULL;
228 
229 out_unlock:
230 	spin_unlock_irqrestore(&dev_state->lock, flags);
231 }
232 
get_pasid_state(struct device_state * dev_state,int pasid)233 static struct pasid_state *get_pasid_state(struct device_state *dev_state,
234 					   int pasid)
235 {
236 	struct pasid_state **ptr, *ret = NULL;
237 	unsigned long flags;
238 
239 	spin_lock_irqsave(&dev_state->lock, flags);
240 	ptr = __get_pasid_state_ptr(dev_state, pasid, false);
241 
242 	if (ptr == NULL)
243 		goto out_unlock;
244 
245 	ret = *ptr;
246 	if (ret)
247 		atomic_inc(&ret->count);
248 
249 out_unlock:
250 	spin_unlock_irqrestore(&dev_state->lock, flags);
251 
252 	return ret;
253 }
254 
free_pasid_state(struct pasid_state * pasid_state)255 static void free_pasid_state(struct pasid_state *pasid_state)
256 {
257 	kfree(pasid_state);
258 }
259 
put_pasid_state(struct pasid_state * pasid_state)260 static void put_pasid_state(struct pasid_state *pasid_state)
261 {
262 	if (atomic_dec_and_test(&pasid_state->count))
263 		wake_up(&pasid_state->wq);
264 }
265 
put_pasid_state_wait(struct pasid_state * pasid_state)266 static void put_pasid_state_wait(struct pasid_state *pasid_state)
267 {
268 	atomic_dec(&pasid_state->count);
269 	wait_event(pasid_state->wq, !atomic_read(&pasid_state->count));
270 	free_pasid_state(pasid_state);
271 }
272 
unbind_pasid(struct pasid_state * pasid_state)273 static void unbind_pasid(struct pasid_state *pasid_state)
274 {
275 	struct iommu_domain *domain;
276 
277 	domain = pasid_state->device_state->domain;
278 
279 	/*
280 	 * Mark pasid_state as invalid, no more faults will we added to the
281 	 * work queue after this is visible everywhere.
282 	 */
283 	pasid_state->invalid = true;
284 
285 	/* Make sure this is visible */
286 	smp_wmb();
287 
288 	/* After this the device/pasid can't access the mm anymore */
289 	amd_iommu_domain_clear_gcr3(domain, pasid_state->pasid);
290 
291 	/* Make sure no more pending faults are in the queue */
292 	flush_workqueue(iommu_wq);
293 }
294 
free_pasid_states_level1(struct pasid_state ** tbl)295 static void free_pasid_states_level1(struct pasid_state **tbl)
296 {
297 	int i;
298 
299 	for (i = 0; i < 512; ++i) {
300 		if (tbl[i] == NULL)
301 			continue;
302 
303 		free_page((unsigned long)tbl[i]);
304 	}
305 }
306 
free_pasid_states_level2(struct pasid_state ** tbl)307 static void free_pasid_states_level2(struct pasid_state **tbl)
308 {
309 	struct pasid_state **ptr;
310 	int i;
311 
312 	for (i = 0; i < 512; ++i) {
313 		if (tbl[i] == NULL)
314 			continue;
315 
316 		ptr = (struct pasid_state **)tbl[i];
317 		free_pasid_states_level1(ptr);
318 	}
319 }
320 
free_pasid_states(struct device_state * dev_state)321 static void free_pasid_states(struct device_state *dev_state)
322 {
323 	struct pasid_state *pasid_state;
324 	int i;
325 
326 	for (i = 0; i < dev_state->max_pasids; ++i) {
327 		pasid_state = get_pasid_state(dev_state, i);
328 		if (pasid_state == NULL)
329 			continue;
330 
331 		put_pasid_state(pasid_state);
332 
333 		/*
334 		 * This will call the mn_release function and
335 		 * unbind the PASID
336 		 */
337 		mmu_notifier_unregister(&pasid_state->mn, pasid_state->mm);
338 
339 		put_pasid_state_wait(pasid_state); /* Reference taken in
340 						      amd_iommu_bind_pasid */
341 
342 		/* Drop reference taken in amd_iommu_bind_pasid */
