iommu/vt-d: Update IOMMU state when memory hotplug happens
If static identity domain is created, IOMMU driver needs to update si_domain page table when memory hotplug event happens. Otherwise PCI device DMA operations can't access the hot-added memory regions. Signed-off-by: Jiang Liu <jiang.liu@linux.intel.com> Signed-off-by: Joerg Roedel <joro@8bytes.org>
Esse commit está contido em:
@@ -33,6 +33,7 @@
|
||||
#include <linux/dmar.h>
|
||||
#include <linux/dma-mapping.h>
|
||||
#include <linux/mempool.h>
|
||||
#include <linux/memory.h>
|
||||
#include <linux/timer.h>
|
||||
#include <linux/iova.h>
|
||||
#include <linux/iommu.h>
|
||||
@@ -3683,6 +3684,73 @@ static struct notifier_block device_nb = {
|
||||
.notifier_call = device_notifier,
|
||||
};
|
||||
|
||||
static int intel_iommu_memory_notifier(struct notifier_block *nb,
|
||||
unsigned long val, void *v)
|
||||
{
|
||||
struct memory_notify *mhp = v;
|
||||
unsigned long long start, end;
|
||||
unsigned long start_vpfn, last_vpfn;
|
||||
|
||||
switch (val) {
|
||||
case MEM_GOING_ONLINE:
|
||||
start = mhp->start_pfn << PAGE_SHIFT;
|
||||
end = ((mhp->start_pfn + mhp->nr_pages) << PAGE_SHIFT) - 1;
|
||||
if (iommu_domain_identity_map(si_domain, start, end)) {
|
||||
pr_warn("dmar: failed to build identity map for [%llx-%llx]\n",
|
||||
start, end);
|
||||
return NOTIFY_BAD;
|
||||
}
|
||||
break;
|
||||
|
||||
case MEM_OFFLINE:
|
||||
case MEM_CANCEL_ONLINE:
|
||||
start_vpfn = mm_to_dma_pfn(mhp->start_pfn);
|
||||
last_vpfn = mm_to_dma_pfn(mhp->start_pfn + mhp->nr_pages - 1);
|
||||
while (start_vpfn <= last_vpfn) {
|
||||
struct iova *iova;
|
||||
struct dmar_drhd_unit *drhd;
|
||||
struct intel_iommu *iommu;
|
||||
|
||||
iova = find_iova(&si_domain->iovad, start_vpfn);
|
||||
if (iova == NULL) {
|
||||
pr_debug("dmar: failed get IOVA for PFN %lx\n",
|
||||
start_vpfn);
|
||||
break;
|
||||
}
|
||||
|
||||
iova = split_and_remove_iova(&si_domain->iovad, iova,
|
||||
start_vpfn, last_vpfn);
|
||||
if (iova == NULL) {
|
||||
pr_warn("dmar: failed to split IOVA PFN [%lx-%lx]\n",
|
||||
start_vpfn, last_vpfn);
|
||||
return NOTIFY_BAD;
|
||||
}
|
||||
|
||||
rcu_read_lock();
|
||||
for_each_active_iommu(iommu, drhd)
|
||||
iommu_flush_iotlb_psi(iommu, si_domain->id,
|
||||
iova->pfn_lo,
|
||||
iova->pfn_hi - iova->pfn_lo + 1, 0);
|
||||
rcu_read_unlock();
|
||||
dma_pte_clear_range(si_domain, iova->pfn_lo,
|
||||
iova->pfn_hi);
|
||||
dma_pte_free_pagetable(si_domain, iova->pfn_lo,
|
||||
iova->pfn_hi);
|
||||
|
||||
start_vpfn = iova->pfn_hi + 1;
|
||||
free_iova_mem(iova);
|
||||
}
|
||||
break;
|
||||
}
|
||||
|
||||
return NOTIFY_OK;
|
||||
}
|
||||
|
||||
static struct notifier_block intel_iommu_memory_nb = {
|
||||
.notifier_call = intel_iommu_memory_notifier,
|
||||
.priority = 0
|
||||
};
|
||||
|
||||
int __init intel_iommu_init(void)
|
||||
{
|
||||
int ret = -ENODEV;
|
||||
@@ -3755,8 +3823,9 @@ int __init intel_iommu_init(void)
|
||||
init_iommu_pm_ops();
|
||||
|
||||
bus_set_iommu(&pci_bus_type, &intel_iommu_ops);
|
||||
|
||||
bus_register_notifier(&pci_bus_type, &device_nb);
|
||||
if (si_domain && !hw_pass_through)
|
||||
register_memory_notifier(&intel_iommu_memory_nb);
|
||||
|
||||
intel_iommu_enabled = 1;
|
||||
|
||||
|
Referência em uma nova issue
Block a user