162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Helpers for IOMMU drivers implementing SVA 462306a36Sopenharmony_ci */ 562306a36Sopenharmony_ci#include <linux/mmu_context.h> 662306a36Sopenharmony_ci#include <linux/mutex.h> 762306a36Sopenharmony_ci#include <linux/sched/mm.h> 862306a36Sopenharmony_ci#include <linux/iommu.h> 962306a36Sopenharmony_ci 1062306a36Sopenharmony_ci#include "iommu-sva.h" 1162306a36Sopenharmony_ci 1262306a36Sopenharmony_cistatic DEFINE_MUTEX(iommu_sva_lock); 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci/* Allocate a PASID for the mm within range (inclusive) */ 1562306a36Sopenharmony_cistatic int iommu_sva_alloc_pasid(struct mm_struct *mm, struct device *dev) 1662306a36Sopenharmony_ci{ 1762306a36Sopenharmony_ci ioasid_t pasid; 1862306a36Sopenharmony_ci int ret = 0; 1962306a36Sopenharmony_ci 2062306a36Sopenharmony_ci if (!arch_pgtable_dma_compat(mm)) 2162306a36Sopenharmony_ci return -EBUSY; 2262306a36Sopenharmony_ci 2362306a36Sopenharmony_ci mutex_lock(&iommu_sva_lock); 2462306a36Sopenharmony_ci /* Is a PASID already associated with this mm? */ 2562306a36Sopenharmony_ci if (mm_valid_pasid(mm)) { 2662306a36Sopenharmony_ci if (mm->pasid >= dev->iommu->max_pasids) 2762306a36Sopenharmony_ci ret = -EOVERFLOW; 2862306a36Sopenharmony_ci goto out; 2962306a36Sopenharmony_ci } 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_ci pasid = iommu_alloc_global_pasid(dev); 3262306a36Sopenharmony_ci if (pasid == IOMMU_PASID_INVALID) { 3362306a36Sopenharmony_ci ret = -ENOSPC; 3462306a36Sopenharmony_ci goto out; 3562306a36Sopenharmony_ci } 3662306a36Sopenharmony_ci mm->pasid = pasid; 3762306a36Sopenharmony_ci ret = 0; 3862306a36Sopenharmony_ciout: 3962306a36Sopenharmony_ci mutex_unlock(&iommu_sva_lock); 4062306a36Sopenharmony_ci return ret; 4162306a36Sopenharmony_ci} 4262306a36Sopenharmony_ci 4362306a36Sopenharmony_ci/** 4462306a36Sopenharmony_ci * iommu_sva_bind_device() - Bind a process address space to a device 4562306a36Sopenharmony_ci * @dev: the device 4662306a36Sopenharmony_ci * @mm: the mm to bind, caller must hold a reference to mm_users 4762306a36Sopenharmony_ci * 4862306a36Sopenharmony_ci * Create a bond between device and address space, allowing the device to 4962306a36Sopenharmony_ci * access the mm using the PASID returned by iommu_sva_get_pasid(). If a 5062306a36Sopenharmony_ci * bond already exists between @device and @mm, an additional internal 5162306a36Sopenharmony_ci * reference is taken. Caller must call iommu_sva_unbind_device() 5262306a36Sopenharmony_ci * to release each reference. 5362306a36Sopenharmony_ci * 5462306a36Sopenharmony_ci * iommu_dev_enable_feature(dev, IOMMU_DEV_FEAT_SVA) must be called first, to 5562306a36Sopenharmony_ci * initialize the required SVA features. 5662306a36Sopenharmony_ci * 5762306a36Sopenharmony_ci * On error, returns an ERR_PTR value. 5862306a36Sopenharmony_ci */ 5962306a36Sopenharmony_cistruct iommu_sva *iommu_sva_bind_device(struct device *dev, struct mm_struct *mm) 6062306a36Sopenharmony_ci{ 6162306a36Sopenharmony_ci struct iommu_domain *domain; 6262306a36Sopenharmony_ci struct iommu_sva *handle; 6362306a36Sopenharmony_ci int ret; 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci /* Allocate mm->pasid if necessary. */ 6662306a36Sopenharmony_ci ret = iommu_sva_alloc_pasid(mm, dev); 6762306a36Sopenharmony_ci if (ret) 6862306a36Sopenharmony_ci return ERR_PTR(ret); 6962306a36Sopenharmony_ci 7062306a36Sopenharmony_ci