From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-13.0 required=3.0 tests=BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=unavailable autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 054CDC433ED for ; Tue, 14 Jul 2020 07:10:05 +0000 (UTC) Received: from gabe.freedesktop.org (gabe.freedesktop.org [131.252.210.177]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id D57052076D for ; Tue, 14 Jul 2020 07:10:04 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org D57052076D Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=intel.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=amd-gfx-bounces@lists.freedesktop.org Received: from gabe.freedesktop.org (localhost [127.0.0.1]) by gabe.freedesktop.org (Postfix) with ESMTP id 47BF66E925; Tue, 14 Jul 2020 07:09:59 +0000 (UTC) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by gabe.freedesktop.org (Postfix) with ESMTPS id 963376E83B for ; Mon, 13 Jul 2020 23:48:46 +0000 (UTC) IronPort-SDR: d6e0zDP+FjZ6S7wMiLM5JchL17Kqnov117c1HOrYqoifOxJ/RQrJwx5NRrWv/BNVjBZN8CAZU7 eoJgVjlMiwJg== X-IronPort-AV: E=McAfee;i="6000,8403,9681"; a="136227011" X-IronPort-AV: E=Sophos;i="5.75,349,1589266800"; d="scan'208";a="136227011" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Jul 2020 16:48:46 -0700 IronPort-SDR: +u5v99Qauxj+aa4U1fesuG05ebCxnQQjYZ0ob8rGZDfk8oEqaoWbzPfMN2IRNV2p3sTzpcAGn9 3Vbp5SPlhVeA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.75,349,1589266800"; d="scan'208";a="281570466" Received: from romley-ivt3.sc.intel.com ([172.25.110.60]) by orsmga003.jf.intel.com with ESMTP; 13 Jul 2020 16:48:46 -0700 From: Fenghua Yu To: "Thomas Gleixner" , "Joerg Roedel" , "Ingo Molnar" , "Borislav Petkov" , "Peter Zijlstra" , "H Peter Anvin" , "David Woodhouse" , "Lu Baolu" , "Felix Kuehling" , "Dave Hansen" , "Tony Luck" , "Jean-Philippe Brucker" , "Christoph Hellwig" , "Ashok Raj" , "Jacob Jun Pan" , "Dave Jiang" , "Sohil Mehta" , "Ravi V Shankar" Subject: [PATCH v6 10/12] x86/mmu: Allocate/free PASID Date: Mon, 13 Jul 2020 16:48:05 -0700 Message-Id: <1594684087-61184-11-git-send-email-fenghua.yu@intel.com> X-Mailer: git-send-email 2.5.0 In-Reply-To: <1594684087-61184-1-git-send-email-fenghua.yu@intel.com> References: <1594684087-61184-1-git-send-email-fenghua.yu@intel.com> X-Mailman-Approved-At: Tue, 14 Jul 2020 07:09:57 +0000 X-BeenThere: amd-gfx@lists.freedesktop.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Discussion list for AMD gfx List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: Fenghua Yu , iommu@lists.linux-foundation.org, x86 , linux-kernel , amd-gfx MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: amd-gfx-bounces@lists.freedesktop.org Sender: "amd-gfx" A PASID is allocated for an "mm" the first time any thread attaches to an SVM capable device. Later device attachments (whether to the same device or another SVM device) will re-use the same PASID. The PASID is freed when the process exits (so no need to keep reference counts on how many SVM devices are sharing the PASID). Currently the ENQCMD feature cannot be used if CONFIG_INTEL_IOMMU_SVM is not set. Add X86_FEATURE_ENQCMD to the disabled features mask as appropriate and use cpu_feature_enabled() to check the feature. Signed-off-by: Fenghua Yu Reviewed-by: Tony Luck Reviewed-by: Lu Baolu --- v5: - Mark ENQCMD disabled when configured out and remove redundant CONFIG_INTEL_IOMMU_SVM check which is included in cpu_feature_enabled() in fixup_pasid_exception() (PeterZ and Dave Hansen) - Reviewed by Lu Baolu v4: - Change PASID type to u32 (Christoph) v3: - Add sanity checks in alloc_pasid() and _free_pasid() (Baolu) - Add a comment that the private PASID feature will be removed completely from IOMMU and