343 		put_device_state(dev_state);
344 	}
345 
346 	if (dev_state->pasid_levels == 2)
347 		free_pasid_states_level2(dev_state->states);
348 	else if (dev_state->pasid_levels == 1)
349 		free_pasid_states_level1(dev_state->states);
350 	else
351 		BUG_ON(dev_state->pasid_levels != 0);
352 
353 	free_page((unsigned long)dev_state->states);
354 }
355 
mn_to_state(struct mmu_notifier * mn)356 static struct pasid_state *mn_to_state(struct mmu_notifier *mn)
357 {
358 	return container_of(mn, struct pasid_state, mn);
359 }
360 
mn_invalidate_range(struct mmu_notifier * mn,struct mm_struct * mm,unsigned long start,unsigned long end)361 static void mn_invalidate_range(struct mmu_notifier *mn,
362 				struct mm_struct *mm,
363 				unsigned long start, unsigned long end)
364 {
365 	struct pasid_state *pasid_state;
366 	struct device_state *dev_state;
367 
368 	pasid_state = mn_to_state(mn);
369 	dev_state   = pasid_state->device_state;
370 
371 	if ((start ^ (end - 1)) < PAGE_SIZE)
372 		amd_iommu_flush_page(dev_state->domain, pasid_state->pasid,
373 				     start);
374 	else
375 		amd_iommu_flush_tlb(dev_state->domain, pasid_state->pasid);
376 }
377 
mn_release(struct mmu_notifier * mn,struct mm_struct * mm)378 static void mn_release(struct mmu_notifier *mn, struct mm_struct *mm)
379 {
380 	struct pasid_state *pasid_state;
381 	struct device_state *dev_state;
382 	bool run_inv_ctx_cb;
383 
384 	might_sleep();
385 
386 	pasid_state    = mn_to_state(mn);
387 	dev_state      = pasid_state->device_state;
388 	run_inv_ctx_cb = !pasid_state->invalid;
389 
390 	if (run_inv_ctx_cb && dev_state->inv_ctx_cb)
391 		dev_state->inv_ctx_cb(dev_state->pdev, pasid_state->pasid);
392 
393 	unbind_pasid(pasid_state);
394 }
395 
396 static const struct mmu_notifier_ops iommu_mn = {
397 	.release		= mn_release,
398 	.invalidate_range       = mn_invalidate_range,
399 };
400 
set_pri_tag_status(struct pasid_state * pasid_state,u16 tag,int status)401 static void set_pri_tag_status(struct pasid_state *pasid_state,
402 			       u16 tag, int status)
403 {
404 	unsigned long flags;
405 
406 	spin_lock_irqsave(&pasid_state->lock, flags);
407 	pasid_state->pri[tag].status = status;
408 	spin_unlock_irqrestore(&pasid_state->lock, flags);
409 }
410 
finish_pri_tag(struct device_state * dev_state,struct pasid_state * pasid_state,u16 tag)411 static void finish_pri_tag(struct device_state *dev_state,
412 			   struct pasid_state *pasid_state,
413 			   u16 tag)
414 {
415 	unsigned long flags;
416 
417 	spin_lock_irqsave(&pasid_state->lock, flags);
418 	if (atomic_dec_and_test(&pasid_state->pri[tag].inflight) &&
419 	    pasid_state->pri[tag].finish) {
420 		amd_iommu_complete_ppr(dev_state->pdev, pasid_state->pasid,
421 				       pasid_state->pri[tag].status, tag);
422 		pasid_state->pri[tag].finish = false;
423 		pasid_state->pri[tag].status = PPR_SUCCESS;
424 	}
425 	spin_unlock_irqrestore(&pasid_state->lock, flags);
426 }
427 
handle_fault_error(struct fault * fault)428 static void handle_fault_error(struct fault *fault)
429 {
430 	int status;
431 
432 	if (!fault->dev_state->inv_ppr_cb) {
433 		set_pri_tag_status(fault->state, fault->tag, PPR_INVALID);
434 		return;
435 	}
436 
437 	status = fault->dev_state->inv_ppr_cb(fault->dev_state->pdev,
438 					      fault->pasid,
439 					      fault->address,
