Received: by 2002:a25:ab43:0:0:0:0:0 with SMTP id u61csp1707336ybi; Thu, 20 Jun 2019 02:21:27 -0700 (PDT) X-Google-Smtp-Source: APXvYqx8KW3L1jiGxWyUEiEAbwylZWHEJ+qz92r99vBlSeWrh583bPQLChWQ1lbM9ZCA9uDqomPf X-Received: by 2002:a63:4d50:: with SMTP id n16mr12159304pgl.146.1561022486830; Thu, 20 Jun 2019 02:21:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1561022486; cv=none; d=google.com; s=arc-20160816; b=Y+TjYTyMykj/cKwpBUU9PTAk6tdZiv7ya5O8Qcl19vJuP9gQw5YTtJO3cvqPTjV5cw CEYBYIFcFbqplkcmRDy4/F8Vx6AXPWWQcuDXg7bAWXIhiB6prZgVexQxGDbJJQiwpSKB qKfPsS5cz0ikaxKUUvmsLtk00tPG7eK20NyHEU7/ZZ5TebrOsPFX4QpKOPn3CuV58bzG L+sDQQpUqBWbjceBIcB0wMMfgOGgjR8XSY21OLOmD2BvJna50L9n2Lt900GVoSh+Ax4q Ig0v0votZVcbQY+xZ9gqW4er7sc0gcZpET/Ss/PbZ7vhwyJXW3FG/K1OPvEge0TOI5oT jWUg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject; bh=kVQMNDb5AxX9l4nCkhO9gKLy3mRzLBMxhfR3jEdm2Aw=; b=DCv+mLhag+0XvTU6lRnD0ju0j5/rBOlYsZUHbgvjs5hU92kZbMEy0Zf1ZF+GxhOdI2 pAk8jCZ13S8FxPb9laumaM5VH0HxVg4BIvxR2gAf4yRgOe7Szj8BZNuG8ORjNX9bvZRM /EZAxGgpGFNIvFrCV0bWz9WonHm+7CjR3PubxvI+3vmk60ir0V7lMGu788dxZjAH7ltc RkICh+ddbi7u8MoWI6sdPjRwLmaLRofeFwp2V1uMucKkw7YNbvsLCxN7439MtVzScKRT Mt7Ggb8N5QdbzM/nkiw2mnhjkh++a/5Zeto1lhPmuVze5CzIENr9udNzkhxo5UvnS7Xf PzFQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v31si3852101pjb.22.2019.06.20.02.21.11; Thu, 20 Jun 2019 02:21:26 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726539AbfFTJUt (ORCPT + 99 others); Thu, 20 Jun 2019 05:20:49 -0400 Received: from mx0b-001b2d01.pphosted.com ([148.163.158.5]:34992 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725875AbfFTJUs (ORCPT ); Thu, 20 Jun 2019 05:20:48 -0400 Received: from pps.filterd (m0098421.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x5K98VWG000986 for ; Thu, 20 Jun 2019 05:20:47 -0400 Received: from e06smtp05.uk.ibm.com (e06smtp05.uk.ibm.com [195.75.94.101]) by mx0a-001b2d01.pphosted.com with ESMTP id 2t878bremj-1 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=NOT) for ; Thu, 20 Jun 2019 05:20:47 -0400 Received: from localhost by e06smtp05.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 20 Jun 2019 10:20:45 +0100 Received: from b06avi18878370.portsmouth.uk.ibm.com (9.149.26.194) by e06smtp05.uk.ibm.com (192.168.101.135) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; (version=TLSv1/SSLv3 cipher=AES256-GCM-SHA384 bits=256/256) Thu, 20 Jun 2019 10:20:41 +0100 Received: from d06av25.portsmouth.uk.ibm.com (d06av25.portsmouth.uk.ibm.com [9.149.105.61]) by b06avi18878370.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id x5K9Kewl36503834 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Thu, 20 Jun 2019 09:20:40 GMT Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 1FBEC11C05C; Thu, 20 Jun 2019 09:20:40 +0000 (GMT) Received: from d06av25.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 9B31611C04A; Thu, 20 Jun 2019 09:20:39 +0000 (GMT) Received: from pic2.home (unknown [9.145.54.139]) by d06av25.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 20 Jun 2019 09:20:39 +0000 (GMT) Subject: Re: [PATCH v2] ocxl: Allow contexts to be attached with a NULL mm To: "Alastair D'Silva" , alastair@d-silva.org Cc: Benjamin Herrenschmidt , Paul Mackerras , Michael Ellerman , Andrew Donnellan , Arnd Bergmann , Greg Kroah-Hartman , Nicholas Piggin , Andrew Morton , Masahiro Yamada , Thomas Gleixner , Suraj Jitindar Singh , linuxppc-dev@lists.ozlabs.org, linux-kernel@vger.kernel.org References: <20190620041203.12274-1-alastair@au1.ibm.com> From: Frederic Barrat Date: Thu, 20 Jun 2019 11:20:39 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.0 MIME-Version: 1.0 In-Reply-To: <20190620041203.12274-1-alastair@au1.ibm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: fr-MC Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 19062009-0020-0000-0000-0000034BCAAF X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 19062009-0021-0000-0000-0000219F244B Message-Id: <0e4965a7-04e7-6412-be37-ea96bcf0e007@linux.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-06-20_06:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 mlxscore=0 impostorscore=0 mlxlogscore=823 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1810050000 definitions=main-1906200068 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Le 20/06/2019 à 06:12, Alastair D'Silva a écrit : > From: Alastair D'Silva > > If an OpenCAPI context is to be used directly by a kernel driver, there > may not be a suitable mm to use. > > The patch makes the mm parameter to ocxl_context_attach optional. > > Signed-off-by: Alastair D'Silva > --- Thanks for the update. Acked-by: Frederic Barrat > arch/powerpc/mm/book3s64/radix_tlb.c | 5 +++++ > drivers/misc/ocxl/context.c | 9 ++++++--- > drivers/misc/ocxl/link.c | 28 ++++++++++++++++++++++++---- > 3 files changed, 35 insertions(+), 7 deletions(-) > > diff --git a/arch/powerpc/mm/book3s64/radix_tlb.c b/arch/powerpc/mm/book3s64/radix_tlb.c > index bb9835681315..ce8a77fae6a7 100644 > --- a/arch/powerpc/mm/book3s64/radix_tlb.c > +++ b/arch/powerpc/mm/book3s64/radix_tlb.c > @@ -666,6 +666,11 @@ EXPORT_SYMBOL(radix__flush_tlb_page); > #define radix__flush_all_mm radix__local_flush_all_mm > #endif /* CONFIG_SMP */ > > +/* > + * If kernel TLBIs ever become local rather than global, then > + * drivers/misc/ocxl/link.c:ocxl_link_add_pe will need some work, as it > + * assumes kernel TLBIs are global. > + */ > void radix__flush_tlb_kernel_range(unsigned long start, unsigned long end) > { > _tlbie_pid(0, RIC_FLUSH_ALL); > diff --git a/drivers/misc/ocxl/context.c b/drivers/misc/ocxl/context.c > index bab9c9364184..994563a078eb 100644 > --- a/drivers/misc/ocxl/context.c > +++ b/drivers/misc/ocxl/context.c > @@ -69,6 +69,7 @@ static void xsl_fault_error(void *data, u64 addr, u64 dsisr) > int ocxl_context_attach(struct ocxl_context *ctx, u64 amr, struct mm_struct *mm) > { > int rc; > + unsigned long pidr = 0; > > // Locks both status & tidr > mutex_lock(&ctx->status_mutex); > @@ -77,9 +78,11 @@ int ocxl_context_attach(struct ocxl_context *ctx, u64 amr, struct mm_struct *mm) > goto out; > } > > - rc = ocxl_link_add_pe(ctx->afu->fn->link, ctx->pasid, > - mm->context.id, ctx->tidr, amr, mm, > - xsl_fault_error, ctx); > + if (mm) > + pidr = mm->context.id; > + > + rc = ocxl_link_add_pe(ctx->afu->fn->link, ctx->pasid, pidr, ctx->tidr, > + amr, mm, xsl_fault_error, ctx); > if (rc) > goto out; > > diff --git a/drivers/misc/ocxl/link.c b/drivers/misc/ocxl/link.c > index cce5b0d64505..58d111afd9f6 100644 > --- a/drivers/misc/ocxl/link.c > +++ b/drivers/misc/ocxl/link.c > @@ -224,6 +224,17 @@ static irqreturn_t xsl_fault_handler(int irq, void *data) > ack_irq(spa, ADDRESS_ERROR); > return IRQ_HANDLED; > } > + > + if (!pe_data->mm) { > + /* > + * translation fault from a kernel context - an OpenCAPI > + * device tried to access a bad kernel address > + */ > + rcu_read_unlock(); > + pr_warn("Unresolved OpenCAPI xsl fault in kernel context\n"); > + ack_irq(spa, ADDRESS_ERROR); > + return IRQ_HANDLED; > + } > WARN_ON(pe_data->mm->context.id != pid); > > if (mmget_not_zero(pe_data->mm)) { > @@ -523,7 +534,13 @@ int ocxl_link_add_pe(void *link_handle, int pasid, u32 pidr, u32 tidr, > pe->amr = cpu_to_be64(amr); > pe->software_state = cpu_to_be32(SPA_PE_VALID); > > - mm_context_add_copro(mm); > + /* > + * For user contexts, register a copro so that TLBIs are seen > + * by the nest MMU. If we have a kernel context, TLBIs are > + * already global. > + */ > + if (mm) > + mm_context_add_copro(mm); > /* > * Barrier is to make sure PE is visible in the SPA before it > * is used by the device. It also helps with the global TLBI > @@ -546,7 +563,8 @@ int ocxl_link_add_pe(void *link_handle, int pasid, u32 pidr, u32 tidr, > * have a reference on mm_users. Incrementing mm_count solves > * the problem. > */ > - mmgrab(mm); > + if (mm) > + mmgrab(mm); > trace_ocxl_context_add(current->pid, spa->spa_mem, pasid, pidr, tidr); > unlock: > mutex_unlock(&spa->spa_lock); > @@ -652,8 +670,10 @@ int ocxl_link_remove_pe(void *link_handle, int pasid) > if (!pe_data) { > WARN(1, "Couldn't find pe data when removing PE\n"); > } else { > - mm_context_remove_copro(pe_data->mm); > - mmdrop(pe_data->mm); > + if (pe_data->mm) { > + mm_context_remove_copro(pe_data->mm); > + mmdrop(pe_data->mm); > + } > kfree_rcu(pe_data, rcu); > } > unlock: >