Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v5.9-rc7 357 lines 9.5 kB view raw
1/* 2 * Copyright 2018 Advanced Micro Devices, Inc. 3 * 4 * Permission is hereby granted, free of charge, to any person obtaining a 5 * copy of this software and associated documentation files (the "Software"), 6 * to deal in the Software without restriction, including without limitation 7 * the rights to use, copy, modify, merge, publish, distribute, sublicense, 8 * and/or sell copies of the Software, and to permit persons to whom the 9 * Software is furnished to do so, subject to the following conditions: 10 * 11 * The above copyright notice and this permission notice shall be included in 12 * all copies or substantial portions of the Software. 13 * 14 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR 15 * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, 16 * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL 17 * THE COPYRIGHT HOLDER(S) OR AUTHOR(S) BE LIABLE FOR ANY CLAIM, DAMAGES OR 18 * OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, 19 * ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR 20 * OTHER DEALINGS IN THE SOFTWARE. 21 */ 22 23#include <linux/printk.h> 24#include <linux/device.h> 25#include <linux/slab.h> 26#include <linux/pci.h> 27#include <linux/amd-iommu.h> 28#include "kfd_priv.h" 29#include "kfd_dbgmgr.h" 30#include "kfd_topology.h" 31#include "kfd_iommu.h" 32 33static const u32 required_iommu_flags = AMD_IOMMU_DEVICE_FLAG_ATS_SUP | 34 AMD_IOMMU_DEVICE_FLAG_PRI_SUP | 35 AMD_IOMMU_DEVICE_FLAG_PASID_SUP; 36 37/** kfd_iommu_check_device - Check whether IOMMU is available for device 38 */ 39int kfd_iommu_check_device(struct kfd_dev *kfd) 40{ 41 struct amd_iommu_device_info iommu_info; 42 int err; 43 44 if (!kfd->device_info->needs_iommu_device) 45 return -ENODEV; 46 47 iommu_info.flags = 0; 48 err = amd_iommu_device_info(kfd->pdev, &iommu_info); 49 if (err) 50 return err; 51 52 if ((iommu_info.flags & required_iommu_flags) != required_iommu_flags) 53 return -ENODEV; 54 55 return 0; 56} 57 58/** kfd_iommu_device_init - Initialize IOMMU for device 59 */ 60int kfd_iommu_device_init(struct kfd_dev *kfd) 61{ 62 struct amd_iommu_device_info iommu_info; 63 unsigned int pasid_limit; 64 int err; 65 66 if (!kfd->device_info->needs_iommu_device) 67 return 0; 68 69 iommu_info.flags = 0; 70 err = amd_iommu_device_info(kfd->pdev, &iommu_info); 71 if (err < 0) { 72 dev_err(kfd_device, 73 "error getting iommu info. is the iommu enabled?\n"); 74 return -ENODEV; 75 } 76 77 if ((iommu_info.flags & required_iommu_flags) != required_iommu_flags) { 78 dev_err(kfd_device, 79 "error required iommu flags ats %i, pri %i, pasid %i\n", 80 (iommu_info.flags & AMD_IOMMU_DEVICE_FLAG_ATS_SUP) != 0, 81 (iommu_info.flags & AMD_IOMMU_DEVICE_FLAG_PRI_SUP) != 0, 82 (iommu_info.flags & AMD_IOMMU_DEVICE_FLAG_PASID_SUP) 83 != 0); 84 return -ENODEV; 85 } 86 87 pasid_limit = min_t(unsigned int, 88 (unsigned int)(1 << kfd->device_info->max_pasid_bits), 89 iommu_info.max_pasids); 90 91 if (!kfd_set_pasid_limit(pasid_limit)) { 92 dev_err(kfd_device, "error setting pasid limit\n"); 93 return -EBUSY; 94 } 95 96 return 0; 97} 98 99/** kfd_iommu_bind_process_to_device - Have the IOMMU bind a process 100 * 101 * Binds the given process to the given device using its PASID. This 102 * enables IOMMUv2 address translation for the process on the device. 103 * 104 * This function assumes that the process mutex is held. 105 */ 106int kfd_iommu_bind_process_to_device(struct kfd_process_device *pdd) 107{ 108 struct kfd_dev *dev = pdd->dev; 109 struct kfd_process *p = pdd->process; 110 int err; 111 112 if (!dev->device_info->needs_iommu_device || pdd->bound == PDD_BOUND) 113 return 0; 114 115 if (unlikely(pdd->bound == PDD_BOUND_SUSPENDED)) { 116 pr_err("Binding PDD_BOUND_SUSPENDED pdd is unexpected!\n"); 117 return -EINVAL; 118 } 119 120 err = amd_iommu_bind_pasid(dev->pdev, p->pasid, p->lead_thread); 121 if (!err) 122 pdd->bound = PDD_BOUND; 123 124 return err; 125} 126 127/** kfd_iommu_unbind_process - Unbind process from all devices 128 * 129 * This removes all IOMMU device bindings of the process. To be used 130 * before process termination. 131 */ 132void kfd_iommu_unbind_process(struct kfd_process *p) 133{ 134 struct kfd_process_device *pdd; 135 136 list_for_each_entry(pdd, &p->per_device_data, per_device_list) 137 if (pdd->bound == PDD_BOUND) 138 amd_iommu_unbind_pasid(pdd->dev->pdev, p->pasid); 139} 140 141/* Callback for process shutdown invoked by the IOMMU driver */ 142static void iommu_pasid_shutdown_callback(struct pci_dev *pdev, int pasid) 143{ 144 struct kfd_dev *dev = kfd_device_by_pci_dev(pdev); 145 struct kfd_process *p; 146 struct kfd_process_device *pdd; 147 148 if (!dev) 149 return; 150 151 /* 152 * Look for the process that matches the pasid. If there is no such 153 * process, we either released it in amdkfd's own notifier, or there 154 * is a bug. Unfortunately, there is no way to tell... 155 */ 156 p = kfd_lookup_process_by_pasid(pasid); 157 if (!p) 158 return; 159 160 pr_debug("Unbinding process 0x%x from IOMMU\n", pasid); 161 162 mutex_lock(kfd_get_dbgmgr_mutex()); 163 164 if (dev->dbgmgr && dev->dbgmgr->pasid == p->pasid) { 165 if (!kfd_dbgmgr_unregister(dev->dbgmgr, p)) { 166 kfd_dbgmgr_destroy(dev->dbgmgr); 167 dev->dbgmgr = NULL; 168 } 169 } 170 171 mutex_unlock(kfd_get_dbgmgr_mutex()); 172 173 mutex_lock(&p->mutex); 174 175 pdd = kfd_get_process_device_data(dev, p); 176 if (pdd) 177 /* For GPU relying on IOMMU, we need to dequeue here 178 * when PASID is still bound. 179 */ 180 kfd_process_dequeue_from_device(pdd); 181 182 mutex_unlock(&p->mutex); 183 184 kfd_unref_process(p); 185} 186 187/* This function called by IOMMU driver on PPR failure */ 188static int iommu_invalid_ppr_cb(struct pci_dev *pdev, int pasid, 189 unsigned long address, u16 flags) 190{ 191 struct kfd_dev *dev; 192 193 dev_warn_ratelimited(kfd_device, 194 "Invalid PPR device %x:%x.%x pasid 0x%x address 0x%lX flags 0x%X", 195 pdev->bus->number, 196 PCI_SLOT(pdev->devfn), 197 PCI_FUNC(pdev->devfn), 198 pasid, 199 address, 200 flags); 201 202 dev = kfd_device_by_pci_dev(pdev); 203 if (!WARN_ON(!dev)) 204 kfd_signal_iommu_event(dev, pasid, address, 205 flags & PPR_FAULT_WRITE, flags & PPR_FAULT_EXEC); 206 207 return AMD_IOMMU_INV_PRI_RSP_INVALID; 208} 209 210/* 211 * Bind processes do the device that have been temporarily unbound 212 * (PDD_BOUND_SUSPENDED) in kfd_unbind_processes_from_device. 213 */ 214static int kfd_bind_processes_to_device(struct kfd_dev *kfd) 215{ 216 struct kfd_process_device *pdd; 217 struct kfd_process *p; 218 unsigned int temp; 219 int err = 0; 220 221 int idx = srcu_read_lock(&kfd_processes_srcu); 222 223 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 224 mutex_lock(&p->mutex); 225 pdd = kfd_get_process_device_data(kfd, p); 226 227 if (WARN_ON(!pdd) || pdd->bound != PDD_BOUND_SUSPENDED) { 228 mutex_unlock(&p->mutex); 229 continue; 230 } 231 232 err = amd_iommu_bind_pasid(kfd->pdev, p->pasid, 233 p->lead_thread); 234 if (err < 0) { 235 pr_err("Unexpected pasid 0x%x binding failure\n", 236 p->pasid); 237 mutex_unlock(&p->mutex); 238 break; 239 } 240 241 pdd->bound = PDD_BOUND; 242 mutex_unlock(&p->mutex); 243 } 244 245 srcu_read_unlock(&kfd_processes_srcu, idx); 246 247 return err; 248} 249 250/* 251 * Mark currently bound processes as PDD_BOUND_SUSPENDED. These 252 * processes will be restored to PDD_BOUND state in 253 * kfd_bind_processes_to_device. 254 */ 255static void kfd_unbind_processes_from_device(struct kfd_dev *kfd) 256{ 257 struct kfd_process_device *pdd; 258 struct kfd_process *p; 259 unsigned int temp; 260 261 int idx = srcu_read_lock(&kfd_processes_srcu); 262 263 hash_for_each_rcu(kfd_processes_table, temp, p, kfd_processes) { 264 mutex_lock(&p->mutex); 265 pdd = kfd_get_process_device_data(kfd, p); 266 267 if (WARN_ON(!pdd)) { 268 mutex_unlock(&p->mutex); 269 continue; 270 } 271 272 if (pdd->bound == PDD_BOUND) 273 pdd->bound = PDD_BOUND_SUSPENDED; 274 mutex_unlock(&p->mutex); 275 } 276 277 srcu_read_unlock(&kfd_processes_srcu, idx); 278} 279 280/** kfd_iommu_suspend - Prepare IOMMU for suspend 281 * 282 * This unbinds processes from the device and disables the IOMMU for 283 * the device. 284 */ 285void kfd_iommu_suspend(struct kfd_dev *kfd) 286{ 287 if (!kfd->device_info->needs_iommu_device) 288 return; 289 290 kfd_unbind_processes_from_device(kfd); 291 292 amd_iommu_set_invalidate_ctx_cb(kfd->pdev, NULL); 293 amd_iommu_set_invalid_ppr_cb(kfd->pdev, NULL); 294 amd_iommu_free_device(kfd->pdev); 295} 296 297/** kfd_iommu_resume - Restore IOMMU after resume 298 * 299 * This reinitializes the IOMMU for the device and re-binds previously 300 * suspended processes to the device. 301 */ 302int kfd_iommu_resume(struct kfd_dev *kfd) 303{ 304 unsigned int pasid_limit; 305 int err; 306 307 if (!kfd->device_info->needs_iommu_device) 308 return 0; 309 310 pasid_limit = kfd_get_pasid_limit(); 311 312 err = amd_iommu_init_device(kfd->pdev, pasid_limit); 313 if (err) 314 return -ENXIO; 315 316 amd_iommu_set_invalidate_ctx_cb(kfd->pdev, 317 iommu_pasid_shutdown_callback); 318 amd_iommu_set_invalid_ppr_cb(kfd->pdev, 319 iommu_invalid_ppr_cb); 320 321 err = kfd_bind_processes_to_device(kfd); 322 if (err) { 323 amd_iommu_set_invalidate_ctx_cb(kfd->pdev, NULL); 324 amd_iommu_set_invalid_ppr_cb(kfd->pdev, NULL); 325 amd_iommu_free_device(kfd->pdev); 326 return err; 327 } 328 329 return 0; 330} 331 332extern bool amd_iommu_pc_supported(void); 333extern u8 amd_iommu_pc_get_max_banks(u16 devid); 334extern u8 amd_iommu_pc_get_max_counters(u16 devid); 335 336/** kfd_iommu_add_perf_counters - Add IOMMU performance counters to topology 337 */ 338int kfd_iommu_add_perf_counters(struct kfd_topology_device *kdev) 339{ 340 struct kfd_perf_properties *props; 341 342 if (!(kdev->node_props.capability & HSA_CAP_ATS_PRESENT)) 343 return 0; 344 345 if (!amd_iommu_pc_supported()) 346 return 0; 347 348 props = kfd_alloc_struct(props); 349 if (!props) 350 return -ENOMEM; 351 strcpy(props->block_name, "iommu"); 352 props->max_concurrent = amd_iommu_pc_get_max_banks(0) * 353 amd_iommu_pc_get_max_counters(0); /* assume one iommu */ 354 list_add_tail(&props->list, &kdev->perf_props); 355 356 return 0; 357}