440 					      fault->flags);
441 	switch (status) {
442 	case AMD_IOMMU_INV_PRI_RSP_SUCCESS:
443 		set_pri_tag_status(fault->state, fault->tag, PPR_SUCCESS);
444 		break;
445 	case AMD_IOMMU_INV_PRI_RSP_INVALID:
446 		set_pri_tag_status(fault->state, fault->tag, PPR_INVALID);
447 		break;
448 	case AMD_IOMMU_INV_PRI_RSP_FAIL:
449 		set_pri_tag_status(fault->state, fault->tag, PPR_FAILURE);
450 		break;
451 	default:
452 		BUG();
453 	}
454 }
455 
access_error(struct vm_area_struct * vma,struct fault * fault)456 static bool access_error(struct vm_area_struct *vma, struct fault *fault)
457 {
458 	unsigned long requested = 0;
459 
460 	if (fault->flags & PPR_FAULT_EXEC)
461 		requested |= VM_EXEC;
462 
463 	if (fault->flags & PPR_FAULT_READ)
464 		requested |= VM_READ;
465 
466 	if (fault->flags & PPR_FAULT_WRITE)
467 		requested |= VM_WRITE;
468 
469 	return (requested & ~vma->vm_flags) != 0;
470 }
471 
do_fault(struct work_struct * work)472 static void do_fault(struct work_struct *work)
473 {
474 	struct fault *fault = container_of(work, struct fault, work);
475 	struct vm_area_struct *vma;
476 	vm_fault_t ret = VM_FAULT_ERROR;
477 	unsigned int flags = 0;
478 	struct mm_struct *mm;
479 	u64 address;
480 
481 	mm = fault->state->mm;
482 	address = fault->address;
483 
484 	if (fault->flags & PPR_FAULT_USER)
485 		flags |= FAULT_FLAG_USER;
486 	if (fault->flags & PPR_FAULT_WRITE)
487 		flags |= FAULT_FLAG_WRITE;
488 	flags |= FAULT_FLAG_REMOTE;
489 
490 	down_read(&mm->mmap_sem);
491 	vma = find_extend_vma(mm, address);
492 	if (!vma || address < vma->vm_start)
493 		/* failed to get a vma in the right range */
494 		goto out;
495 
496 	/* Check if we have the right permissions on the vma */
497 	if (access_error(vma, fault))
498 		goto out;
499 
500 	ret = handle_mm_fault(vma, address, flags);
501 out:
502 	up_read(&mm->mmap_sem);
503 
504 	if (ret & VM_FAULT_ERROR)
505 		/* failed to service fault */
506 		handle_fault_error(fault);
507 
508 	finish_pri_tag(fault->dev_state, fault->state, fault->tag);
509 
510 	put_pasid_state(fault->state);
511 
512 	kfree(fault);
513 }
514 
ppr_notifier(struct notifier_block * nb,unsigned long e,void * data)515 static int ppr_notifier(struct notifier_block *nb, unsigned long e, void *data)
516 {
517 	struct amd_iommu_fault *iommu_fault;
518 	struct pasid_state *pasid_state;
519 	struct device_state *dev_state;
520 	unsigned long flags;
521 	struct fault *fault;
522 	bool finish;
523 	u16 tag, devid;
524 	int ret;
525 	struct iommu_dev_data *dev_data;
526 	struct pci_dev *pdev = NULL;
527 
528 	iommu_fault = data;
529 	tag         = iommu_fault->tag & 0x1ff;
530 	finish      = (iommu_fault->tag >> 9) & 1;
531 
532 	devid = iommu_fault->device_id;
533 	pdev = pci_get_domain_bus_and_slot(0, PCI_BUS_NUM(devid),
534 					   devid & 0xff);
535 	if (!pdev)
536 		return -ENODEV;
537 	dev_data = get_dev_data(&pdev->dev);
538 
539 	/* In kdump kernel pci dev is not initialized yet -> send INVALID */
540 	ret = NOTIFY_DONE;
541 	if (translation_pre_enabled(amd_iommu_rlookup_table[devid])
542 		&& dev_data->defer_attach) {
543 		amd_iommu_complete_ppr(pdev, iommu_fault->pasid,
544 				       PPR_INVALID, tag);
545 		goto out;
546 	}
547 
548 	dev_state = get_device_state(iommu_fault->device_id);
549 	if (dev_state == NULL)
550 		goto out;
