Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp3354880imu; Mon, 28 Jan 2019 03:28:13 -0800 (PST) X-Google-Smtp-Source: ALg8bN65w9R44frUvQBImBDlTpc8NLdMB6mDA2qIxVRqHd79F/WvWjw3LYaz7cq9DJLy4xfdBV8/ X-Received: by 2002:a63:5320:: with SMTP id h32mr19499567pgb.414.1548674892992; Mon, 28 Jan 2019 03:28:12 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1548674892; cv=none; d=google.com; s=arc-20160816; b=amtwW8rtBW4d2nBlwTFwjgqpt/Z++0rGP4CaAhZ3x+Zd3i0+XWL9fMbE2w4P46suof 40LdcP5lG/IRp9LN0wOY1kGlUbbyFUgvNLSQb7okN6ZCrf9AGXm9TpXCxwJx1NNTQDOs 4nQBO6A7R585S/rxeB8W9hJKFRX3kqtoCcc3mDeRc/4TPWdtrkBKpzvVUuuQIFIKsSii Yr5QZju1Io+Hsyi6MRm5cdT1nrU177o9fINuY3RfGEVZvvHXXvcOUTHe/bY4+k1Csk40 j90hhEz89Q/GPLWMeWo1+JR1oAUq2XYoyXdk3MPSHpucaqCNz3tmIMikjg3WNVQEDyxh IdOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dmarc-filter:dkim-signature :dkim-signature; bh=VRX1Dz//xJYo8n/4Wo+LKdKH1gEVoOcQukUns9nqH8c=; b=iB7frsil6doga3L8bLIK/stY1DHbzgF3S1CmVF1J4GRCIMxHMO3kuJJk8I/+HmJq/T 8UQR2Tvn8uMpa+7ZNVh4DxYE/tQ9iloeos+yuZKDs55280YoL0nwIJH0iBHtIBO/fk3/ BC4n7U2bwW5YfzQXV4/zNWp16EnYMxJJaXj697r+5PnuzkTM+/EtzQwMiVcXmvX8poP9 ZDkdHvOqhzKmFR2JrrFetxJ14008p+U8h+6k90ygxu9BrLjbbl9zCDHnnMS/G/MabIB/ GvlYXuGw3wxCkt7OCtpv6dS2mDYK7EWLkgNwsVg+6PoKIdXZam0xVx0sSTsUM6pODl0/ 5fzQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=mD+VEfCp; dkim=pass header.i=@codeaurora.org header.s=default header.b="Xcwsag/L"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t75si32608636pfa.170.2019.01.28.03.27.56; Mon, 28 Jan 2019 03:28:12 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=mD+VEfCp; dkim=pass header.i=@codeaurora.org header.s=default header.b="Xcwsag/L"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726763AbfA1L1i (ORCPT + 99 others); Mon, 28 Jan 2019 06:27:38 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:41314 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726415AbfA1L1i (ORCPT ); Mon, 28 Jan 2019 06:27:38 -0500 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id 7A47A6086A; Mon, 28 Jan 2019 11:27:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1548674856; bh=GvSUQcq7N/C7v1w2GnvRqV+rRImFxea+GcurXp/M5iQ=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=mD+VEfCpvN9CGC87bZYh3XSGtRiOutqeHWLQWr5/Gnlk50CCKQe2GoaO1zr6IGeI6 BaVHwVnaJ2jnR2ZbUecphwVWr4hkBwgHsPLO+evW9ZM5dSTPKVxYieTkf0/OVQL7rt n6dsJUMSMM3WwmcW1Bxfd5wNi30dZlBbkLC++7MU= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_INVALID,DKIM_SIGNED autolearn=no autolearn_force=no version=3.4.0 Received: from mail-ed1-f42.google.com (mail-ed1-f42.google.com [209.85.208.42]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: vivek.gautam@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 709256083E; Mon, 28 Jan 2019 11:27:35 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1548674855; bh=GvSUQcq7N/C7v1w2GnvRqV+rRImFxea+GcurXp/M5iQ=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=Xcwsag/L8j5I5f75u1uc3Uchhgo3xnLWdmhMAZumgzr3Eju7Z1UryGNtf5O91bh1I hLZcv4wreGHNluifVPJh5tbt8LVpItqropzGYEvlSZ0Y1nu9r6fki15Q2m/zSBT6oA ku8tpxrtLtAaIE6a0lHPdpl1ti6bheawf/THvzso= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 709256083E Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=vivek.gautam@codeaurora.org Received: by mail-ed1-f42.google.com with SMTP id a20so12679040edc.8; Mon, 28 Jan 2019 03:27:35 -0800 (PST) X-Gm-Message-State: AJcUukeUHF79VVSaE2NY6nD5J5fD4q1NC1ZkcZozco+Nnkn+6C9tAdYP xClIHsoBI0Np3bsuL8BRCrXOTgV9AGMSsAmmC/0= X-Received: by 2002:a50:d002:: with SMTP id j2mr21027184edf.123.1548674854081; Mon, 28 Jan 2019 03:27:34 -0800 (PST) MIME-Version: 1.0 References: <20190121055335.15430-1-vivek.gautam@codeaurora.org> <964779d6-c676-3379-bf1e-cde0dd82d63d@arm.com> In-Reply-To: From: Vivek Gautam Date: Mon, 28 Jan 2019 16:57:22 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH 0/3] iommu/arm-smmu: Add support to use Last level cache To: Ard Biesheuvel Cc: pdaly@codeaurora.org, linux-arm-msm , Will Deacon , Linux Kernel Mailing List , "list@263.net:IOMMU DRIVERS" , Robin Murphy , linux-arm-kernel , pratikp@codeaurora.