don't track private PASID in mm (Thomas) v2: - Define a helper free_bind() to simplify error exit code in bind_mm() (Thomas) - Fix a ret error code in bind_mm() (Thomas) - Change pasid's type from "int" to "unsigned int" to have consistent pasid type in iommu (Thomas) - Simplify alloc_pasid() a bit. arch/x86/include/asm/disabled-features.h | 9 +- arch/x86/include/asm/iommu.h | 2 + arch/x86/include/asm/mmu_context.h | 11 ++ drivers/iommu/intel/svm.c | 128 ++++++++++++++++++++--- 4 files changed, 137 insertions(+), 13 deletions(-) diff --git a/arch/x86/include/asm/disabled-features.h b/arch/x86/include/asm/disabled-features.h index 4ea8584682f9..588d83e9da49 100644 --- a/arch/x86/include/asm/disabled-features.h +++ b/arch/x86/include/asm/disabled-features.h @@ -56,6 +56,12 @@ # define DISABLE_PTI (1 << (X86_FEATURE_PTI & 31)) #endif +#ifdef CONFIG_INTEL_IOMMU_SVM +# define DISABLE_ENQCMD 0 +#else +# define DISABLE_ENQCMD (1 << (X86_FEATURE_ENQCMD & 31)) +#endif + /* * Make sure to add features to the correct mask */ @@ -75,7 +81,8 @@ #define DISABLED_MASK13 0 #define DISABLED_MASK14 0 #define DISABLED_MASK15 0 -#define DISABLED_MASK16 (DISABLE_PKU|DISABLE_OSPKE|DISABLE_LA57|DISABLE_UMIP) +#define DISABLED_MASK16 (DISABLE_PKU|DISABLE_OSPKE|DISABLE_LA57|DISABLE_UMIP| \ + DISABLE_ENQCMD) #define DISABLED_MASK17 0 #define DISABLED_MASK18 0 #define DISABLED_MASK_CHECK BUILD_BUG_ON_ZERO(NCAPINTS != 19) diff --git a/arch/x86/include/asm/iommu.h b/arch/x86/include/asm/iommu.h index bf1ed2ddc74b..ed41259fe7ac 100644 --- a/arch/x86/include/asm/iommu.h +++ b/arch/x86/include/asm/iommu.h @@ -26,4 +26,6 @@ arch_rmrr_sanity_check(struct acpi_dmar_reserved_memory *rmrr) return -EINVAL; } +void __free_pasid(struct mm_struct *mm); + #endif /* _ASM_X86_IOMMU_H */ diff --git a/arch/x86/include/asm/mmu_context.h b/arch/x86/include/asm/mmu_context.h index 47562147e70b..e1e7f1df6829 100644 --- a/arch/x86/include/asm/mmu_context.h +++ b/arch/x86/include/asm/mmu_context.h @@ -13,6 +13,7 @@ #include #include #include +#include extern atomic64_t last_mm_ctx_id; @@ -117,9 +118,19 @@ static inline int init_new_context(struct task_struct *tsk, init_new_context_ldt(mm); return 0; } + +static inline void free_pasid(struct mm_struct *mm) +{ + if (!cpu_feature_enabled(X86_FEATURE_ENQCMD)) + return; + + __free_pasid(mm); +} + static inline void destroy_context(struct mm_struct *mm) { destroy_context_ldt(mm); + free_pasid(mm); } extern void switch_mm(struct mm_struct *prev, struct mm_struct *next, diff --git a/drivers/iommu/intel/svm.c b/drivers/iommu/intel/svm.c index 8a0cf2f0dd54..4c788880b037 100644 --- a/drivers/iommu/intel/svm.c +++ b/drivers/iommu/intel/svm.c @@ -425,6 +425,69 @@ int intel_svm_unbind_gpasid(struct device *dev, u32 pasid) return ret; } +static void free_bind(struct intel_svm *svm, struct intel_svm_dev *sdev, + bool new_pasid) +{ + if (new_pasid) + ioasid_free(svm->pasid); + kfree(svm); + kfree(sdev); +} + +/* + * If this mm already has a PASID, use it. Otherwise allocate a new one. + * Let the caller know if a new PASID is allocated via 'new_pasid'. + */ +static int alloc_pasid(struct intel_svm *svm, struct mm_struct *mm, + u32 pasid_max, bool *new_pasid, + unsigned int flags) +{ + u32 pasid; + + *new_pasid = false; + + /* + * Reuse the PASID if the mm already has a PASID and not a private + * PASID is requested. + */ + if (mm && mm->pasid && !