551 
552 	pasid_state = get_pasid_state(dev_state, iommu_fault->pasid);
553 	if (pasid_state == NULL || pasid_state->invalid) {
554 		/* We know the device but not the PASID -> send INVALID */
555 		amd_iommu_complete_ppr(dev_state->pdev, iommu_fault->pasid,
556 				       PPR_INVALID, tag);
557 		goto out_drop_state;
558 	}
559 
560 	spin_lock_irqsave(&pasid_state->lock, flags);
561 	atomic_inc(&pasid_state->pri[tag].inflight);
562 	if (finish)
563 		pasid_state->pri[tag].finish = true;
564 	spin_unlock_irqrestore(&pasid_state->lock, flags);
565 
566 	fault = kzalloc(sizeof(*fault), GFP_ATOMIC);
567 	if (fault == NULL) {
568 		/* We are OOM - send success and let the device re-fault */
569 		finish_pri_tag(dev_state, pasid_state, tag);
570 		goto out_drop_state;
571 	}
572 
573 	fault->dev_state = dev_state;
574 	fault->address   = iommu_fault->address;
575 	fault->state     = pasid_state;
576 	fault->tag       = tag;
577 	fault->finish    = finish;
578 	fault->pasid     = iommu_fault->pasid;
579 	fault->flags     = iommu_fault->flags;
580 	INIT_WORK(&fault->work, do_fault);
581 
582 	queue_work(iommu_wq, &fault->work);
583 
584 	ret = NOTIFY_OK;
585 
586 out_drop_state:
587 
588 	if (ret != NOTIFY_OK && pasid_state)
589 		put_pasid_state(pasid_state);
590 
591 	put_device_state(dev_state);
592 
593 out:
594 	pci_dev_put(pdev);
595 	return ret;
596 }
597 
598 static struct notifier_block ppr_nb = {
599 	.notifier_call = ppr_notifier,
600 };
601 
amd_iommu_bind_pasid(struct pci_dev * pdev,int pasid,struct task_struct * task)602 int amd_iommu_bind_pasid(struct pci_dev *pdev, int pasid,
603 			 struct task_struct *task)
604 {
605 	struct pasid_state *pasid_state;
606 	struct device_state *dev_state;
607 	struct mm_struct *mm;
608 	u16 devid;
609 	int ret;
610 
611 	might_sleep();
612 
613 	if (!amd_iommu_v2_supported())
614 		return -ENODEV;
615 
616 	devid     = device_id(pdev);
617 	dev_state = get_device_state(devid);
618 
619 	if (dev_state == NULL)
620 		return -EINVAL;
621 
622 	ret = -EINVAL;
623 	if (pasid < 0 || pasid >= dev_state->max_pasids)
624 		goto out;
625 
626 	ret = -ENOMEM;
627 	pasid_state = kzalloc(sizeof(*pasid_state), GFP_KERNEL);
628 	if (pasid_state == NULL)
629 		goto out;
630 
631 
632 	atomic_set(&pasid_state->count, 1);
633 	init_waitqueue_head(&pasid_state->wq);
634 	spin_lock_init(&pasid_state->lock);
635 
636 	mm                        = get_task_mm(task);
637 	pasid_state->mm           = mm;
638 	pasid_state->device_state = dev_state;
639 	pasid_state->pasid        = pasid;
640 	pasid_state->invalid      = true; /* Mark as valid only if we are
641 					     done with setting up the pasid */
642 	pasid_state->mn.ops       = &iommu_mn;
643 
644 	if (pasid_state->mm == NULL)
645 		goto out_free;
646 
647 	mmu_notifier_register(&pasid_state->mn, mm);
648 
649 	ret = set_pasid_state(dev_state, pasid_state, pasid);
650 	if (ret)
651 		goto out_unregister;
652 
653 	ret = amd_iommu_domain_set_gcr3(dev_state->domain, pasid,
654 					__pa(pasid_state->mm->pgd));
655 	if (ret)
656 		goto out_clear_state;
657 
658 	/* Now we are ready to handle faults */
659 	pasid_state->invalid = false;
660 
661 	/*
662 	 * Drop the reference to the mm_struct here. We rely on the
663 	 * mmu_notifier release call-back to inform us when the mm
664 	 * is going away.