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Ard, On Thu, Jan 24, 2019 at 1:25 PM Ard Biesheuvel wrote: > > On Thu, 24 Jan 2019 at 07:58, Vivek Gautam wrote: > > > > On Mon, Jan 21, 2019 at 7:55 PM Ard Biesheuvel > > wrote: > > > > > > On Mon, 21 Jan 2019 at 14:56, Robin Murphy wrote: > > > > > > > > On 21/01/2019 13:36, Ard Biesheuvel wrote: > > > > > On Mon, 21 Jan 2019 at 14:25, Robin Murphy wrote: > > > > >> > > > > >> On 21/01/2019 10:50, Ard Biesheuvel wrote: > > > > >>> On Mon, 21 Jan 2019 at 11:17, Vivek Gautam wrote: > > > > >>>> > > > > >>>> Hi, > > > > >>>> > > > > >>>> > > > > >>>> On Mon, Jan 21, 2019 at 12:56 PM Ard Biesheuvel > > > > >>>> wrote: > > > > >>>>> > > > > >>>>> On Mon, 21 Jan 2019 at 06:54, Vivek Gautam wrote: > > > > >>>>>> > > > > >>>>>> Qualcomm SoCs have an additional level of cache called as > > > > >>>>>> System cache, aka. Last level cache (LLC). This cache sits right > > > > >>>>>> before the DDR, and is tightly coupled with the memory controller. > > > > >>>>>> The clients using this cache request their slices from this > > > > >>>>>> system cache, make it active, and can then start using it. > > > > >>>>>> For these clients with smmu, to start using the system cache for > > > > >>>>>> buffers and, related page tables [1], memory attributes need to be > > > > >>>>>> set accordingly. This series add the required support. > > > > >>>>>> > > > > >>>>> > > > > >>>>> Does this actually improve performance on reads from a device? The > > > > >>>>> non-cache coherent DMA routines perform an unconditional D-cache > > > > >>>>> invalidate by VA to the PoC before reading from the buffers filled by > > > > >>>>> the device, and I would expect the PoC to be defined as lying beyond > > > > >>>>> the LLC to still guarantee the architected behavior. > > > > >>>> > > > > >>>> We have seen performance improvements when running Manhattan > > > > >>>> GFXBench benchmarks. > > > > >>>> > > > > >>> > > > > >>> Ah ok, that makes sense, since in that case, the data flow is mostly > > > > >>> to the device, not from the device. > > > > >>> > > > > >>>> As for the PoC, from my knowledge on sdm845 the system cache, aka > > > > >>>> Last level cache (LLC) lies beyond the point of coherency. > > > > >>>> Non-cache coherent buffers will not be cached to system cache also, and > > > > >>>> no additional software cache maintenance ops are required for system cache. > > > > >>>> Pratik can add more if I am missing something. > > > > >>>> > > > > >>>> To take care of the memory attributes from DMA APIs side, we can add a > > > > >>>> DMA_ATTR definition to take care of any dma non-coherent APIs calls. > > > > >>>> > > > > >>> > > > > >>> So does the device use the correct inner non-cacheable, outer > > > > >>> writeback cacheable attributes if the SMMU is in pass-through? > > > > >>> > > > > >>> We have been looking into another use case where the fact that the > > > > >>> SMMU overrides memory attributes is causing issues (WC mappings used > > > > >>> by the radeon and amdgpu driver). So if the SMMU would honour the > > > > >>> existing attributes, would you still need the SMMU changes? > > > > >> > > > > >> Even if we could force a stage 2 mapping with the weakest pagetable > > > > >> attributes (such that combining would work), there would still need to > > > > >> be a way to set the TCR attributes appropriately if this behaviour is > > > > >> wanted for the SMMU's own table walks as well. > > > > >> > > > > > > > > > > Isn't that just a matter of implementing support for SMMUs that lack > > > > > the 'dma-coherent' attribute? > > > > > > > > Not quite - in general they need INC-ONC attributes in case there > > > > actually is something in the architectural