handle = kzalloc(sizeof(*handle), GFP_KERNEL); 7162306a36Sopenharmony_ci if (!handle) 7262306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci mutex_lock(&iommu_sva_lock); 7562306a36Sopenharmony_ci /* Search for an existing domain. */ 7662306a36Sopenharmony_ci domain = iommu_get_domain_for_dev_pasid(dev, mm->pasid, 7762306a36Sopenharmony_ci IOMMU_DOMAIN_SVA); 7862306a36Sopenharmony_ci if (IS_ERR(domain)) { 7962306a36Sopenharmony_ci ret = PTR_ERR(domain); 8062306a36Sopenharmony_ci goto out_unlock; 8162306a36Sopenharmony_ci } 8262306a36Sopenharmony_ci 8362306a36Sopenharmony_ci if (domain) { 8462306a36Sopenharmony_ci domain->users++; 8562306a36Sopenharmony_ci goto out; 8662306a36Sopenharmony_ci } 8762306a36Sopenharmony_ci 8862306a36Sopenharmony_ci /* Allocate a new domain and set it on device pasid. */ 8962306a36Sopenharmony_ci domain = iommu_sva_domain_alloc(dev, mm); 9062306a36Sopenharmony_ci if (!domain) { 9162306a36Sopenharmony_ci ret = -ENOMEM; 9262306a36Sopenharmony_ci goto out_unlock; 9362306a36Sopenharmony_ci } 9462306a36Sopenharmony_ci 9562306a36Sopenharmony_ci ret = iommu_attach_device_pasid(domain, dev, mm->pasid); 9662306a36Sopenharmony_ci if (ret) 9762306a36Sopenharmony_ci goto out_free_domain; 9862306a36Sopenharmony_ci domain->users = 1; 9962306a36Sopenharmony_ciout: 10062306a36Sopenharmony_ci mutex_unlock(&iommu_sva_lock); 10162306a36Sopenharmony_ci handle->dev = dev; 10262306a36Sopenharmony_ci handle->domain = domain; 10362306a36Sopenharmony_ci 10462306a36Sopenharmony_ci return handle; 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ciout_free_domain: 10762306a36Sopenharmony_ci iommu_domain_free(domain); 10862306a36Sopenharmony_ciout_unlock: 10962306a36Sopenharmony_ci mutex_unlock(&iommu_sva_lock); 11062306a36Sopenharmony_ci kfree(handle); 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci return ERR_PTR(ret); 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(iommu_sva_bind_device); 11562306a36Sopenharmony_ci 11662306a36Sopenharmony_ci/** 11762306a36Sopenharmony_ci * iommu_sva_unbind_device() - Remove a bond created with iommu_sva_bind_device 11862306a36Sopenharmony_ci * @handle: the handle returned by iommu_sva_bind_device() 11962306a36Sopenharmony_ci * 12062306a36Sopenharmony_ci * Put reference to a bond between device and address space. The device should 12162306a36Sopenharmony_ci * not be issuing any more transaction for this PASID. All outstanding page 12262306a36Sopenharmony_ci * requests for this PASID must have been flushed to the IOMMU. 12362306a36Sopenharmony_ci */ 12462306a36Sopenharmony_civoid iommu_sva_unbind_device(struct iommu_sva *handle) 12562306a36Sopenharmony_ci{ 12662306a36Sopenharmony_ci struct iommu_domain *domain = handle->domain; 12762306a36Sopenharmony_ci ioasid_t pasid = domain->mm->pasid; 12862306a36Sopenharmony_ci struct device *dev = handle->dev; 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci mutex_lock(&iommu_sva_lock); 13162306a36Sopenharmony_ci if (--domain->users == 0) { 13262306a36Sopenharmony_ci iommu_detach_device_pasid(domain, dev, pasid); 13362306a36Sopenharmony_ci iommu_domain_free(domain); 13462306a36Sopenharmony_ci } 13562306a36Sopenharmony_ci mutex_unlock(&iommu_sva_lock); 13662306a36Sopenharmony_ci kfree(handle); 13762306a36Sopenharmony_ci} 13862306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(iommu_sva_unbind_device); 13962306a36Sopenharmony_ci 14062306a36Sopenharmony_ciu32 iommu_sva_get_pasid(struct