Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp3010968imm; Sun, 5 Aug 2018 18:34:04 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfmcrMzXQCMf6+gLyYRj9/fSdY3ucSFHvCW75IUttO1+YBykkgiCazqDinDaok1ox4vdr4f X-Received: by 2002:a62:4bc6:: with SMTP id d67-v6mr14729868pfj.175.1533519244324; Sun, 05 Aug 2018 18:34:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1533519244; cv=none; d=google.com; s=arc-20160816; b=Lv2w2BMQHuirJLX0GJm0axnc2Usrzvbr78fhK+oxx+ZKDYU6Hz02bSbi3ug4EvIPXW WAhisxYiFGx/srr6URQ2OKWyc2zC6ZqGPh9RqAzKrfTSiunlEnOWT6Cc8siP8fIK5QJU AAVmhW+RtW15gHE+X92XAFUv+cHYG0c5XJSEZXEOdIH050cGLw/KXOWKMZHPAqO/R3KD XlvOhxkzvnInZNVyvAsND5O0vGUBuHvIvSpPZb7beFuOowtY+YDjtCDK3dtvKAURgdt6 VEhx3v1Ra7/N0G9kgviFhwEy8rMEGdXLzNdo2BfriIc9iyJCTTn/zTSXcgqyZd2Xf6g7 WYsw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:content-transfer-encoding :content-language:accept-language:references:message-id:date :thread-index:thread-topic:subject:to:from :arc-authentication-results; bh=hsibh03jhAgGeFgwnhfScrktHrmf94riZQUdUiid/HU=; b=H7/tmg6Rxu6/81ruZhRhjqkv11KjKngWGL/MW0qd6zwXpEiK8U76mpO5gCA0PM3Pqx vsWtMh9xGpvaM7efJ2BRw7rFvrkXu/D8c4ydkHIjlIhGr04K7gzeYMysbjsCfsozg8rK YO95MCVeHv5dILX9XUEBYNh7NWdXRE20gs6S635NBYWadbWw/L3TrupAB1MyhUBtx88R 9AeYRnTeT6iRCWUR6z4LQwjhkJt5hrdjqM5vfTwnHXw0DhDYn3C9B54JqD3yUEgmkjiQ j9KT7YTsbzRo9tbA7gATuTH4OvApo/IHl1uyoxTzuUmFGoTLYmf3NiYpcotI2VeukC/P jSTQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t24-v6si11040247pgm.106.2018.08.05.18.33.49; Sun, 05 Aug 2018 18:34:04 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727411AbeHFDjl convert rfc822-to-8bit (ORCPT + 99 others); Sun, 5 Aug 2018 23:39:41 -0400 Received: from mx01.hxt-semitech.com.96.203.223.in-addr.arpa ([223.203.96.7]:60364 "EHLO barracuda.hxt-semitech.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1727009AbeHFDjl (ORCPT ); Sun, 5 Aug 2018 23:39:41 -0400 X-ASG-Debug-ID: 1533519172-093b7e119e81b40001-xx1T2L Received: from HXTBJIDCEMVIW01.hxtcorp.net ([10.128.0.14]) by barracuda.hxt-semitech.com with ESMTP id 37TGAj3GUChG9yOD (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 06 Aug 2018 09:32:52 +0800 (CST) X-Barracuda-Envelope-From: shunyong.yang@hxt-semitech.com Received: from HXTBJIDCEMVIW01.hxtcorp.net (10.128.0.14) by HXTBJIDCEMVIW01.hxtcorp.net (10.128.0.14) with Microsoft SMTP Server (TLS) id 15.0.847.32; Mon, 6 Aug 2018 09:32:57 +0800 Received: from HXTBJIDCEMVIW01.hxtcorp.net ([fe80::f451:a443:c0b5:87d1]) by HXTBJIDCEMVIW01.hxtcorp.net ([fe80::f451:a443:c0b5:87d1%12]) with mapi id 15.00.0847.030; Mon, 6 Aug 2018 09:32:45 +0800 From: "Yang, Shunyong" To: Robin Murphy , "Leizhen (ThunderTown)" , Jean-Philippe Brucker , Will Deacon , "Joerg Roedel" , linux-arm-kernel , iommu , linux-kernel Subject: Re: [PATCH v3 4/6] iommu/io-pgtable-arm: add support for non-strict mode Thread-Topic: [PATCH v3 4/6] iommu/io-pgtable-arm: add support for non-strict mode X-ASG-Orig-Subj: Re: [PATCH v3 4/6] iommu/io-pgtable-arm: add support for non-strict mode Thread-Index: AQHULSVfvpgJoo0nvEihhr7Wc+EfZw== Date: Mon, 6 Aug 2018 01:32:44 +0000 Message-ID: <1d24541340334954969c58980ef85444@HXTBJIDCEMVIW01.hxtcorp.net> References: <1531376312-2192-1-git-send-email-thunder.leizhen@huawei.com> <1531376312-2192-5-git-send-email-thunder.leizhen@huawei.com> <89cc2201-99ab-3f3b-a2d1-1766515d4375@arm.com> <5B597628.2020103@huawei.com> <04239cfa-bcf2-a33a-e662-ebc75e66782b@arm.