outer-cacheable domain. > > > > > > But is it a problem to use INC-ONC attributes for the SMMU PTW on this > > > chip? AIUI, the reason for the SMMU changes is to avoid the > > > performance hit of snooping, which is more expensive than cache > > > maintenance of SMMU page tables. So are you saying the by-VA cache > > > maintenance is not relayed to this system cache, resulting in page > > > table updates to be invisible to masters using INC-ONC attributes? > > > > The reason for this SMMU changes is that the non-coherent devices > > can't access the inner caches at all. But they have a way to allocate > > and lookup in system cache. > > > > CPU will by default make use of system cache when the inner-cacheable > > and outer-cacheable memory attribute is set. > > > > So for SMMU page tables to be visible to PTW, > > -- For IO coherent clients, the CPU cache maintenance operations are not > > required for buffers marked Normal Cached to achieve a coherent view of > > memory. However, client-specific cache maintenance may still be > > required for devices > > with local caches (for example, compute DSP local L1 or L2). > > Why would devices need to access the SMMU page tables? No, the devices don't need to access the page tables, rather the PTW does. Sorry for mixing it up. > > > -- For non-IO coherent clients, the CPU cache maintenance operations (cleans > > and/or invalidates) are required at buffer handoff points for buffers marked as > > Normal Cached in any CPU page table in order to observe the latest updates. > > > > Indeed, and this is what your non-coherent SMMU PTW requires, and what > you /should/ get when you omit the 'dma-coherent' property from its DT > node (and if you don't, it is a bug in the SMMU driver that should get > fixed) > > The question is whether using inner-non-cached/outer-cacheable > attributes for the PTW is required for correctness, or whether it is > merely an optimization (since the point of this exercise was to avoid > snoop latency from the SMMU PTW). If it is an optimization, I would > like to understand whether the performance delta between SMMU page > tables in DRAM vs SMMU page tables in the LLC justifies these > intrusive changes to the SMMU driver. IIUC, SMMU uses the TCR configurations to decide how PTW should access the memory. TCR doesn't direct CPU whether to use cacheable or non -cacheable memory to allocate page tables. Is that right? Currently, these TCR configurations are set for inner-cacheable, and outer-cacheable. With this, is it assumed that PTW would snoop into the CPU caches for any updates of the page tables? When we omit 'dma-coherent', CPU will allocate non-coherent memory for these page tables, and software has to explicitly flush CPU caches to make the changes visible to SMMU. The CPU will still mark this memory as Normal Cached, i.e. inner cached, outer cached, and the non-IO coherent SMMU PTW won't be able to snoop into CPU caches. Does the following code in io-pgtable-arm.c ensures that SMMU sees the latest page tables? } else if (!(cfg->quirks & IO_PGTABLE_QUIRK_NO_DMA) && !(pte & ARM_LPAE_PTE_SW_SYNC)) { __arm_lpae_sync_pte(ptep, cfg); } This change is mostly to get optimized PTW. As seen in the patch [1] for GPU, there's a separate slice for page tables - "gpuhtw_llc_slice". Let me try to get the numbers for this optimization. [1] https://patchwork.kernel.org/patch/10302791/ Regards Vivek > > > > > > > > > The > > > > case of the outer cacheablility being not that but a hint to control > > > > non-CPU traffic through some not-quite-transparent cache behind the PoC > > > > definitely stays wrapped up in qcom-specific magic ;) > > > > > > > > > > I'm not surprised ... > > > > > > > > -- > > QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member > > of Code Aurora Forum, hosted by The Linux Foundation > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation