Message ID | 20250319173202.78988-5-shameerali.kolothum.thodi@huawei.com (mailing list archive) |
---|---|
State | New |
Headers | show |
Series | iommu/arm-smmu-v3: Use pinned KVM VMID for stage 2 | expand |
On Wed, Mar 19, 2025 at 05:32:01PM +0000, Shameer Kolothum wrote: > +static int arm_vsmmu_alloc_vmid(struct arm_smmu_device *smmu, struct kvm *kvm, > + bool *kvm_used) > +{ > +#ifdef CONFIG_KVM > + /* > + * There can only be one allocator for VMIDs active at once. If BTM is > + * turned on then KVM's allocator always supplies the VMID, and the > + * VMID is matched by CPU invalidation of the KVM S2. Right now there > + * is no API to get an unused VMID from KVM so this also means BTM systems > + * cannot support S2 without an associated KVM. > + */ > + if ((smmu->features & ARM_SMMU_FEAT_BTM)) { > + int vmid; > + > + if (!kvm || !kvm_get_kvm_safe(kvm)) > + return -EOPNOTSUPP; Isn't kvm_get_kvm_safe() in modular KVM code most of the time? You can't call it like this right? Per my prior comments, I'm a little nervous to make drivers keep track of this refcount instead of the core code but this does seem like it could work.. I also think you should block using the S2 without a viommu & KVM in BTM mode.. Maybe like this: @@ -2938,8 +2938,16 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) cdptr = arm_smmu_alloc_cd_ptr(master, IOMMU_NO_PASID); if (!cdptr) return -ENOMEM; - } else if (arm_smmu_ssids_in_use(&master->cd_table)) - return -EBUSY; + } else { + if (arm_smmu_ssids_in_use(&master->cd_table)) + return -EBUSY; + /* + * S2 cannot be used when BTM is turned on without a VIOMMU and + * VMID shared with KVM + */ + if (smmu->features & ARM_SMMU_FEAT_BTM) + return -EOPNOTSUPP; + } That more closely matches how this will eventually work when the VMID allocation is properly made to be local to the viommu. Jason
> -----Original Message----- > From: Jason Gunthorpe <jgg@ziepe.ca> > Sent: Wednesday, March 19, 2025 11:40 PM > To: Shameerali Kolothum Thodi <shameerali.kolothum.thodi@huawei.com> > Cc: kvmarm@lists.linux.dev; iommu@lists.linux.dev; linux-arm- > kernel@lists.infradead.org; Linuxarm <linuxarm@huawei.com>; > kevin.tian@intel.com; alex.williamson@redhat.com; maz@kernel.org; > oliver.upton@linux.dev; will@kernel.org; robin.murphy@arm.com; > nicolinc@nvidia.com; jean-philippe@linaro.org; Jonathan Cameron > <jonathan.cameron@huawei.com> > Subject: Re: [RFC PATCH v3 4/5] iommu/arm-smmu-v3-iommufd: Use KVM > VMID for s2 stage > > On Wed, Mar 19, 2025 at 05:32:01PM +0000, Shameer Kolothum wrote: > > +static int arm_vsmmu_alloc_vmid(struct arm_smmu_device *smmu, > struct kvm *kvm, > > + bool *kvm_used) > > +{ > > +#ifdef CONFIG_KVM > > + /* > > + * There can only be one allocator for VMIDs active at once. If BTM > is > > + * turned on then KVM's allocator always supplies the VMID, and > the > > + * VMID is matched by CPU invalidation of the KVM S2. Right now > there > > + * is no API to get an unused VMID from KVM so this also means > BTM systems > > + * cannot support S2 without an associated KVM. > > + */ > > + if ((smmu->features & ARM_SMMU_FEAT_BTM)) { > > + int vmid; > > + > > + if (!kvm || !kvm_get_kvm_safe(kvm)) > > + return -EOPNOTSUPP; > > Isn't kvm_get_kvm_safe() in modular KVM code most of the time? You can't > call it like this right? I think it is safe since KVM is not modular for ARM64. And that is one of the reasons I thought I will hold the KVM reference here as we don't have to go through the symbol_get/put calls here. Also IOMMUFD is not using the kvm pointer at the moment. Probably I should add some comments in IOMMUFD to make it clear. However I just realized that in patch #1 I should EXPORT the kvm_arm_pinned_vmid_get/put functions as smmuv3 driver can be built modular. > > Per my prior comments, I'm a little nervous to make drivers keep track > of this refcount instead of the core code but this does seem like it > could work.. > > I also think you should block using the S2 without a viommu & KVM in > BTM mode.. Maybe like this: > > @@ -2938,8 +2938,16 @@ static int arm_smmu_attach_dev(struct > iommu_domain *domain, struct device *dev) > cdptr = arm_smmu_alloc_cd_ptr(master, IOMMU_NO_PASID); > if (!cdptr) > return -ENOMEM; > - } else if (arm_smmu_ssids_in_use(&master->cd_table)) > - return -EBUSY; > + } else { > + if (arm_smmu_ssids_in_use(&master->cd_table)) > + return -EBUSY; > + /* > + * S2 cannot be used when BTM is turned on without a VIOMMU > and > + * VMID shared with KVM > + */ > + if (smmu->features & ARM_SMMU_FEAT_BTM) > + return -EOPNOTSUPP; > + } > > That more closely matches how this will eventually work when the VMID > allocation is properly made to be local to the viommu. Ok. Will update. Thanks, Shameer
On Thu, Mar 20, 2025 at 09:30:45AM +0000, Shameerali Kolothum Thodi wrote: > > Isn't kvm_get_kvm_safe() in modular KVM code most of the time? You can't > > call it like this right? > > I think it is safe since KVM is not modular for ARM64. And that is one of the > reasons I thought I will hold the KVM reference here as we don't have to go > through the symbol_get/put calls here. Also IOMMUFD is not using the kvm > pointer at the moment. Probably I should add some comments in IOMMUFD > to make it clear. Oh I didn't know that.. Interesting simplification > > That more closely matches how this will eventually work when the VMID > > allocation is properly made to be local to the viommu. > > Ok. Will update. You should also block creating a VIOMMU without a KVM for the same reason.. Really isolate the S2 to only being usable with the KVM shared VMID. Jason
diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3-iommufd.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3-iommufd.c index ee2fac5c899b..79fcb903741f 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3-iommufd.c +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3-iommufd.c @@ -3,6 +3,7 @@ * Copyright (c) 2024, NVIDIA CORPORATION & AFFILIATES */ +#include <linux/kvm_host.h> #include <uapi/linux/iommufd.h> #include "arm-smmu-v3.h" @@ -39,6 +40,48 @@ arm_smmu_get_msi_mapping_domain(struct iommu_domain *domain) return &nested_domain->vsmmu->s2_parent->domain; } +static int arm_vsmmu_alloc_vmid(struct arm_smmu_device *smmu, struct kvm *kvm, + bool *kvm_used) +{ +#ifdef CONFIG_KVM + /* + * There can only be one allocator for VMIDs active at once. If BTM is + * turned on then KVM's allocator always supplies the VMID, and the + * VMID is matched by CPU invalidation of the KVM S2. Right now there + * is no API to get an unused VMID from KVM so this also means BTM systems + * cannot support S2 without an associated KVM. + */ + if ((smmu->features & ARM_SMMU_FEAT_BTM)) { + int vmid; + + if (!kvm || !kvm_get_kvm_safe(kvm)) + return -EOPNOTSUPP; + vmid = kvm_arm_pinned_vmid_get(kvm); + if (vmid < 0) + kvm_put_kvm(kvm); + else + *kvm_used = true; + return vmid; + } +#endif + return ida_alloc_range(&smmu->vmid_map, 1, (1 << smmu->vmid_bits) - 1, + GFP_KERNEL); +} + +static void arm_vsmmu_free_vmid(struct arm_smmu_device *smmu, u16 vmid, + struct kvm *kvm) +{ +#ifdef CONFIG_KVM + if ((smmu->features & ARM_SMMU_FEAT_BTM)) { + if (kvm) { + kvm_arm_pinned_vmid_put(kvm); + return kvm_put_kvm(kvm); + } + } +#endif + ida_free(&smmu->vmid_map, vmid); +} + static void arm_vsmmu_destroy(struct iommufd_viommu *viommu) { struct arm_vsmmu *vsmmu = container_of(viommu, struct arm_vsmmu, core); @@ -53,7 +96,7 @@ static void arm_vsmmu_destroy(struct iommufd_viommu *viommu) list_del(&vsmmu->vsmmus_elm); spin_unlock_irqrestore(&vsmmu->s2_parent->vsmmus.lock, flags); arm_smmu_cmdq_issue_cmd_with_sync(smmu, &cmd); - ida_free(&smmu->vmid_map, vsmmu->vmid); + arm_vsmmu_free_vmid(smmu, vsmmu->vmid, vsmmu->kvm); } static void arm_smmu_make_nested_cd_table_ste( @@ -379,6 +422,7 @@ struct iommufd_viommu *arm_vsmmu_alloc(struct device *dev, iommu_get_iommu_dev(dev, struct arm_smmu_device, iommu); struct arm_smmu_master *master = dev_iommu_priv_get(dev); struct arm_smmu_domain *s2_parent = to_smmu_domain(parent); + bool kvm_used = false; struct arm_vsmmu *vsmmu; unsigned long flags; int vmid; @@ -409,21 +453,22 @@ struct iommufd_viommu *arm_vsmmu_alloc(struct device *dev, !(smmu->features & ARM_SMMU_FEAT_S2FWB)) return ERR_PTR(-EOPNOTSUPP); - vmid = ida_alloc_range(&smmu->vmid_map, 1, (1 << smmu->vmid_bits) - 1, - GFP_KERNEL); + vmid = arm_vsmmu_alloc_vmid(smmu, kvm, &kvm_used); if (vmid < 0) return ERR_PTR(vmid); vsmmu = iommufd_viommu_alloc(ictx, struct arm_vsmmu, core, &arm_vsmmu_ops); if (IS_ERR(vsmmu)) { - ida_free(&smmu->vmid_map, vmid); + arm_vsmmu_free_vmid(smmu, vmid, kvm); return ERR_CAST(vsmmu); } vsmmu->smmu = smmu; vsmmu->vmid = (u16)vmid; vsmmu->s2_parent = s2_parent; + if (kvm_used) + vsmmu->kvm = kvm; spin_lock_irqsave(&s2_parent->vsmmus.lock, flags); list_add_tail(&vsmmu->vsmmus_elm, &s2_parent->vsmmus.list); spin_unlock_irqrestore(&s2_parent->vsmmus.lock, flags); diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h index 9f49de52a700..5890c233f73b 100644 --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h @@ -1053,6 +1053,7 @@ struct arm_vsmmu { struct arm_smmu_device *smmu; struct arm_smmu_domain *s2_parent; u16 vmid; + struct kvm *kvm; struct list_head vsmmus_elm; /* arm_smmu_domain::vsmmus::list */ };
If kvm is available make use of kvm pinned VMID on BTM enabled systems to set the s2 stage VMID for nested domains. Signed-off-by: Shameer Kolothum <shameerali.kolothum.thodi@huawei.com> --- .../arm/arm-smmu-v3/arm-smmu-v3-iommufd.c | 53 +++++++++++++++++-- drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.h | 1 + 2 files changed, 50 insertions(+), 4 deletions(-)