Skip to content

Commit d315e9e

Browse files
Jacob Panjoergroedel
authored andcommitted
iommu/vt-d: Disable multiple GPASID-dev bind
For the unlikely use case where multiple aux domains from the same pdev are attached to a single guest and then bound to a single process (thus same PASID) within that guest, we cannot easily support this case by refcounting the number of users. As there is only one SL page table per PASID while we have multiple aux domains thus multiple SL page tables for the same PASID. Extra unbinding guest PASID can happen due to race between normal and exception cases. Termination of one aux domain may affect others unless we actively track and switch aux domains to ensure the validity of SL page tables and TLB states in the shared PASID entry. Support for sharing second level PGDs across domains can reduce the complexity but this is not available due to the limitations on VFIO container architecture. We can revisit this decision once sharing PGDs are available. Overall, the complexity and potential glitch do not warrant this unlikely use case thereby removed by this patch. Fixes: 56722a4 ("iommu/vt-d: Add bind guest PASID support") Signed-off-by: Liu Yi L <[email protected]> Signed-off-by: Jacob Pan <[email protected]> Signed-off-by: Lu Baolu <[email protected]> Reviewed-by: Eric Auger <[email protected]> Cc: Kevin Tian <[email protected]> Link: https://lore.kernel.org/r/[email protected] Signed-off-by: Joerg Roedel <[email protected]>
1 parent 1ff0027 commit d315e9e

File tree

1 file changed

+9
-13
lines changed

1 file changed

+9
-13
lines changed

drivers/iommu/intel/svm.c

Lines changed: 9 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -277,20 +277,16 @@ int intel_svm_bind_gpasid(struct iommu_domain *domain, struct device *dev,
277277
goto out;
278278
}
279279

280+
/*
281+
* Do not allow multiple bindings of the same device-PASID since
282+
* there is only one SL page tables per PASID. We may revisit
283+
* once sharing PGD across domains are supported.
284+
*/
280285
for_each_svm_dev(sdev, svm, dev) {
281-
/*
282-
* For devices with aux domains, we should allow
283-
* multiple bind calls with the same PASID and pdev.
284-
*/
285-
if (iommu_dev_feature_enabled(dev,
286-
IOMMU_DEV_FEAT_AUX)) {
287-
sdev->users++;
288-
} else {
289-
dev_warn_ratelimited(dev,
290-
"Already bound with PASID %u\n",
291-
svm->pasid);
292-
ret = -EBUSY;
293-
}
286+
dev_warn_ratelimited(dev,
287+
"Already bound with PASID %u\n",
288+
svm->pasid);
289+
ret = -EBUSY;
294290
goto out;
295291
}
296292
} else {

0 commit comments

Comments
 (0)