When a master is attached from an old domain to a new domain, it needs to
build an invalidation array to delete and add the array entries from/onto
the invalidation arrays of those two domains, passed via the del_invs and
add_invs arguments in to arm_smmu_invs_del/add() respectively.
Since the master->num_streams might differ across masters, a memory would
have to be allocated when building an add_invs/del_invs array which might
fail with -ENOMEM.
On the other hand, an attachment to arm_smmu_blocked_domain must not fail
so it's the best to avoid any memory allocation in that path.
Pre-allocate a fixed size invalidation array for every master. This array
will be filled dynamically when building an add_invs or del_invs array to
attach or detach an smmu_domain.
Signed-off-by: Nicolin Chen <nicolinc@nvidia.com>
---
drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h | 1 +
drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 10 ++++++++++
2 files changed, 11 insertions(+)
diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h
index d7421b56e3598..0330444bef45f 100644
--- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h
+++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h
@@ -919,6 +919,7 @@ struct arm_smmu_master {
struct arm_smmu_device *smmu;
struct device *dev;
struct arm_smmu_stream *streams;
+ struct arm_smmu_invs *invs;
struct arm_smmu_vmaster *vmaster; /* use smmu->streams_mutex */
/* Locked by the iommu core using the group mutex */
struct arm_smmu_ctx_desc_cfg cd_table;
diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c
index 73f3b411ff7ef..fb5429d8ebb29 100644
--- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c
+++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c
@@ -3723,6 +3723,7 @@ static int arm_smmu_insert_master(struct arm_smmu_device *smmu,
int i;
int ret = 0;
struct iommu_fwspec *fwspec = dev_iommu_fwspec_get(master->dev);
+ size_t num_ats = dev_is_pci(master->dev) ? master->num_streams : 0;
master->streams = kcalloc(fwspec->num_ids, sizeof(*master->streams),
GFP_KERNEL);
@@ -3730,6 +3731,13 @@ static int arm_smmu_insert_master(struct arm_smmu_device *smmu,
return -ENOMEM;
master->num_streams = fwspec->num_ids;
+ /* Max possible num_invs: two for ASID/VMIDs and num_ats for ATC_INVs */
+ master->invs = arm_smmu_invs_alloc(2 + num_ats);
+ if (IS_ERR(master->invs)) {
+ kfree(master->streams);
+ return PTR_ERR(master->invs);
+ }
+
mutex_lock(&smmu->streams_mutex);
for (i = 0; i < fwspec->num_ids; i++) {
struct arm_smmu_stream *new_stream = &master->streams[i];
@@ -3767,6 +3775,7 @@ static int arm_smmu_insert_master(struct arm_smmu_device *smmu,
for (i--; i >= 0; i--)
rb_erase(&master->streams[i].node, &smmu->streams);
kfree(master->streams);
+ kfree(master->invs);
}
mutex_unlock(&smmu->streams_mutex);
@@ -3788,6 +3797,7 @@ static void arm_smmu_remove_master(struct arm_smmu_master *master)
mutex_unlock(&smmu->streams_mutex);
kfree(master->streams);
+ kfree(master->invs);
}
static struct iommu_device *arm_smmu_probe_device(struct device *dev)
--
2.43.0
On Wed, Aug 13, 2025 at 06:25:36PM -0700, Nicolin Chen wrote: > @@ -3730,6 +3731,13 @@ static int arm_smmu_insert_master(struct arm_smmu_device *smmu, > return -ENOMEM; > master->num_streams = fwspec->num_ids; > > + /* Max possible num_invs: two for ASID/VMIDs and num_ats for ATC_INVs */ > + master->invs = arm_smmu_invs_alloc(2 + num_ats); > + if (IS_ERR(master->invs)) { > + kfree(master->streams); > + return PTR_ERR(master->invs); > + } This seems like a nice solution, but I would add a comment here that it is locked by the group mutex, and check if ATS is supported: /* * Scratch memory to build the per-domain invalidation list. locked by * the group_mutex. Max possible num_invs: two for ASID/VMIDs and * num_streams for ATC_INVs */ if (dev_is_pci(master->dev) && pci_ats_supported(to_pci_dev(master->dev))) master->invs = arm_smmu_invs_alloc(2 + master->num_streams); else master->invs = arm_smmu_invs_alloc(2); And probably rename it scratch_invs or something to indicate it is temporary memory. I'm not sure there is any case where fwspec->num_ids >1 && ats_supported, or at least is should be really rare. Jason
On Tue, Aug 26, 2025 at 04:56:41PM -0300, Jason Gunthorpe wrote: > On Wed, Aug 13, 2025 at 06:25:36PM -0700, Nicolin Chen wrote: > > @@ -3730,6 +3731,13 @@ static int arm_smmu_insert_master(struct arm_smmu_device *smmu, > > return -ENOMEM; > > master->num_streams = fwspec->num_ids; > > > > + /* Max possible num_invs: two for ASID/VMIDs and num_ats for ATC_INVs */ > > + master->invs = arm_smmu_invs_alloc(2 + num_ats); > > + if (IS_ERR(master->invs)) { > > + kfree(master->streams); > > + return PTR_ERR(master->invs); > > + } > > This seems like a nice solution, but I would add a comment here that > it is locked by the group mutex, and check if ATS is supported: > > /* > * Scratch memory to build the per-domain invalidation list. locked by > * the group_mutex. Max possible num_invs: two for ASID/VMIDs and > * num_streams for ATC_INVs > */ > if (dev_is_pci(master->dev) && > pci_ats_supported(to_pci_dev(master->dev))) > master->invs = arm_smmu_invs_alloc(2 + master->num_streams); > else > master->invs = arm_smmu_invs_alloc(2); > > And probably rename it scratch_invs or something to indicate it is > temporary memory. I renamed it to master->build_invs: @@ -919,7 +931,14 @@ struct arm_smmu_master { struct arm_smmu_device *smmu; struct device *dev; struct arm_smmu_stream *streams; - struct arm_smmu_invs *invs; + /* + * Scratch memory for a to_merge or to_unref array to build a per-domain + * invalidation array. It'll be pre-allocated with enough enries for all + * possible build scenarios. It can be used by only one caller at a time + * until the arm_smmu_invs_merge/unref() finishes. Must be locked by the + * iommu_group mutex. + */ + struct arm_smmu_invs *build_invs; struct arm_smmu_vmaster *vmaster; /* use smmu->streams_mutex */ /* Locked by the iommu core using the group mutex */ struct arm_smmu_ctx_desc_cfg cd_table; One thing that I noticed is that group mutex alone isn't enough, because there can be two arm_smmu_build_invs() calls during the same attach_dev callback. And the second one would overwrite. Thanks Nicolin
On Sat, Sep 06, 2025 at 12:45:58AM -0700, Nicolin Chen wrote: > One thing that I noticed is that group mutex alone isn't enough, > because there can be two arm_smmu_build_invs() calls during the > same attach_dev callback. And the second one would overwrite. Well the group mutex is what makes it non-concurrent. Two things using it sequentially within the same thread are a different issue Jason
© 2016 - 2025 Red Hat, Inc.