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.64.6.62] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 8BIT MIME-Version: 1.0 X-Barracuda-Connect: UNKNOWN[10.128.0.14] X-Barracuda-Start-Time: 1533519172 X-Barracuda-Encrypted: ECDHE-RSA-AES256-SHA X-Barracuda-URL: https://192.168.50.101:443/cgi-mod/mark.cgi X-Virus-Scanned: by bsmtpd at hxt-semitech.com X-Barracuda-BRTS-Status: 1 X-Barracuda-Bayes: INNOCENT GLOBAL 0.5884 1.0000 0.7500 X-Barracuda-Spam-Score: 0.75 X-Barracuda-Spam-Status: No, SCORE=0.75 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests= X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.3.55114 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, Robin, On 2018/7/26 22:37, Robin Murphy wrote: > On 2018-07-26 8:20 AM, Leizhen (ThunderTown) wrote: >> On 2018/7/25 6:25, Robin Murphy wrote: >>> On 2018-07-12 7:18 AM, Zhen Lei wrote: >>>> To support the non-strict mode, now we only tlbi and sync for the strict >>>> mode. But for the non-leaf case, always follow strict mode. >>>> >>>> Use the lowest bit of the iova parameter to pass the strict mode: >>>> 0, IOMMU_STRICT; >>>> 1, IOMMU_NON_STRICT; >>>> Treat 0 as IOMMU_STRICT, so that the unmap operation can compatible with >>>> other IOMMUs which still use strict mode. >>>> >>>> Signed-off-by: Zhen Lei >>>> --- >>>> drivers/iommu/io-pgtable-arm.c | 23 ++++++++++++++--------- >>>> 1 file changed, 14 insertions(+), 9 deletions(-) >>>> >>>> diff --git a/drivers/iommu/io-pgtable-arm.c b/drivers/iommu/io-pgtable-arm.c >>>> index 010a254..9234db3 100644 >>>> --- a/drivers/iommu/io-pgtable-arm.c >>>> +++ b/drivers/iommu/io-pgtable-arm.c >>>> @@ -292,7 +292,7 @@ static void __arm_lpae_set_pte(arm_lpae_iopte *ptep, arm_lpae_iopte pte, >>>> static size_t __arm_lpae_unmap(struct arm_lpae_io_pgtable *data, >>>> unsigned long iova, size_t size, int lvl, >>>> - arm_lpae_iopte *ptep); >>>> + arm_lpae_iopte *ptep, int strict); >>>> static void __arm_lpae_init_pte(struct arm_lpae_io_pgtable *data, >>>> phys_addr_t paddr, arm_lpae_iopte prot, >>>> @@ -334,7 +334,7 @@ static int arm_lpae_init_pte(struct arm_lpae_io_pgtable *data, >>>> size_t sz = ARM_LPAE_BLOCK_SIZE(lvl, data); >>>> tblp = ptep - ARM_LPAE_LVL_IDX(iova, lvl, data); >>>> - if (WARN_ON(__arm_lpae_unmap(data, iova, sz, lvl, tblp) != sz)) >>>> + if (WARN_ON(__arm_lpae_unmap(data, iova, sz, lvl, tblp, IOMMU_STRICT) != sz)) >>>> return -EINVAL; >>>> } >>>> @@ -531,7 +531,7 @@ static void arm_lpae_free_pgtable(struct io_pgtable *iop) >>>> static size_t arm_lpae_split_blk_unmap(struct arm_lpae_io_pgtable *data, >>>> unsigned long iova, size_t size, >>>> arm_lpae_iopte blk_pte, int lvl, >>>> - arm_lpae_iopte *ptep) >>>> + arm_lpae_iopte *ptep, int strict) >>> >>> DMA code should never ever be splitting blocks anyway, and frankly the TLB maintenance here is dodgy enough (since we can't reasonably do break-before make as VMSA says we should) that I *really* don't want to introduce any possibility of making it more asynchronous. I'd much rather just hard-code the expectation of strict == true for this. >> >> OK, I will hard-code strict=true for it. >> >> But since it never ever be