Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp5121371rwb; Mon, 21 Nov 2022 17:10:35 -0800 (PST) X-Google-Smtp-Source: AA0mqf6oOS9IX17/k3uhf8NM8JB2c244QlUGy1l0CRnCyd2CuplEG44UDSV12z46E6GleFdbKAGm X-Received: by 2002:a17:906:85cc:b0:781:ee12:814 with SMTP id i12-20020a17090685cc00b00781ee120814mr1758510ejy.63.1669079435116; Mon, 21 Nov 2022 17:10:35 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669079435; cv=none; d=google.com; s=arc-20160816; b=xRPfrGnUfJrLz2pe1Aq/z27ZLz9v0Drmb5rhZtBwFRqXG3OzKFhdd513VrnE7PJFix xvgRj1chkYij0OPCOg1GKb5bjKdF+zH85l53ZabVievtkrWWJkUPPlgbgney8Oi2hcYU shALy+zaIXXC70ZShT8anJZ6e/N0bNYfCwYMonTHIsNPlqXEOrL28SfFx6otV3e/lT0K J2/fn0kJfdIRXD9cI0wLe3hRtPUNAJMYCPu/OTwc06YAMgq2P2Zk8P8mSs9zAuWPxFn2 TQIaBI3VdQZ0Puq7XeEcCFcIzdI7WMHUniDxahF7tbn0BmiWuJ0IeVBvPbyEYIERBnM7 vrXA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=HjP7LJer5ihJHkfrVQzvFw1N9N8f/dpR4i9wEMwWjgI=; b=k774xGsRiZVxSSifW8gb0eCFLN1YQO2m35LBu107av4QZKd/OfVFYiR/jVopXFWwto At86BTWT9MGZXWh6GQsmbuowYZR4sjytQ/4Co9tEFG+nrHI/xPLzeiVNBP7FFuT03vNE WOIY14lljuGaj2KvaJpA8L+O63xt8/XnmM3J7JYy9KFNp95SGtlC37Ob8w/e5Q5cs1E9 +NVvGprEubiG3HqSipJLWMNebubeLehsGEKiI0KX5YSsnPtlstIvcpo+lXN3BZpIkjTa sMYfrxtrJMQq5t5XLoE4BTPzJUj3N1zWqCZLR1iQlC1K9I/iwu3VT6cGZOD/6OIxEAfr MI4g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=hvn3AI0I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d19-20020aa7d5d3000000b00469322471e2si3422140eds.534.2022.11.21.17.10.09; Mon, 21 Nov 2022 17:10:35 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@intel.com header.s=Intel header.b=hvn3AI0I; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231895AbiKVAg7 (ORCPT + 91 others); Mon, 21 Nov 2022 19:36:59 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:53456 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231749AbiKVAg4 (ORCPT ); Mon, 21 Nov 2022 19:36:56 -0500 Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8CFBFC6BDC for ; Mon, 21 Nov 2022 16:36:55 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1669077415; x=1700613415; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=Y5vGwIPPwSenb40glub36iuftmDSZwrpt1MHtGFliyk=; b=hvn3AI0IIBrqZDbB93amfkxjq29cYMgANVkVu4Sy7qMMFNqqwj51CkNM Wfk+GZV5SWc/Ue+xhA9SKUt3A3KUT5D2nExfUTfkVnIJof2bViInxXTrT ea7V7lLMssmHUp5hNYwjrr6ZB2HHBddFKQOfGythntbyG0UtX0lPL5iet aUIN4ATQBtt/TICw3Zc4AzJiPmfuXU+Hru9eK76a672i7sBOWKv0/OiUB 6xowp9WAJ6pksY7II8YDHMzA+Q1Q6PjGXuMWdo6r/jCB0IauMfG+uQ6DB 2omxNLuzB+JSa8J95R1UjpjlxIoDiKLzy6V6hiEbpHH83rLZwV/E5q7Gu Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10538"; a="315516471" X-IronPort-AV: E=Sophos;i="5.96,182,1665471600"; d="scan'208";a="315516471" Received: from orsmga006.jf.intel.com ([10.7.209.51]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Nov 2022 16:36:55 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10538"; a="619018415" X-IronPort-AV: E=Sophos;i="5.96,182,1665471600"; d="scan'208";a="619018415" Received: from allen-box.sh.intel.com ([10.239.159.48]) by orsmga006.jf.intel.com with