mirror of
https://github.com/torvalds/linux.git
synced 2024-12-17 00:21:32 +00:00
iommu/vt-d: Identify default domains replaced with private
When we put a device into an iommu group, the group's default domain will be attached to the device. There are some corner cases where the type (identity or dma) of the default domain doesn't work for the device and the request of a new default domain results in failure (e.x. multiple devices have already existed in the group). In order to be compatible with the past, we used a private domain. Mark the private domains and disallow some iommu apis (map/unmap/iova_to_phys) on them. Signed-off-by: Lu Baolu <baolu.lu@linux.intel.com> Signed-off-by: Joerg Roedel <jroedel@suse.de>
This commit is contained in:
parent
fa954e6831
commit
942067f1b6
@ -305,6 +305,14 @@ static int hw_pass_through = 1;
|
|||||||
/* si_domain contains mulitple devices */
|
/* si_domain contains mulitple devices */
|
||||||
#define DOMAIN_FLAG_STATIC_IDENTITY BIT(0)
|
#define DOMAIN_FLAG_STATIC_IDENTITY BIT(0)
|
||||||
|
|
||||||
|
/*
|
||||||
|
* This is a DMA domain allocated through the iommu domain allocation
|
||||||
|
* interface. But one or more devices belonging to this domain have
|
||||||
|
* been chosen to use a private domain. We should avoid to use the
|
||||||
|
* map/unmap/iova_to_phys APIs on it.
|
||||||
|
*/
|
||||||
|
#define DOMAIN_FLAG_LOSE_CHILDREN BIT(1)
|
||||||
|
|
||||||
#define for_each_domain_iommu(idx, domain) \
|
#define for_each_domain_iommu(idx, domain) \
|
||||||
for (idx = 0; idx < g_num_of_iommus; idx++) \
|
for (idx = 0; idx < g_num_of_iommus; idx++) \
|
||||||
if (domain->iommu_refcnt[idx])
|
if (domain->iommu_refcnt[idx])
|
||||||
@ -4958,6 +4966,7 @@ static void domain_context_clear(struct intel_iommu *iommu, struct device *dev)
|
|||||||
|
|
||||||
static void __dmar_remove_one_dev_info(struct device_domain_info *info)
|
static void __dmar_remove_one_dev_info(struct device_domain_info *info)
|
||||||
{
|
{
|
||||||
|
struct dmar_domain *domain;
|
||||||
struct intel_iommu *iommu;
|
struct intel_iommu *iommu;
|
||||||
unsigned long flags;
|
unsigned long flags;
|
||||||
|
|
||||||
@ -4967,6 +4976,7 @@ static void __dmar_remove_one_dev_info(struct device_domain_info *info)
|
|||||||
return;
|
return;
|
||||||
|
|
||||||
iommu = info->iommu;
|
iommu = info->iommu;
|
||||||
|
domain = info->domain;
|
||||||
|
|
||||||
if (info->dev) {
|
if (info->dev) {
|
||||||
if (dev_is_pci(info->dev) && sm_supported(iommu))
|
if (dev_is_pci(info->dev) && sm_supported(iommu))
|
||||||
@ -4981,9 +4991,14 @@ static void __dmar_remove_one_dev_info(struct device_domain_info *info)
|
|||||||
unlink_domain_info(info);
|
unlink_domain_info(info);
|
||||||
|
|
||||||
spin_lock_irqsave(&iommu->lock, flags);
|
spin_lock_irqsave(&iommu->lock, flags);
|
||||||
domain_detach_iommu(info->domain, iommu);
|
domain_detach_iommu(domain, iommu);
|
||||||
spin_unlock_irqrestore(&iommu->lock, flags);
|
spin_unlock_irqrestore(&iommu->lock, flags);
|
||||||
|
|
||||||
|
/* free the private domain */
|
||||||
|
if (domain->flags & DOMAIN_FLAG_LOSE_CHILDREN &&
|
||||||
|
!(domain->flags & DOMAIN_FLAG_STATIC_IDENTITY))
|
||||||
|
domain_exit(info->domain);
|
||||||
|
|
||||||
free_devinfo_mem(info);
|
free_devinfo_mem(info);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -5307,6 +5322,9 @@ static int intel_iommu_map(struct iommu_domain *domain,
|
|||||||
int prot = 0;
|
int prot = 0;
|
||||||
int ret;
|
int ret;
|
||||||
|
|
||||||
|
if (dmar_domain->flags & DOMAIN_FLAG_LOSE_CHILDREN)
|
||||||
|
return -EINVAL;
|
||||||
|
|
||||||
if (iommu_prot & IOMMU_READ)
|
if (iommu_prot & IOMMU_READ)
|
||||||
prot |= DMA_PTE_READ;
|
prot |= DMA_PTE_READ;
|
||||||
if (iommu_prot & IOMMU_WRITE)
|
if (iommu_prot & IOMMU_WRITE)
|
||||||
@ -5348,6 +5366,8 @@ static size_t intel_iommu_unmap(struct iommu_domain *domain,
|
|||||||
/* Cope with horrid API which requires us to unmap more than the
|
/* Cope with horrid API which requires us to unmap more than the
|
||||||
size argument if it happens to be a large-page mapping. */
|
size argument if it happens to be a large-page mapping. */
|
||||||
BUG_ON(!pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level));
|
BUG_ON(!pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level));
|
||||||
|
if (dmar_domain->flags & DOMAIN_FLAG_LOSE_CHILDREN)
|
||||||
|
return 0;
|
||||||
|
|
||||||
if (size < VTD_PAGE_SIZE << level_to_offset_bits(level))
|
if (size < VTD_PAGE_SIZE << level_to_offset_bits(level))
|
||||||
size = VTD_PAGE_SIZE << level_to_offset_bits(level);
|
size = VTD_PAGE_SIZE << level_to_offset_bits(level);
|
||||||
@ -5379,6 +5399,9 @@ static phys_addr_t intel_iommu_iova_to_phys(struct iommu_domain *domain,
|
|||||||
int level = 0;
|
int level = 0;
|
||||||
u64 phys = 0;
|
u64 phys = 0;
|
||||||
|
|
||||||
|
if (dmar_domain->flags & DOMAIN_FLAG_LOSE_CHILDREN)
|
||||||
|
return 0;
|
||||||
|
|
||||||
pte = pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level);
|
pte = pfn_to_dma_pte(dmar_domain, iova >> VTD_PAGE_SHIFT, &level);
|
||||||
if (pte)
|
if (pte)
|
||||||
phys = dma_pte_addr(pte);
|
phys = dma_pte_addr(pte);
|
||||||
@ -5434,9 +5457,12 @@ static bool intel_iommu_capable(enum iommu_cap cap)
|
|||||||
|
|
||||||
static int intel_iommu_add_device(struct device *dev)
|
static int intel_iommu_add_device(struct device *dev)
|
||||||
{
|
{
|
||||||
|
struct dmar_domain *dmar_domain;
|
||||||
|
struct iommu_domain *domain;
|
||||||
struct intel_iommu *iommu;
|
struct intel_iommu *iommu;
|
||||||
struct iommu_group *group;
|
struct iommu_group *group;
|
||||||
u8 bus, devfn;
|
u8 bus, devfn;
|
||||||
|
int ret;
|
||||||
|
|
||||||
iommu = device_to_iommu(dev, &bus, &devfn);
|
iommu = device_to_iommu(dev, &bus, &devfn);
|
||||||
if (!iommu)
|
if (!iommu)
|
||||||
@ -5450,6 +5476,42 @@ static int intel_iommu_add_device(struct device *dev)
|
|||||||
return PTR_ERR(group);
|
return PTR_ERR(group);
|
||||||
|
|
||||||
iommu_group_put(group);
|
iommu_group_put(group);
|
||||||
|
|
||||||
|
domain = iommu_get_domain_for_dev(dev);
|
||||||
|
dmar_domain = to_dmar_domain(domain);
|
||||||
|
if (domain->type == IOMMU_DOMAIN_DMA) {
|
||||||
|
if (device_def_domain_type(dev, 1) == IOMMU_DOMAIN_IDENTITY) {
|
||||||
|
ret = iommu_request_dm_for_dev(dev);
|
||||||
|
if (ret) {
|
||||||
|
dmar_domain->flags |= DOMAIN_FLAG_LOSE_CHILDREN;
|
||||||
|
domain_add_dev_info(si_domain, dev);
|
||||||
|
dev_info(dev,
|
||||||
|
"Device uses a private identity domain.\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return -ENODEV;
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if (device_def_domain_type(dev, 1) == IOMMU_DOMAIN_DMA) {
|
||||||
|
ret = iommu_request_dma_domain_for_dev(dev);
|
||||||
|
if (ret) {
|
||||||
|
dmar_domain->flags |= DOMAIN_FLAG_LOSE_CHILDREN;
|
||||||
|
if (!get_valid_domain_for_dev(dev)) {
|
||||||
|
dev_warn(dev,
|
||||||
|
"Failed to get a private domain.\n");
|
||||||
|
return -ENOMEM;
|
||||||
|
}
|
||||||
|
|
||||||
|
dev_info(dev,
|
||||||
|
"Device uses a private dma domain.\n");
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
|
||||||
|
return -ENODEV;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
return 0;
|
return 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user