happened, why did not give a warning at the beginning? > > Because DMA code is not the only caller of iommu_map/unmap. It's > perfectly legal in the IOMMU API to partially unmap a previous mapping > such that a block entry needs to be split. The DMA API, however, is a > lot more constrined, and thus by construction the iommu-dma layer will > never generate a block-splitting iommu_unmap() except as a result of > illegal DMA API usage, and we obviously do not need to optimise for that > (you will get a warning about mismatched unmaps under dma-debug, but > it's a bit too expensive to police in the general case). > When I was reading the code around arm_lpae_split_blk_unmap(), I was curious in which scenario a block will be split. Now with your comments "Because DMA code is not the only caller of iommu_map/unmap", it seems depending on the user. Would you please explain this further? I mean besides DMA, which user will use iommu_map/umap and how it split a block. Thanks. Shunyong. > >>>> { >>>> struct io_pgtable_cfg *cfg = &data->iop.cfg; >>>> arm_lpae_iopte pte, *tablep; >>>> @@ -576,15 +576,18 @@ static size_t arm_lpae_split_blk_unmap(struct arm_lpae_io_pgtable *data, >>>> } >>>> if (unmap_idx < 0) >>>> - return __arm_lpae_unmap(data, iova, size, lvl, tablep); >>>> + return __arm_lpae_unmap(data, iova, size, lvl, tablep, strict); >>>> io_pgtable_tlb_add_flush(&data->iop, iova, size, size, true); >>>> + if (!strict) >>>> + io_pgtable_tlb_sync(&data->iop); >>>> + >>>> return size; >>>> } >>>> static size_t __arm_lpae_unmap(struct arm_lpae_io_pgtable *data, >>>> unsigned long iova, size_t size, int lvl, >>>> - arm_lpae_iopte *ptep) >>>> + arm_lpae_iopte *ptep, int strict) >>>> { >>>> arm_lpae_iopte pte; >>>> struct io_pgtable *iop = &data->iop; >>>> @@ -609,7 +612,7 @@ static size_t __arm_lpae_unmap(struct arm_lpae_io_pgtable *data, >>>> io_pgtable_tlb_sync(iop); >>>> ptep = iopte_deref(pte, data); >>>> __arm_lpae_free_pgtable(data, lvl + 1, ptep); >>>> - } else { >>>> + } else if (strict) { >>>> io_pgtable_tlb_add_flush(iop, iova, size, size, true); >>>> } >>>> @@ -620,25 +623,27 @@ static size_t __arm_lpae_unmap(struct arm_lpae_io_pgtable *data, >>>> * minus the part we want to unmap >>>> */ >>>> return arm_lpae_split_blk_unmap(data, iova, size, pte, >>>> - lvl + 1, ptep); >>>> + lvl + 1, ptep, strict); >>>> } >>>> /* Keep on walkin' */ >>>> ptep = iopte_deref(pte, data); >>>> - return __arm_lpae_unmap(data, iova, size, lvl + 1, ptep); >>>> + return __arm_lpae_unmap(data, iova, size, lvl + 1, ptep, strict); >>>> } >>>> static size_t arm_lpae_unmap(struct io_pgtable_ops *ops, unsigned long iova, >>>> size_t size) >>>> { >>>> + int strict = ((iova & IOMMU_STRICT_MODE_MASK) == IOMMU_STRICT); >>>> struct arm_lpae_io_pgtable *data = io_pgtable_ops_to_data(ops); >>>> arm_lpae_iopte *ptep = data->pgd; >>>> int lvl = ARM_LPAE_START_LVL(data); >>>> + iova &= ~IOMMU_STRICT_MODE_MASK; >>>> if (WARN_ON(iova >= (1ULL << data->iop.cfg.ias))) >>>> return 0; >>>> - return __arm_lpae_unmap(data, iova, size, lvl, ptep); >>>> + return __arm_lpae_unmap(data, iova, size, lvl, ptep, strict); >>>> } >>>> static phys_addr_t arm_lpae_iova_to_phys(struct io_pgtable_ops *ops, >>>> >>> >>> . >>> >> > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu >