Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp1517047ybt; Thu, 25 Jun 2020 07:54:01 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz12BZUTb8R7vo0k/ONEeXjti2wsIH7jvkOB9l7RBc808x1nW4/ZHVbHnmWsSjjRRW3Nanw X-Received: by 2002:a17:906:5799:: with SMTP id k25mr10617953ejq.540.1593096841455; Thu, 25 Jun 2020 07:54:01 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593096841; cv=none; d=google.com; s=arc-20160816; b=X+I5jOhHIMFIbJ8mgsUQpK9Px3iLFEoYIBpX5eVgZLWvJ8/dYEsc4c2PJ/9UPvUioR bIWp/VobSUIEfvi0eLRupVJz9WBZsEQMVs7cuUlr92EHiKr7gcI9Ks9uelC5GJlrjVwx R/2J6fFkrM8CQSw4IEusnSUu8hY0f4c+/CLPPjEDd4ZtklOGQZgkxk7C4paNVi8Kz0KK gqA9J6pTGfxXwlp1yRc4secpAGrki7G/AjzKH0nI5vqg8toCO7aqGSPO4xLgGM0+URID jzWWcr+fwyJyfqzKTxE2bbiztZeyZDhA8FHOv3x0evtlD4aQP1tO3a9t4581UeybjAiv HL/Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from; bh=Kgdg/q2k4zZpsbrezPYaaPopKDuTvQucPMc9nBF97hI=; b=f/CIGnOYLdXwHjv/wy50DlnMy2i6I+gIfWBFyZAN+FoRca8EedxiLYK9UlDPVMfCgl Gmx0jDTmXdNmXljpqvDbgRh6HeUQwS4d9QtBLTRgULnkh7gz2MSAq+8BLWSBW0kYZO6F e1unIAehX46IExwUwIAFunowhaesOESpM4oS0kVqizybIDDjQPQ6pCN5w+7y924eL0wN SCWikI/xopfLOqArOIP3wm7+DbrARPAzFLppKDggG7mbjD1kcHVXXktpjWSrjRQjszfP PoMEwZceu5mAkO4svim/81rfeDLeW3gTN4aAb44CvlYx5MHrC4t2RAI4qIhDtbJptuc2 1GPQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id gj23si2508037ejb.21.2020.06.25.07.53.37; Thu, 25 Jun 2020 07:54:01 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=8bytes.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2405509AbgFYOwd (ORCPT + 99 others); Thu, 25 Jun 2020 10:52:33 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50476 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S2405451AbgFYOwb (ORCPT ); Thu, 25 Jun 2020 10:52:31 -0400 Received: from theia.8bytes.org (8bytes.org [IPv6:2a01:238:4383:600:38bc:a715:4b6d:a889]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3CBB4C08C5DB for ; Thu, 25 Jun 2020 07:52:31 -0700 (PDT) Received: by theia.8bytes.org (Postfix, from userid 1000) id 8FFB550C; Thu, 25 Jun 2020 16:52:28 +0200 (CEST) From: Joerg Roedel To: Joerg Roedel Cc: iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, Suravee Suthikulpanit , Qian Cai , Joerg Roedel Subject: [PATCH 2/2] iommu/amd: Use 'unsigned long' for domain->pt_root Date: Thu, 25 Jun 2020 16:52:27 +0200 Message-Id: <20200625145227.4159-3-joro@8bytes.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200625145227.4159-1-joro@8bytes.org> References: <20200625145227.4159-1-joro@8bytes.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Joerg Roedel Using atomic64_t can be quite expensive, so use unsigned long instead. This is safe because the write becomes visible atomically. Signed-off-by: Joerg Roedel --- drivers/iommu/amd/amd_iommu_types.h | 2 +- drivers/iommu/amd/iommu.c | 10 ++++++++-- 2 files changed, 9 insertions(+), 3 deletions(-) diff --git a/drivers/iommu/amd/amd_iommu_types.h b/drivers/iommu/amd/amd_iommu_types.h index 30a5d412255a..f6f102282dda 100644 --- a/drivers/iommu/amd/amd_iommu_types.h +++ b/drivers/iommu/amd/amd_iommu_types.h @@ -468,7 +468,7 @@ struct protection_domain { iommu core code */ spinlock_t lock; /* mostly used to lock the page table*/ u16 id; /* the domain id written to the device table */ - atomic64_t pt_root; /* pgtable root and pgtable mode */ + unsigned long pt_root; /* pgtable root and pgtable mode */ int glx; /* Number of levels for GCR3 table */ u64 *gcr3_tbl; /* Guest CR3 table */ unsigned long flags; /* flags to find out type of domain */ diff --git a/drivers/iommu/amd/iommu.c b/drivers/iommu/amd/iommu.c index 5286ddcfc2f9..b0e1dc58244e 100644 --- a/drivers/iommu/amd/iommu.c +++ b/drivers/iommu/amd/iommu.c @@ -156,7 +156,7 @@ static struct protection_domain *to_pdomain(struct iommu_domain *dom) static void amd_iommu_domain_get_pgtable(struct protection_domain *domain, struct domain_pgtable *pgtable) { - u64 pt_root = atomic64_read(&domain->pt_root); + unsigned long pt_root = domain->pt_root; pgtable->root = (u64 *)(pt_root & PAGE_MASK); pgtable->mode = pt_root & 7; /* lowest 3 bits encode pgtable mode */ @@ -164,7 +164,13 @@ static void amd_iommu_domain_get_pgtable(struct protection_domain *domain, static void amd_iommu_domain_set_pt_root(struct protection_domain *domain, u64 root) { - atomic64_set(&domain->pt_root, root); + domain->pt_root = root; + + /* + * The new value needs to be gobally visible in case pt_root gets + * cleared, so that the page-table can be safely freed. + */ + smp_wmb(); } static void amd_iommu_domain_clr_pt_root(struct protection_domain *domain) -- 2.27.0