665 	 */
666 	mmput(mm);
667 
668 	return 0;
669 
670 out_clear_state:
671 	clear_pasid_state(dev_state, pasid);
672 
673 out_unregister:
674 	mmu_notifier_unregister(&pasid_state->mn, mm);
675 	mmput(mm);
676 
677 out_free:
678 	free_pasid_state(pasid_state);
679 
680 out:
681 	put_device_state(dev_state);
682 
683 	return ret;
684 }
685 EXPORT_SYMBOL(amd_iommu_bind_pasid);
686 
amd_iommu_unbind_pasid(struct pci_dev * pdev,int pasid)687 void amd_iommu_unbind_pasid(struct pci_dev *pdev, int pasid)
688 {
689 	struct pasid_state *pasid_state;
690 	struct device_state *dev_state;
691 	u16 devid;
692 
693 	might_sleep();
694 
695 	if (!amd_iommu_v2_supported())
696 		return;
697 
698 	devid = device_id(pdev);
699 	dev_state = get_device_state(devid);
700 	if (dev_state == NULL)
701 		return;
702 
703 	if (pasid < 0 || pasid >= dev_state->max_pasids)
704 		goto out;
705 
706 	pasid_state = get_pasid_state(dev_state, pasid);
707 	if (pasid_state == NULL)
708 		goto out;
709 	/*
710 	 * Drop reference taken here. We are safe because we still hold
711 	 * the reference taken in the amd_iommu_bind_pasid function.
712 	 */
713 	put_pasid_state(pasid_state);
714 
715 	/* Clear the pasid state so that the pasid can be re-used */
716 	clear_pasid_state(dev_state, pasid_state->pasid);
717 
718 	/*
719 	 * Call mmu_notifier_unregister to drop our reference
720 	 * to pasid_state->mm
721 	 */
722 	mmu_notifier_unregister(&pasid_state->mn, pasid_state->mm);
723 
724 	put_pasid_state_wait(pasid_state); /* Reference taken in
725 					      amd_iommu_bind_pasid */
726 out:
727 	/* Drop reference taken in this function */
728 	put_device_state(dev_state);
729 
730 	/* Drop reference taken in amd_iommu_bind_pasid */
731 	put_device_state(dev_state);
732 }
733 EXPORT_SYMBOL(amd_iommu_unbind_pasid);
734 
amd_iommu_init_device(struct pci_dev * pdev,int pasids)735 int amd_iommu_init_device(struct pci_dev *pdev, int pasids)
736 {
737 	struct device_state *dev_state;
738 	struct iommu_group *group;
739 	unsigned long flags;
740 	int ret, tmp;
741 	u16 devid;
742 
743 	might_sleep();
744 
745 	/*
746 	 * When memory encryption is active the device is likely not in a
747 	 * direct-mapped domain. Forbid using IOMMUv2 functionality for now.
748 	 */
749 	if (mem_encrypt_active())
750 		return -ENODEV;
751 
752 	if (!amd_iommu_v2_supported())
753 		return -ENODEV;
754 
755 	if (pasids <= 0 || pasids > (PASID_MASK + 1))
756 		return -EINVAL;
757 
758 	devid = device_id(pdev);
759 
760 	dev_state = kzalloc(sizeof(*dev_state), GFP_KERNEL);
761 	if (dev_state == NULL)
762 		return -ENOMEM;
763 
764 	spin_lock_init(&dev_state->lock);
765 	init_waitqueue_head(&dev_state->wq);
766 	dev_state->pdev  = pdev;
767 	dev_state->devid = devid;
768 
769 	tmp = pasids;
770 	for (dev_state->pasid_levels = 0; (tmp - 1) & ~0x1ff; tmp >>= 9)
771 		dev_state->pasid_levels += 1;
772 
773 	atomic_set(&dev_state->count, 1);
774 	dev_state->max_pasids = pasids;
775 
776 	ret = -ENOMEM;
777 	dev_state->states = (void *)get_zeroed_page(GFP_KERNEL);
778 	if (dev_state->states == NULL)
779 		goto out_free_dev_state;
780 
781 	dev_state->domain = iommu_domain_alloc(&pci_bus_type);
782 	if (dev_state->domain == NULL)
783 		goto out_free_states;
784 
785 	amd_iommu_domain_direct_map(dev_state->domain);
786 
787 	ret = amd_iommu_domain_enable_v2(dev_state->domain, pasids);
788 	if (ret)
789 		goto out_free_domain;
790 
791 	group = iommu_group_get(&pdev->dev);
792 	if (!group) {
793 		ret = -EINVAL;
794 		goto out_free_domain;
795 	}
796 
797 	ret = iommu_attach_group(dev_state->domain, group);
798 	if (ret != 0)
799 		goto out_drop_group;
800 
801 	iommu_group_put(group);
802 
803 	spin_lock_irqsave(&state_lock, flags);
804 
805 	if (__get_device_state(devid) != NULL) {
806 		spin_unlock_irqrestore(&state_lock, flags);
807 		ret = -EBUSY;
808 		goto out_free_domain;
809 	}
810 
811 	list_add_tail(&dev_state->list, &state_list);
812 
813 	spin_unlock_irqrestore(&state_lock, flags);
814 
815 	return 0;
816 
817 out_drop_group:
818 	iommu_group_put(group);
819 
820 out_free_domain:
821 	iommu_domain_free(dev_state->domain);
822 
823 out_free_states:
824 	free_page((unsigned long)dev_state->states);
825 
826 out_free_dev_state:
827 	kfree(dev_state);
828 
829 	return ret;
830 }
831 EXPORT_SYMBOL(amd_iommu_init_device);
832 
amd_iommu_free_device(struct pci_dev * pdev)833 void amd_iommu_free_device(struct pci_dev *pdev)
834 {
835 	struct device_state *dev_state;
836 	unsigned long flags;
837 	u16 devid;
838 
839 	if (!amd_iommu_v2_supported())
840 		return;
841 
842 	devid = device_id(pdev);
843 
844 	spin_lock_irqsave(&state_lock, flags);
845 
846 	dev_state = __get_device_state(devid);
847 	if (dev_state == NULL) {
848 		spin_unlock_irqrestore(&state_lock, flags);
849 		return;
850 	}
851 
852 	list_del(&dev_state->list);
853 
854 	spin_unlock_irqrestore(&state_lock, flags);
855 
856 	/* Get rid of any remaining pasid states */
857 	free_pasid_states(dev_state);
858 
859 	put_device_state(dev_state);
860 	/*
861 	 * Wait until the last reference is dropped before freeing
862 	 * the device state.