iommu_sva *handle) 14162306a36Sopenharmony_ci{ 14262306a36Sopenharmony_ci struct iommu_domain *domain = handle->domain; 14362306a36Sopenharmony_ci 14462306a36Sopenharmony_ci return domain->mm->pasid; 14562306a36Sopenharmony_ci} 14662306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(iommu_sva_get_pasid); 14762306a36Sopenharmony_ci 14862306a36Sopenharmony_ci/* 14962306a36Sopenharmony_ci * I/O page fault handler for SVA 15062306a36Sopenharmony_ci */ 15162306a36Sopenharmony_cienum iommu_page_response_code 15262306a36Sopenharmony_ciiommu_sva_handle_iopf(struct iommu_fault *fault, void *data) 15362306a36Sopenharmony_ci{ 15462306a36Sopenharmony_ci vm_fault_t ret; 15562306a36Sopenharmony_ci struct vm_area_struct *vma; 15662306a36Sopenharmony_ci struct mm_struct *mm = data; 15762306a36Sopenharmony_ci unsigned int access_flags = 0; 15862306a36Sopenharmony_ci unsigned int fault_flags = FAULT_FLAG_REMOTE; 15962306a36Sopenharmony_ci struct iommu_fault_page_request *prm = &fault->prm; 16062306a36Sopenharmony_ci enum iommu_page_response_code status = IOMMU_PAGE_RESP_INVALID; 16162306a36Sopenharmony_ci 16262306a36Sopenharmony_ci if (!(prm->flags & IOMMU_FAULT_PAGE_REQUEST_PASID_VALID)) 16362306a36Sopenharmony_ci return status; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci if (!mmget_not_zero(mm)) 16662306a36Sopenharmony_ci return status; 16762306a36Sopenharmony_ci 16862306a36Sopenharmony_ci mmap_read_lock(mm); 16962306a36Sopenharmony_ci 17062306a36Sopenharmony_ci vma = vma_lookup(mm, prm->addr); 17162306a36Sopenharmony_ci if (!vma) 17262306a36Sopenharmony_ci /* Unmapped area */ 17362306a36Sopenharmony_ci goto out_put_mm; 17462306a36Sopenharmony_ci 17562306a36Sopenharmony_ci if (prm->perm & IOMMU_FAULT_PERM_READ) 17662306a36Sopenharmony_ci access_flags |= VM_READ; 17762306a36Sopenharmony_ci 17862306a36Sopenharmony_ci if (prm->perm & IOMMU_FAULT_PERM_WRITE) { 17962306a36Sopenharmony_ci access_flags |= VM_WRITE; 18062306a36Sopenharmony_ci fault_flags |= FAULT_FLAG_WRITE; 18162306a36Sopenharmony_ci } 18262306a36Sopenharmony_ci 18362306a36Sopenharmony_ci if (prm->perm & IOMMU_FAULT_PERM_EXEC) { 18462306a36Sopenharmony_ci access_flags |= VM_EXEC; 18562306a36Sopenharmony_ci fault_flags |= FAULT_FLAG_INSTRUCTION; 18662306a36Sopenharmony_ci } 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci if (!(prm->perm & IOMMU_FAULT_PERM_PRIV)) 18962306a36Sopenharmony_ci fault_flags |= FAULT_FLAG_USER; 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci if (access_flags & ~vma->vm_flags) 19262306a36Sopenharmony_ci /* Access fault */ 19362306a36Sopenharmony_ci goto out_put_mm; 19462306a36Sopenharmony_ci 19562306a36Sopenharmony_ci ret = handle_mm_fault(vma, prm->addr, fault_flags, NULL); 19662306a36Sopenharmony_ci status = ret & VM_FAULT_ERROR ? IOMMU_PAGE_RESP_INVALID : 19762306a36Sopenharmony_ci IOMMU_PAGE_RESP_SUCCESS; 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ciout_put_mm: 20062306a36Sopenharmony_ci mmap_read_unlock(mm); 20162306a36Sopenharmony_ci mmput(mm); 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci return status; 20462306a36Sopenharmony_ci} 20562306a36Sopenharmony_ci 20662306a36Sopenharmony_civoid mm_pasid_drop(struct mm_struct *mm) 20762306a36Sopenharmony_ci{ 20862306a36Sopenharmony_ci if (likely(!mm_valid_pasid(mm))) 20962306a36Sopenharmony_ci return; 21062306a36Sopenharmony_ci 21162306a36Sopenharmony_ci iommu_free_global_pasid(mm->pasid); 21262306a36Sopenharmony_ci} 213