Received: by 2002:a05:7412:8d1c:b0:fa:4c10:6cad with SMTP id bj28csp263147rdb; Wed, 17 Jan 2024 00:43:04 -0800 (PST) X-Google-Smtp-Source: AGHT+IHkZeT5fakYa7iSYfhk6k2p9J9GKupp/1gBjtS0Sb3qOK2yV2e5AWBawP5U0BuPCWUeCWNL X-Received: by 2002:a17:902:ff02:b0:1d4:c98a:2ceb with SMTP id f2-20020a170902ff0200b001d4c98a2cebmr4827841plj.8.1705480984505; Wed, 17 Jan 2024 00:43:04 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1705480984; cv=pass; d=google.com; s=arc-20160816; b=VBCJxoAFVTm9iJ0psI/bA1h7FM9PCfh5DAIXC8Kk2rh/uuMe2/UnIfbBr5aRKB5vyY QSbyH8rookm/rDBNDv6ge9jmnb8EguESu0jZ/asT6nBiR+pPUzLKCULZ/S21l0ZFAIYj gmUwfUZhH2sNRk1H3Lx+0a6yyl43jNIMnabBtjTMG1EUaCb0gB9/b2n8oAl9xqMlwW1M mLxFt5wtnV5CnWYHIYRd6lPyRoyjrv/gEqNVmeFIfhmdT7QsOoz3BMeTho5VR/X2CKq8 hsTU1bcoIS+f0YDLvO61UnjOBpf7k4Hs45bGwbQt9tme+FuThcbM3Agv84RClDRCl9ku pK0g== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:date:message-id; bh=3R3IeIcuKUI/UE8wSgcqCtSHu1Ansmkp+mLbX7nXB4I=; fh=plsn4hyjSctsgWtKXUSe6pL0dvqJ3yBc4Uk6X2Cl6iE=; b=0WqJagrbikOH0C6B4Y15NdM+HcgGFSYhHG3pj6RHNeJMxb5a4VvwxgdvrNeuCzZDGt R7orww36i7ODRoTKHPle7dxBGHYizv6yanVZGDTXLqh25EviST0XJGjD5YOpKiZTTlad t9LybLMsEDr0lPVizKczVQzvwwZged+BUaVOX/rHBu/sSLhTB0H3e0ywSE/HCAOvAZzb nv6rZ4xKUYnAr92TlC0GpBa1DFMy5NcLyAjkOdEZ9+aJAtvMGEQ2X/Yh7dpPDO/t+hBK Uwm9fr5Al4KmNmZMkZZf1KO2BpYG8P5jV7asWlmcZpv5xCGfocAf2rGc0J8BrlGIiCH6 IQgQ== ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=ghiti.fr); spf=pass (google.com: domain of linux-kernel+bounces-28656-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-28656-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [139.178.88.99]) by mx.google.com with ESMTPS id n18-20020a170903111200b001d37632b6a4si14504752plh.518.2024.01.17.00.43.04 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 17 Jan 2024 00:43:04 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-28656-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) client-ip=139.178.88.99; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=ghiti.fr); spf=pass (google.com: domain of linux-kernel+bounces-28656-linux.lists.archive=gmail.com@vger.kernel.org designates 139.178.88.99 as permitted sender) smtp.mailfrom="linux-kernel+bounces-28656-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 29E86287DE1 for ; Wed, 17 Jan 2024 08:43:04 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 6EF8912B74; Wed, 17 Jan 2024 08:42:58 +0000 (UTC) Received: from relay6-d.mail.gandi.net (relay6-d.mail.gandi.net [217.70.183.198]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A16F7B660; Wed, 17 Jan 2024 08:42:53 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=217.70.183.198 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705480977; cv=none; b=OfkqDngf+yjQCY8EPbZBTBGkTWBe0fzimcKkYq5RCEedRo1QdcwkGyvd2l4OCspPiLUpynIkuwyRpHfcFTSGaiTMKCkXlnYJjes/Gh4vLHM/weLspcH5Fy3BwUv/RGHRE18eN0xoozIS3Y0IoP0HXf2KhkBMFNXIpLpg2bFhOXg= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1705480977; c=relaxed/simple; bh=65rm1L1W4mbegq5kIb/sp8DZa7iInALT+eelOlbNwtE=; h=Received:Message-ID:Date:MIME-Version:User-Agent:Subject: Content-Language:To:Cc:References:From:In-Reply-To:Content-Type: Content-Transfer-Encoding:X-GND-Sasl; b=t9A1ChTgMNFCtIldA4HXKRSLrHTB4QWW/IvbfQfFYF32gKffed5Cg5PWI1Luf0hRbrQymwpxn+aTa2WfcCRn9VUm9hLP6bcUuU2vfzd5hD2F1pauUZ01J8dAvH60k3aerQYVPkyZCBgpj8P679dS+rppM3Wrccip2gNmwByREg0= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=ghiti.fr; spf=pass smtp.mailfrom=ghiti.fr; arc=none smtp.client-ip=217.70.183.198 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=ghiti.fr Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=ghiti.fr Received: by mail.gandi.net (Postfix) with ESMTPSA id D0A37C000C; Wed, 17 Jan 2024 08:42:43 +0000 (UTC) Message-ID: Date: Wed, 17 Jan 2024 09:42:43 +0100 Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v8 1/2] riscv: Include riscv_set_icache_flush_ctx prctl Content-Language: en-US To: Charlie Jenkins , Paul Walmsley , Palmer Dabbelt , Albert Ou , Jonathan Corbet , Conor Dooley , =?UTF-8?B?Q2zDqW1lbnQgTMOpZ2Vy?= , Atish Patra , Randy Dunlap Cc: linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org, linux-doc@vger.kernel.org, Atish Patra References: <20240116-fencei-v8-0-43a42134f021@rivosinc.com> <20240116-fencei-v8-1-43a42134f021@rivosinc.com> From: Alexandre Ghiti In-Reply-To: <20240116-fencei-v8-1-43a42134f021@rivosinc.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-GND-Sasl: alex@ghiti.fr Hi Charlie, On 17/01/2024 03:54, Charlie Jenkins wrote: > Support new prctl with key PR_RISCV_SET_ICACHE_FLUSH_CTX to enable > optimization of cross modifying code. This prctl enables userspace code > to use icache flushing instructions such as fence.i with the guarantee > that the icache will continue to be clean after thread migration. > > Signed-off-by: Charlie Jenkins > Reviewed-by: Atish Patra > --- > arch/riscv/include/asm/mmu.h | 4 +++ > arch/riscv/include/asm/mmu_context.h | 3 ++ > arch/riscv/include/asm/processor.h | 7 ++++ > arch/riscv/include/asm/switch_to.h | 17 +++++++++ > arch/riscv/mm/cacheflush.c | 67 ++++++++++++++++++++++++++++++++++++ > arch/riscv/mm/context.c | 14 ++++++-- > include/uapi/linux/prctl.h | 6 ++++ > kernel/sys.c | 6 ++++ > 8 files changed, 121 insertions(+), 3 deletions(-) > > diff --git a/arch/riscv/include/asm/mmu.h b/arch/riscv/include/asm/mmu.h > index 355504b37f8e..f437b9a7f5b3 100644 > --- a/arch/riscv/include/asm/mmu.h > +++ b/arch/riscv/include/asm/mmu.h > @@ -19,6 +19,10 @@ typedef struct { > #ifdef CONFIG_SMP > /* A local icache flush is needed before user execution can resume. */ > cpumask_t icache_stale_mask; > + /* Force local icache flush on all migrations. */ > + bool force_icache_flush; > + /* The most recent cpu a thread in this mm has been migrated to. */ > + unsigned int prev_cpu; Why would we need a prev_cpu on mm? Why don't we only need to have a prev_cpu per thread, i.e. per task_struct? It makes little sense to me to have that on mm since it's shared by multiple threads (by definition), so the prev_cpu on mm could be anything. > #endif > #ifdef CONFIG_BINFMT_ELF_FDPIC > unsigned long exec_fdpic_loadmap; > diff --git a/arch/riscv/include/asm/mmu_context.h b/arch/riscv/include/asm/mmu_context.h > index 7030837adc1a..195a2e90f3f9 100644 > --- a/arch/riscv/include/asm/mmu_context.h > +++ b/arch/riscv/include/asm/mmu_context.h > @@ -29,6 +29,9 @@ static inline int init_new_context(struct task_struct *tsk, > { > #ifdef CONFIG_MMU > atomic_long_set(&mm->context.id, 0); > +#endif > +#ifdef CONFIG_SMP > + mm->context.prev_cpu = tsk->thread.prev_cpu; > #endif > return 0; > } > diff --git a/arch/riscv/include/asm/processor.h b/arch/riscv/include/asm/processor.h > index f19f861cda54..1cad05f579ad 100644 > --- a/arch/riscv/include/asm/processor.h > +++ b/arch/riscv/include/asm/processor.h > @@ -84,6 +84,10 @@ struct thread_struct { > unsigned long vstate_ctrl; > struct __riscv_v_ext_state vstate; > unsigned long align_ctl; > +#ifdef CONFIG_SMP > + bool force_icache_flush; > + unsigned int prev_cpu; > +#endif > }; > > /* Whitelist the fstate from the task_struct for hardened usercopy */ > @@ -145,6 +149,9 @@ extern int set_unalign_ctl(struct task_struct *tsk, unsigned int val); > #define GET_UNALIGN_CTL(tsk, addr) get_unalign_ctl((tsk), (addr)) > #define SET_UNALIGN_CTL(tsk, val) set_unalign_ctl((tsk), (val)) > > +#define RISCV_SET_ICACHE_FLUSH_CTX(arg1, arg2) riscv_set_icache_flush_ctx(arg1, arg2) > +extern int riscv_set_icache_flush_ctx(unsigned long ctx, unsigned long per_thread); > + > #endif /* __ASSEMBLY__ */ > > #endif /* _ASM_RISCV_PROCESSOR_H */ > diff --git a/arch/riscv/include/asm/switch_to.h b/arch/riscv/include/asm/switch_to.h > index f90d8e42f3c7..6a94431dc193 100644 > --- a/arch/riscv/include/asm/switch_to.h > +++ b/arch/riscv/include/asm/switch_to.h > @@ -8,6 +8,7 @@ > > #include > #include > +#include > #include > #include > #include > @@ -73,6 +74,17 @@ static __always_inline bool has_fpu(void) { return false; } > extern struct task_struct *__switch_to(struct task_struct *, > struct task_struct *); > > +static inline bool switch_to_should_flush_icache(struct task_struct *task) > +{ > + unsigned int cpu = smp_processor_id(); > + bool stale_mm = task->mm && (task->mm->context.force_icache_flush && > + (cpu != task->mm->context.prev_cpu)); > + bool stale_thread = task->thread.force_icache_flush && > + (cpu != task->thread.prev_cpu); > + > + return stale_mm || stale_thread; Here the test would become: return ((task->mm && task->mm->context.force_icache_flush) || task->thread.force_icache_flush) && (cpu != task->thread.prev_cpu); And do we really need to check task->mm is not null? > +} > + > #define switch_to(prev, next, last) \ > do { \ > struct task_struct *__prev = (prev); \ > @@ -81,7 +93,12 @@ do { \ > __switch_to_fpu(__prev, __next); \ > if (has_vector()) \ > __switch_to_vector(__prev, __next); \ > + if (switch_to_should_flush_icache(__next)) \ > + local_flush_icache_all(); \ > ((last) = __switch_to(__prev, __next)); \ > + __next->thread.prev_cpu = smp_processor_id(); \ > + if (__next->mm) \ > + __next->mm->context.prev_cpu = smp_processor_id(); \ > } while (0) And just to make sure I understand this: you moved the test in switch_to() because 2 threads with the same mm could be scheduled one after the other on the same cpu and then switch_mm() would not be called? > > #endif /* _ASM_RISCV_SWITCH_TO_H */ > diff --git a/arch/riscv/mm/cacheflush.c b/arch/riscv/mm/cacheflush.c > index 55a34f2020a8..ff545f19f07a 100644 > --- a/arch/riscv/mm/cacheflush.c > +++ b/arch/riscv/mm/cacheflush.c > @@ -5,6 +5,7 @@ > > #include > #include > +#include > #include > #include > > @@ -152,3 +153,69 @@ void __init riscv_init_cbo_blocksizes(void) > if (cboz_block_size) > riscv_cboz_block_size = cboz_block_size; > } > + > +/** > + * riscv_set_icache_flush_ctx() - Enable/disable icache flushing instructions in > + * userspace. > + * @ctx: Set the type of icache flushing instructions permitted/prohibited in > + * userspace. Supported values described below. > + * > + * Supported values for ctx: > + * > + * * %PR_RISCV_CTX_SW_FENCEI_ON: Allow fence.i in userspace. > + * > + * * %PR_RISCV_CTX_SW_FENCEI_OFF: Disallow fence.i in userspace. When ``scope == > + * PR_RISCV_SCOPE_PER_PROCESS``, this will effect all threads in a process. > + * Therefore, caution must be taken -- only use this flag when you can > + * guarantee that no thread in the process will emit fence.i from this point > + * onward. > + * > + * @scope: Set scope of where icache flushing instructions are allowed to be > + * emitted. Supported values described below. > + * > + * Supported values for scope: > + * > + * * PR_RISCV_SCOPE_PER_PROCESS: Ensure the icache of any thread in this process > + * is coherent with instruction storage upon > + * migration. > + * > + * * PR_RISCV_SCOPE_PER_THREAD: Ensure the icache of the current thread is > + * coherent with instruction storage upon > + * migration. > + * > + * When ``scope == PR_RISCV_SCOPE_PER_PROCESS``, all threads in the process are > + * permitted to emit icache flushing instructions. Whenever any thread in the > + * process is migrated, the corresponding hart's icache will be guaranteed to be > + * consistent with instruction storage. Note this does not enforce any > + * guarantees outside of migration. If a thread modifies an instruction that > + * another thread may attempt to execute, the other thread must still emit an > + * icache flushing instruction before attempting to execute the potentially > + * modified instruction. This must be performed by the userspace program. > + * > + * In per-thread context (eg. ``scope == PR_RISCV_SCOPE_PER_THREAD``), only the > + * thread calling this function is permitted to emit icache flushing > + * instructions. When the thread is migrated, the corresponding hart's icache > + * will be guaranteed to be consistent with instruction storage. > + * > + * On kernels configured without SMP, this function is a nop as migrations > + * across harts will not occur. > + */ > +int riscv_set_icache_flush_ctx(unsigned long ctx, unsigned long scope) > +{ > +#ifdef CONFIG_SMP > + switch (ctx) { > + case PR_RISCV_CTX_SW_FENCEI_ON: > + switch (scope) { > + case PR_RISCV_SCOPE_PER_PROCESS: > + current->mm->context.force_icache_flush = true; > + break; > + case PR_RISCV_SCOPE_PER_THREAD: > + current->thread.force_icache_flush = true; > + break; > + default: > + return -EINVAL; > + } > + } > +#endif > + return 0; > +} > diff --git a/arch/riscv/mm/context.c b/arch/riscv/mm/context.c > index 217fd4de6134..b059dc0fae91 100644 > --- a/arch/riscv/mm/context.c > +++ b/arch/riscv/mm/context.c > @@ -15,6 +15,7 @@ > #include > #include > #include > +#include > > #ifdef CONFIG_MMU > > @@ -297,19 +298,26 @@ static inline void set_mm(struct mm_struct *prev, > * > * The "cpu" argument must be the current local CPU number. > */ > -static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu) > +static inline void flush_icache_deferred(struct mm_struct *mm, unsigned int cpu, > + struct task_struct *task) > { > #ifdef CONFIG_SMP > cpumask_t *mask = &mm->context.icache_stale_mask; > > if (cpumask_test_cpu(cpu, mask)) { > cpumask_clear_cpu(cpu, mask); > + > /* > * Ensure the remote hart's writes are visible to this hart. > * This pairs with a barrier in flush_icache_mm. > */ > smp_mb(); > - local_flush_icache_all(); > + > + /* > + * If cache will be flushed in switch_to, no need to flush here. > + */ > + if (!(task && switch_to_should_flush_icache(task))) > + local_flush_icache_all(); > } > > #endif > @@ -332,5 +340,5 @@ void switch_mm(struct mm_struct *prev, struct mm_struct *next, > > set_mm(prev, next, cpu); > > - flush_icache_deferred(next, cpu); > + flush_icache_deferred(next, cpu, task); > } > diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h > index 370ed14b1ae0..524d546d697b 100644 > --- a/include/uapi/linux/prctl.h > +++ b/include/uapi/linux/prctl.h > @@ -306,4 +306,10 @@ struct prctl_mm_map { > # define PR_RISCV_V_VSTATE_CTRL_NEXT_MASK 0xc > # define PR_RISCV_V_VSTATE_CTRL_MASK 0x1f > > +#define PR_RISCV_SET_ICACHE_FLUSH_CTX 71 > +# define PR_RISCV_CTX_SW_FENCEI_ON 0 > +# define PR_RISCV_CTX_SW_FENCEI_OFF 1 > +# define PR_RISCV_SCOPE_PER_PROCESS 0 > +# define PR_RISCV_SCOPE_PER_THREAD 1 > + > #endif /* _LINUX_PRCTL_H */ > diff --git a/kernel/sys.c b/kernel/sys.c > index 420d9cb9cc8e..e806a8a67c36 100644 > --- a/kernel/sys.c > +++ b/kernel/sys.c > @@ -146,6 +146,9 @@ > #ifndef RISCV_V_GET_CONTROL > # define RISCV_V_GET_CONTROL() (-EINVAL) > #endif > +#ifndef RISCV_SET_ICACHE_FLUSH_CTX > +# define RISCV_SET_ICACHE_FLUSH_CTX(a, b) (-EINVAL) > +#endif > > /* > * this is where the system-wide overflow UID and GID are defined, for > @@ -2739,6 +2742,9 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, > case PR_RISCV_V_GET_CONTROL: > error = RISCV_V_GET_CONTROL(); > break; > + case PR_RISCV_SET_ICACHE_FLUSH_CTX: > + error = RISCV_SET_ICACHE_FLUSH_CTX(arg2, arg3); > + break; > default: > error = -EINVAL; > break; >