863 	 */
864 	wait_event(dev_state->wq, !atomic_read(&dev_state->count));
865 	free_device_state(dev_state);
866 }
867 EXPORT_SYMBOL(amd_iommu_free_device);
868 
amd_iommu_set_invalid_ppr_cb(struct pci_dev * pdev,amd_iommu_invalid_ppr_cb cb)869 int amd_iommu_set_invalid_ppr_cb(struct pci_dev *pdev,
870 				 amd_iommu_invalid_ppr_cb cb)
871 {
872 	struct device_state *dev_state;
873 	unsigned long flags;
874 	u16 devid;
875 	int ret;
876 
877 	if (!amd_iommu_v2_supported())
878 		return -ENODEV;
879 
880 	devid = device_id(pdev);
881 
882 	spin_lock_irqsave(&state_lock, flags);
883 
884 	ret = -EINVAL;
885 	dev_state = __get_device_state(devid);
886 	if (dev_state == NULL)
887 		goto out_unlock;
888 
889 	dev_state->inv_ppr_cb = cb;
890 
891 	ret = 0;
892 
893 out_unlock:
894 	spin_unlock_irqrestore(&state_lock, flags);
895 
896 	return ret;
897 }
898 EXPORT_SYMBOL(amd_iommu_set_invalid_ppr_cb);
899 
amd_iommu_set_invalidate_ctx_cb(struct pci_dev * pdev,amd_iommu_invalidate_ctx cb)900 int amd_iommu_set_invalidate_ctx_cb(struct pci_dev *pdev,
901 				    amd_iommu_invalidate_ctx cb)
902 {
903 	struct device_state *dev_state;
904 	unsigned long flags;
905 	u16 devid;
906 	int ret;
907 
908 	if (!amd_iommu_v2_supported())
909 		return -ENODEV;
910 
911 	devid = device_id(pdev);
912 
913 	spin_lock_irqsave(&state_lock, flags);
914 
915 	ret = -EINVAL;
916 	dev_state = __get_device_state(devid);
917 	if (dev_state == NULL)
918 		goto out_unlock;
919 
920 	dev_state->inv_ctx_cb = cb;
921 
922 	ret = 0;
923 
924 out_unlock:
925 	spin_unlock_irqrestore(&state_lock, flags);
926 
927 	return ret;
928 }
929 EXPORT_SYMBOL(amd_iommu_set_invalidate_ctx_cb);
930 
amd_iommu_v2_init(void)931 static int __init amd_iommu_v2_init(void)
932 {
933 	int ret;
934 
935 	pr_info("AMD IOMMUv2 driver by Joerg Roedel <jroedel@suse.de>\n");
936 
937 	if (!amd_iommu_v2_supported()) {
938 		pr_info("AMD IOMMUv2 functionality not available on this system\n");
939 		/*
940 		 * Load anyway to provide the symbols to other modules
941 		 * which may use AMD IOMMUv2 optionally.
942 		 */
943 		return 0;
944 	}
945 
946 	spin_lock_init(&state_lock);
947 
948 	ret = -ENOMEM;
949 	iommu_wq = alloc_workqueue("amd_iommu_v2", WQ_MEM_RECLAIM, 0);
950 	if (iommu_wq == NULL)
951 		goto out;
952 
953 	amd_iommu_register_ppr_notifier(&ppr_nb);
954 
955 	return 0;
956 
957 out:
958 	return ret;
959 }
960 
amd_iommu_v2_exit(void)961 static void __exit amd_iommu_v2_exit(void)
962 {
963 	struct device_state *dev_state;
964 	int i;
965 
966 	if (!amd_iommu_v2_supported())
967 		return;
968 
969 	amd_iommu_unregister_ppr_notifier(&ppr_nb);
970 
971 	flush_workqueue(iommu_wq);
972 
973 	/*
974 	 * The loop below might call flush_workqueue(), so call
975 	 * destroy_workqueue() after it
976 	 */
977 	for (i = 0; i < MAX_DEVICES; ++i) {
978 		dev_state = get_device_state(i);
979 
980 		if (dev_state == NULL)
981 			continue;
982 
983 		WARN_ON_ONCE(1);
984 
985 		put_device_state(dev_state);
986 		amd_iommu_free_device(dev_state->pdev);
987 	}
988 
989 	destroy_workqueue(iommu_wq);
990 }
991 
992 module_init(amd_iommu_v2_init);
993 module_exit(amd_iommu_v2_exit);
994