Received: by 2002:a25:6193:0:0:0:0:0 with SMTP id v141csp852253ybb; Wed, 25 Mar 2020 10:50:45 -0700 (PDT) X-Google-Smtp-Source: ADFU+vtuj09z7bYR1ViyAFtBdaRS5J9DzLgTnPk9G+sT+yVvrUoMzwDubxh2bX9lAvMApMDDoy7t X-Received: by 2002:a05:6830:22c3:: with SMTP id q3mr883277otc.152.1585158645650; Wed, 25 Mar 2020 10:50:45 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1585158645; cv=none; d=google.com; s=arc-20160816; b=eY64WY/wE800ARArzYKFRux/EUTupq6ckPE5+cc6X5WQvO0+BCLd6fbbAbAvsTn9B/ P8zdRUn0W8KKps5OwKfxSoLJQtdITrTXWkogn93AymA8Y2ArkA4mCuZxV0UL6ePiMmGu TA9p5qF3xlVsb8Z+n6//5qmOdPQfbAreO8kAOTQ7JtsTIqvLjDVq6zravqz7tZIjXClS +PfCBgOtvZ0gHknRXW5eNyTTDYYjfaKjJ3R1tWy7LQXpJ3lQKYUeO6/6wMQydA0Dm9ij mZIyEUEB/1Z7DQg52tQ8dbLiMQZk5Y2AS5N4KC3JHH1DK5Cj8qN/3G6FUj4Ds8hWVxUp NjRg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:ironport-sdr:ironport-sdr; bh=CkGTzVUoETbDMC9Nnzs1jzpmbH2H/z09EIjhmt7hM1M=; b=NWzcruT1sYmaOSbb+GlroINg5+vJROf7Y79MMw4yGBgceiDMticQlzCIHflYpYzNLW HAB7W9111m3OYJsktPF35s/7ooain2JV7LsHCuzQRnkc+4Mixenk0b3F4OghtkhpUNFf cy8MvKzxEcYMkytavj5U/VBijvWdkhASCwROPLjP+DK76oC+mSmzzrD2Z8ANnbz6uN/Q uuLIXThGHbxzelNxqOJrD1bRRC5Q4rrNLuKGCIISoc66FpsvsF8GZcS8/bH2LBSXriNe EkenknZBnzHlPCpwebbG4uGTRB/UFC4nVx5PpXsHJKDvbZaF+X4xv4TK1eAXS+W0n+V9 0CBA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q8si1827159ool.90.2020.03.25.10.50.32; Wed, 25 Mar 2020 10:50:45 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728172AbgCYRtw (ORCPT + 99 others); Wed, 25 Mar 2020 13:49:52 -0400 Received: from mga12.intel.com ([192.55.52.136]:57497 "EHLO mga12.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727990AbgCYRtu (ORCPT ); Wed, 25 Mar 2020 13:49:50 -0400 IronPort-SDR: d6+9xqb/lR20QXeLZ0pY2bar5YH78ZRpYzZZsV51Wkw/KvIr5sKnDdg+GevStqfrmT+NJzCovi oJxgEcZXFgpw== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 25 Mar 2020 10:49:48 -0700 IronPort-SDR: JHNxqwN5HbSN55qRt7J9LFpd4xR92JoIojOa2cG3wliONfcRq/smDB4zRNCAB0h2TDgFJuJiw8 ufoGisK49q3g== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,305,1580803200"; d="scan'208";a="393702210" Received: from jacob-builder.jf.intel.com ([10.7.199.155]) by orsmga004.jf.intel.com with ESMTP; 25 Mar 2020 10:49:48 -0700 From: Jacob Pan To: Joerg Roedel , Alex Williamson , "Lu Baolu" , iommu@lists.linux-foundation.org, LKML , David Woodhouse , Jean-Philippe Brucker Cc: "Yi Liu" , "Tian, Kevin" , Raj Ashok , "Christoph Hellwig" , Jonathan Cameron , Eric Auger , Jacob Pan Subject: [PATCH 07/10] iommu/ioasid: Use mutex instead of spinlock Date: Wed, 25 Mar 2020 10:55:28 -0700 Message-Id: <1585158931-1825-8-git-send-email-jacob.jun.pan@linux.intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1585158931-1825-1-git-send-email-jacob.jun.pan@linux.intel.com> References: <1585158931-1825-1-git-send-email-jacob.jun.pan@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Each IOASID or set could have multiple users with its own HW context to maintain. Often times access to the HW context requires thread context. For example, consumers of IOASIDs can register notification blocks to sync up its states. Having an atomic notifier is not feasible for these update operations. This patch converts allocator lock from spinlock to mutex in preparation for IOASID notifier. Signed-off-by: Jacob Pan --- drivers/iommu/ioasid.c | 45 +++++++++++++++++++++++---------------------- 1 file changed, 23 insertions(+), 22 deletions(-) diff --git a/drivers/iommu/ioasid.c b/drivers/iommu/ioasid.c index f89a595f6978..8612fe6477dc 100644 --- a/drivers/iommu/ioasid.c +++ b/drivers/iommu/ioasid.c @@ -98,7 +98,7 @@ struct ioasid_allocator_data { struct rcu_head rcu; }; -static DEFINE_SPINLOCK(ioasid_allocator_lock); +static DEFINE_MUTEX(ioasid_allocator_lock); static LIST_HEAD(allocators_list); static ioasid_t default_alloc(ioasid_t min, ioasid_t max, void *opaque); @@ -121,7 +121,7 @@ static ioasid_t default_alloc(ioasid_t min, ioasid_t max, void *opaque) { ioasid_t id; - if (xa_alloc(&default_allocator.xa, &id, opaque, XA_LIMIT(min, max), GFP_ATOMIC)) { + if (xa_alloc(&default_allocator.xa, &id, opaque, XA_LIMIT(min, max), GFP_KERNEL)) { pr_err("Failed to alloc ioasid from %d to %d\n", min, max); return INVALID_IOASID; } @@ -142,7 +142,7 @@ static struct ioasid_allocator_data *ioasid_alloc_allocator(struct ioasid_alloca { struct ioasid_allocator_data *ia_data; - ia_data = kzalloc(sizeof(*ia_data), GFP_ATOMIC); + ia_data = kzalloc(sizeof(*ia_data), GFP_KERNEL); if (!ia_data) return NULL; @@ -184,7 +184,7 @@ int ioasid_register_allocator(struct ioasid_allocator_ops *ops) struct ioasid_allocator_data *pallocator; int ret = 0; - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); ia_data = ioasid_alloc_allocator(ops); if (!ia_data) { @@ -228,12 +228,12 @@ int ioasid_register_allocator(struct ioasid_allocator_ops *ops) } list_add_tail(&ia_data->list, &allocators_list); - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); return 0; out_free: kfree(ia_data); out_unlock: - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); return ret; } EXPORT_SYMBOL_GPL(ioasid_register_allocator); @@ -251,7 +251,7 @@ void ioasid_unregister_allocator(struct ioasid_allocator_ops *ops) struct ioasid_allocator_data *pallocator; struct ioasid_allocator_ops *sops; - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); if (list_empty(&allocators_list)) { pr_warn("No custom IOASID allocators active!\n"); goto exit_unlock; @@ -296,7 +296,7 @@ void ioasid_unregister_allocator(struct ioasid_allocator_ops *ops) } exit_unlock: - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); } EXPORT_SYMBOL_GPL(ioasid_unregister_allocator); @@ -313,13 +313,13 @@ int ioasid_attach_data(ioasid_t ioasid, void *data) struct ioasid_data *ioasid_data; int ret = 0; - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); ioasid_data = xa_load(&active_allocator->xa, ioasid); if (ioasid_data) rcu_assign_pointer(ioasid_data->private, data); else ret = -ENOENT; - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); /* * Wait for readers to stop accessing the old private data, so the @@ -374,7 +374,7 @@ ioasid_t ioasid_alloc(int sid, ioasid_t min, ioasid_t max, void *private) * Custom allocator needs allocator data to perform platform specific * operations. */ - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); adata = active_allocator->flags & IOASID_ALLOCATOR_CUSTOM ? active_allocator->ops->pdata : data; id = active_allocator->ops->alloc(min, max, adata); if (id == INVALID_IOASID) { @@ -383,7 +383,7 @@ ioasid_t ioasid_alloc(int sid, ioasid_t min, ioasid_t max, void *private) } if ((active_allocator->flags & IOASID_ALLOCATOR_CUSTOM) && - xa_alloc(&active_allocator->xa, &id, data, XA_LIMIT(id, id), GFP_ATOMIC)) { + xa_alloc(&active_allocator->xa, &id, data, XA_LIMIT(id, id), GFP_KERNEL)) { /* Custom allocator needs framework to store and track allocation results */ pr_err("Failed to alloc ioasid from %d\n", id); active_allocator->ops->free(id, active_allocator->ops->pdata); @@ -394,10 +394,11 @@ ioasid_t ioasid_alloc(int sid, ioasid_t min, ioasid_t max, void *private) /* Store IOASID in the per set data */ xa_store(&sdata->xa, id, data, GFP_KERNEL); sdata->nr_ioasids++; - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); + return id; exit_free: - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); kfree(data); return INVALID_IOASID; } @@ -440,9 +441,9 @@ static void ioasid_free_locked(ioasid_t ioasid) */ void ioasid_free(ioasid_t ioasid) { - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); ioasid_free_locked(ioasid); - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); } EXPORT_SYMBOL_GPL(ioasid_free); @@ -473,7 +474,7 @@ int ioasid_alloc_set(struct ioasid_set *token, ioasid_t quota, int *sid) if (!sdata) return -ENOMEM; - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); ret = xa_alloc(&ioasid_sets, &id, sdata, XA_LIMIT(0, ioasid_capacity_avail - quota), @@ -497,7 +498,7 @@ int ioasid_alloc_set(struct ioasid_set *token, ioasid_t quota, int *sid) *sid = id; error: - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); return ret; } @@ -518,7 +519,7 @@ void ioasid_free_set(int sid, bool destroy_set) struct ioasid_data *entry; unsigned long index; - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); sdata = xa_load(&ioasid_sets, sid); if (!sdata) { pr_err("No IOASID set found to free %d\n", sid); @@ -549,7 +550,7 @@ void ioasid_free_set(int sid, bool destroy_set) } done_unlock: - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); } EXPORT_SYMBOL_GPL(ioasid_free_set); @@ -613,11 +614,11 @@ int ioasid_find_sid(ioasid_t ioasid) struct ioasid_data *ioasid_data; int ret = 0; - spin_lock(&ioasid_allocator_lock); + mutex_lock(&ioasid_allocator_lock); ioasid_data = xa_load(&active_allocator->xa, ioasid); ret = (ioasid_data) ? ioasid_data->sdata->sid : -ENOENT; - spin_unlock(&ioasid_allocator_lock); + mutex_unlock(&ioasid_allocator_lock); return ret; } -- 2.7.4