ESMTP; 21 Nov 2022 16:36:54 -0800 From: Lu Baolu To: Joerg Roedel Cc: iommu@lists.linux.dev, linux-kernel@vger.kernel.org Subject: [PATCH 1/7] iommu/vt-d: Allocate pasid table in device probe path Date: Tue, 22 Nov 2022 08:29:43 +0800 Message-Id: <20221122002949.148140-2-baolu.lu@linux.intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20221122002949.148140-1-baolu.lu@linux.intel.com> References: <20221122002949.148140-1-baolu.lu@linux.intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-4.3 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_EF,RCVD_IN_DNSWL_MED,SPF_HELO_NONE, SPF_NONE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Whether or not a domain is attached to the device, the pasid table should always be valid as long as it has been probed. This moves the pasid table allocation from the domain attaching device path to device probe path and frees it in the device release path. Signed-off-by: Lu Baolu Reviewed-by: Kevin Tian Link: https://lore.kernel.org/r/20221118132451.114406-2-baolu.lu@linux.intel.com --- drivers/iommu/intel/iommu.c | 20 ++++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/intel/iommu.c b/drivers/iommu/intel/iommu.c index a122f5b84ad4..dea0190acc86 100644 --- a/drivers/iommu/intel/iommu.c +++ b/drivers/iommu/intel/iommu.c @@ -2475,13 +2475,6 @@ static int domain_add_dev_info(struct dmar_domain *domain, struct device *dev) /* PASID table is mandatory for a PCI device in scalable mode. */ if (sm_supported(iommu) && !dev_is_real_dma_subdevice(dev)) { - ret = intel_pasid_alloc_table(dev); - if (ret) { - dev_err(dev, "PASID table allocation failed\n"); - dmar_remove_one_dev_info(dev); - return ret; - } - /* Setup the PASID entry for requests without PASID: */ if (hw_pass_through && domain_type_is_si(domain)) ret = intel_pasid_setup_pass_through(iommu, domain, @@ -4106,7 +4099,6 @@ static void dmar_remove_one_dev_info(struct device *dev) iommu_disable_dev_iotlb(info); domain_context_clear(info); - intel_pasid_free_table(info->dev); } spin_lock_irqsave(&domain->lock, flags); @@ -4464,6 +4456,7 @@ static struct iommu_device *intel_iommu_probe_device(struct device *dev) struct device_domain_info *info; struct intel_iommu *iommu; u8 bus, devfn; + int ret; iommu = device_to_iommu(dev, &bus, &devfn); if (!iommu || !iommu->iommu.ops) @@ -4507,6 +4500,16 @@ static struct iommu_device *intel_iommu_probe_device(struct device *dev) dev_iommu_priv_set(dev, info); + if (sm_supported(iommu) && !dev_is_real_dma_subdevice(dev)) { + ret = intel_pasid_alloc_table(dev); + if (ret) { + dev_err(dev, "PASID table allocation failed\n"); + dev_iommu_priv_set(dev, NULL); + kfree(info); + return ERR_PTR(ret); + } + } + return &iommu->iommu; } @@ -4515,6 +4518,7 @@ static void intel_iommu_release_device(struct device *dev) struct device_domain_info *info = dev_iommu_priv_get(dev); dmar_remove_one_dev_info(dev); + intel_pasid_free_table(dev); dev_iommu_priv_set(dev, NULL); kfree(info); set_dma_ops(dev, NULL); -- 2.34.1