(flags & SVM_FLAG_PRIVATE_PASID)) { + void *p; + + /* + * Since the mm has a PASID already, the PASID should be + * bound and unbound to the mm before calling this allocation. + * So the PASID must be allocated by bind_mm() previously and + * should still exist in ioasid; but its data must be cleared + * already by unbind_mm(). + * + * Do a sanity check here to ensure the PASID has the right + * status before reusing it. + */ + p = ioasid_find(NULL, mm->pasid, NULL); + if (IS_ERR(p) || p) + return INVALID_IOASID; + + /* + * Once the PASID is allocated for this mm, it + * stays with the mm until the mm is dropped. Reuse + * the PASID which has been already allocated for the + * mm instead of allocating a new one. + */ + ioasid_set_data(mm->pasid, svm); + + return mm->pasid; + } + + /* Allocate a new pasid. Do not use PASID 0, reserved for init PASID. */ + pasid = ioasid_alloc(NULL, PASID_MIN, pasid_max - 1, svm); + if (pasid != INVALID_IOASID) { + /* A new pasid is allocated. */ + *new_pasid = true; + } + + return pasid; +} + /* Caller must hold pasid_mutex, mm reference */ static int intel_svm_bind_mm(struct device *dev, unsigned int flags, @@ -518,6 +581,8 @@ intel_svm_bind_mm(struct device *dev, unsigned int flags, init_rcu_head(&sdev->rcu); if (!svm) { + bool new_pasid; + svm = kzalloc(sizeof(*svm), GFP_KERNEL); if (!svm) { ret = -ENOMEM; @@ -529,12 +594,9 @@ intel_svm_bind_mm(struct device *dev, unsigned int flags, if (pasid_max > intel_pasid_max_id) pasid_max = intel_pasid_max_id; - /* Do not use PASID 0, reserved for RID to PASID */ - svm->pasid = ioasid_alloc(NULL, PASID_MIN, - pasid_max - 1, svm); + svm->pasid = alloc_pasid(svm, mm, pasid_max, &new_pasid, flags); if (svm->pasid == INVALID_IOASID) { - kfree(svm); - kfree(sdev); + free_bind(svm, sdev, new_pasid); ret = -ENOSPC; goto out; } @@ -547,9 +609,7 @@ intel_svm_bind_mm(struct device *dev, unsigned int flags, if (mm) { ret = mmu_notifier_register(&svm->notifier, mm); if (ret) { - ioasid_free(svm->pasid); - kfree(svm); - kfree(sdev); + free_bind(svm, sdev, new_pasid); goto out; } } @@ -565,12 +625,20 @@ intel_svm_bind_mm(struct device *dev, unsigned int flags, if (ret) { if (mm) mmu_notifier_unregister(&svm->notifier, mm); - ioasid_free(svm->pasid); - kfree(svm); - kfree(sdev); + free_bind(svm, sdev, new_pasid); goto out; } + if (mm && new_pasid && !(flags & SVM_FLAG_PRIVATE_PASID)) { + /* + * Track the new pasid in the mm. The pasid will be + * freed at process exit. + * + * The private PASID feature will be removed soon from + * IOMMU. Don't track requested private PASID in the mm. + */ + mm->pasid = svm->pasid; + } list_add_tail(&svm->list, &global_svm_list); } else { /* @@ -640,7 +708,8 @@ static int intel_svm_unbind_mm(struct device *dev, u32 pasid) kfree_rcu(sdev, rcu); if (list_empty(&svm->devs)) { - ioasid_free(svm->pasid); + /* Clear data in the pasid. */ + ioasid_set_data(pasid, NULL); if (svm->mm) mmu_notifier_unregister(&svm->notifier, svm->mm); list_del(&svm->list); @@ -1001,3 +1070,38 @@ u32 intel_svm_get_pasid(struct iommu_sva *sva) return pasid; } + +/* + * An invalid pasid is either 0 (init PASID value) or bigger than max PASID + * (PASID_MAX - 1). + */ +static bool invalid_pasid(u32 pasid) +{ + return (pasid == INIT_PASID) || (pasid >= PASID_MAX); +} + +/* On process exit free the PASID (if one was allocated). */ +void __free_pasid(struct mm_struct *mm) +{ + u32 pasid = mm->pasid; + void *p; + + /* No need to free invalid pasid. */ + if (invalid_pasid(pasid)) + return; + + /* The pasid shouldn't be bound to any mm by now. */ + p = ioasid_find(NULL, pasid, NULL); + if (!IS_ERR_OR_NULL(p)) { + pr_err("PASID %d is still in use\n", pasid); + + return; + } + + /* + * Since the pasid is not bound to any svm, there is no race + * here with binding/unbinding and no need to protect the free + * operation by pasid_mutex. + */ + ioasid_free(pasid); +} -- 2.19.1 _______________________________________________ amd-gfx mailing list amd-gfx@lists.freedesktop.org https://lists.freedesktop.org/mailman/listinfo/amd-gfx