Received: by 2002:a25:86ce:0:0:0:0:0 with SMTP id y14csp1434282ybm; Thu, 23 May 2019 00:37:06 -0700 (PDT) X-Google-Smtp-Source: APXvYqy79hVz38VqIMj5A2vbvhxmuCvy8sXHenrFa6d/ppwsiMLOS1pUx7gapPSnyzpElECUy9PU X-Received: by 2002:a65:63c8:: with SMTP id n8mr90730461pgv.96.1558597026067; Thu, 23 May 2019 00:37:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1558597026; cv=none; d=google.com; s=arc-20160816; b=Qaf3lPc/hugR7cTf3Ip+qwASeEwL5fGcFMp6kqc2vc524t7/b3s4D+6qnlMcAk/TMJ 1t8wdCqnlmJCrOMU4oIrb1kJJJ3mj9AxWofIiW66j+ZWEXwPKd3dFDKObtkO04mX/Tg+ KvSQg8WeFEYWQLCBdFn36+Eg4fOLPxLHNf5luLfpohqeZeX4CdZcEpH8RYbETAowJG1V wdMTFUNY1Eqpqy8qF7FP7K3JUJ87Sit9ZxQ/ayxRzgilgM+c0tWeWB9ReXjPR8drAblJ nT22IAjwHhWOcmomYOTYlvq5bEQk0CO9X7CXv7486dFx+pgX55kQ3blLfTFgE6VfffkK jBzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dmarc-filter:dkim-signature :dkim-signature; bh=H896Chw2X+k4ItQmd4Cc6IDlBrVGhV+lCZgd+4dgGtI=; b=n3Chzfyi6epgoWUeXML+uZvvz433rNISo1JvVlp6LLzbjGvAKjZBsMWeNJpxdwdNvh mv8s4U0ozHh1NOQIgW8zbkLQnnYZGr4tC6XNDF75K69ZH8YwdfXztVZnuxKyn9MPKAAY PNijhjEgvs0SNlnHl2xq8ex4Vf8o1ZEPmnuBPVpW8I29dkodnG05pExzNWN8G0qYNrah 3AJxjz6UTvHOTHgfh7vlG6efS7OtWuvR7ElsJAeHfageIyMe3O5UG+EkUOvTs+h1B5NU X0J1TS/zBN1jmwL5ZFoYWz7Eq1H/dJ/HoeuA2lEteLekHHR4mbHeKWTpkKBd0XydLVdu SFqw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=YmSS0LMu; dkim=pass header.i=@codeaurora.org header.s=default header.b=NzFOjevD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 2si27648645ple.275.2019.05.23.00.36.48; Thu, 23 May 2019 00:37:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=YmSS0LMu; dkim=pass header.i=@codeaurora.org header.s=default header.b=NzFOjevD; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729924AbfEWHfV (ORCPT + 99 others); Thu, 23 May 2019 03:35:21 -0400 Received: from smtp.codeaurora.org ([198.145.29.96]:58110 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726222AbfEWHfU (ORCPT ); Thu, 23 May 2019 03:35:20 -0400 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id D186360DB6; Thu, 23 May 2019 07:35:18 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1558596919; bh=vaYCSPJNKOnJfhfTph1DKToRlp8mANwQb3rgvaGrh04=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=YmSS0LMu9w6hsfu3aVZgHUEaRW8oWTnMJAzblNdOS+NasujHP41YkFXeHcp3W1BNk VOF5JIpSsmnteLqtd73ijOAykKpEg1liraJLoWNhpbKKos0+oTsJm8ZO9rbihp0a71 S06M4y3knEWtLXJbagbIW1cotSYtk/OCA0bvLQrM= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.7 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_INVALID,DKIM_SIGNED,SPF_NONE autolearn=no autolearn_force=no version=3.4.0 Received: from mail-ed1-f49.google.com (mail-ed1-f49.google.com [209.85.208.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: vivek.gautam@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id CFFE460E5D; Thu, 23 May 2019 07:35:15 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1558596916; bh=vaYCSPJNKOnJfhfTph1DKToRlp8mANwQb3rgvaGrh04=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=NzFOjevDj2yTKcBgxOOXOebaoVz64Tm7Nu1RhPaSdKqVOxzt09hwwQalYCp1h8KML erpHyl0S2pX4h6mtSCkQExeRJuQZjiwZxUks1aj1LlOwE1zNhtRfoMEv8ndiwsWqsW Cy+pSUv+wZnxZapyUMsH1O8wIxvZY9vi20Kg1JKY= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org CFFE460E5D Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=vivek.gautam@codeaurora.org Received: by mail-ed1-f49.google.com with SMTP id w33so4438139edb.10; Thu, 23 May 2019 00:35:15 -0700 (PDT) X-Gm-Message-State: APjAAAV4FtVYeykwNut4s9U8ijRMz6xiDFDvT0rZ72lQa6B7x+EGETqC 72NfVXyxjHOSnTzYhjOw3mWC6o17mitxXY0clJQ= X-Received: by 2002:a50:9958:: with SMTP id l24mr95862736edb.92.1558596914222; Thu, 23 May 2019 00:35:14 -0700 (PDT) MIME-Version: 1.0 References: <20190516093020.18028-1-vivek.gautam@codeaurora.org> In-Reply-To: <20190516093020.18028-1-vivek.gautam@codeaurora.org> From: Vivek Gautam Date: Thu, 23 May 2019 13:05:03 +0530 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v5 1/1] iommu/io-pgtable-arm: Add support to use system cache To: Will Deacon , Robin Murphy , "list@263.net:IOMMU DRIVERS , Joerg Roedel ," , "list@263.net:IOMMU DRIVERS , Joerg Roedel ," Cc: pdaly@codeaurora.org, linux-arm-msm , open list , pratikp@codeaurora.org, Linux ARM Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Robin, On Thu, May 16, 2019 at 3:00 PM Vivek Gautam wrote: > > Few Qualcomm platforms such as, sdm845 have an additional outer > cache called as System cache, aka. Last level cache (LLC) that > allows non-coherent devices to upgrade to using caching. > This cache sits right before the DDR, and is tightly coupled > with the memory controller. The clients using this cache request > their slices from this system cache, make it active, and can then > start using it. > > There is a fundamental assumption that non-coherent devices can't > access caches. This change adds an exception where they *can* use > some level of cache despite still being non-coherent overall. > The coherent devices that use cacheable memory, and CPU make use of > this system cache by default. > > Looking at memory types, we have following - > a) Normal uncached :- MAIR 0x44, inner non-cacheable, > outer non-cacheable; > b) Normal cached :- MAIR 0xff, inner read write-back non-transient, > outer read write-back non-transient; > attribute setting for coherenet I/O devices. > and, for non-coherent i/o devices that can allocate in system cache > another type gets added - > c) Normal sys-cached :- MAIR 0xf4, inner non-cacheable, > outer read write-back non-transient > > Coherent I/O devices use system cache by marking the memory as > normal cached. > Non-coherent I/O devices should mark the memory as normal > sys-cached in page tables to use system cache. > > Signed-off-by: Vivek Gautam > --- Let me know if there's more to improve on this patch. Best regards Vivek > > V3 version of this patch and related series can be found at [1]. > V4 of this patch is available at [2]. > > The example usage of how a smmu master can make use of this protection > flag and set the correct memory attributes to start using system cache, > can be found at [3]; and here at [3] IOMMU_UPSTREAM_HINT is same as > IOMMU_QCOM_SYS_CACHE. > > Changes since v4: > - Changed ARM_LPAE_MAIR_ATTR_QCOM_SYS_CACHE to > ARM_LPAE_MAIR_ATTR_INC_OWBRWA. > - Changed ARM_LPAE_MAIR_ATTR_IDX_QCOM_SYS_CACHE to > ARM_LPAE_MAIR_ATTR_IDX_INC_OCACHE. > - Added comments to iommu protection flag - IOMMU_QCOM_SYS_CACHE. > > Changes since v3: > - Dropping support to cache i/o page tables to system cache. Getting support > for data buffers is the first step. > Removed io-pgtable quirk and related change to add domain attribute. > > Glmark2 numbers on SDM845 based cheza board: > > S.No.| with LLC support | without LLC support > | for data buffers | > --------------------------------------------------- > 1 | 4480; 72.3fps | 4042; 65.2fps > 2 | 4500; 72.6fps | 4039; 65.1fps > 3 | 4523; 72.9fps | 4106; 66.2fps > 4 | 4489; 72.4fps | 4104; 66.2fps > 5 | 4518; 72.9fps | 4072; 65.7fps > > [1] https://patchwork.kernel.org/cover/10772629/ > [2] https://lore.kernel.org/patchwork/patch/1072936/ > [3] https://patchwork.kernel.org/patch/10302791/ > > drivers/iommu/io-pgtable-arm.c | 9 ++++++++- > include/linux/iommu.h | 6 ++++++ > 2 files changed, 14 insertions(+), 1 deletion(-) > > diff --git a/drivers/iommu/io-pgtable-arm.c b/drivers/iommu/io-pgtable-arm.c > index 4e21efbc4459..2454ac11aa97 100644 > --- a/drivers/iommu/io-pgtable-arm.c > +++ b/drivers/iommu/io-pgtable-arm.c > @@ -167,10 +167,12 @@ > #define ARM_LPAE_MAIR_ATTR_MASK 0xff > #define ARM_LPAE_MAIR_ATTR_DEVICE 0x04 > #define ARM_LPAE_MAIR_ATTR_NC 0x44 > +#define ARM_LPAE_MAIR_ATTR_INC_OWBRWA 0xf4 > #define ARM_LPAE_MAIR_ATTR_WBRWA 0xff > #define ARM_LPAE_MAIR_ATTR_IDX_NC 0 > #define ARM_LPAE_MAIR_ATTR_IDX_CACHE 1 > #define ARM_LPAE_MAIR_ATTR_IDX_DEV 2 > +#define ARM_LPAE_MAIR_ATTR_IDX_INC_OCACHE 3 > > #define ARM_MALI_LPAE_TTBR_ADRMODE_TABLE (3u << 0) > #define ARM_MALI_LPAE_TTBR_READ_INNER BIT(2) > @@ -470,6 +472,9 @@ static arm_lpae_iopte arm_lpae_prot_to_pte(struct arm_lpae_io_pgtable *data, > else if (prot & IOMMU_CACHE) > pte |= (ARM_LPAE_MAIR_ATTR_IDX_CACHE > << ARM_LPAE_PTE_ATTRINDX_SHIFT); > + else if (prot & IOMMU_QCOM_SYS_CACHE) > + pte |= (ARM_LPAE_MAIR_ATTR_IDX_INC_OCACHE > + << ARM_LPAE_PTE_ATTRINDX_SHIFT); > } > > if (prot & IOMMU_NOEXEC) > @@ -857,7 +862,9 @@ arm_64_lpae_alloc_pgtable_s1(struct io_pgtable_cfg *cfg, void *cookie) > (ARM_LPAE_MAIR_ATTR_WBRWA > << ARM_LPAE_MAIR_ATTR_SHIFT(ARM_LPAE_MAIR_ATTR_IDX_CACHE)) | > (ARM_LPAE_MAIR_ATTR_DEVICE > - << ARM_LPAE_MAIR_ATTR_SHIFT(ARM_LPAE_MAIR_ATTR_IDX_DEV)); > + << ARM_LPAE_MAIR_ATTR_SHIFT(ARM_LPAE_MAIR_ATTR_IDX_DEV)) | > + (ARM_LPAE_MAIR_ATTR_INC_OWBRWA > + << ARM_LPAE_MAIR_ATTR_SHIFT(ARM_LPAE_MAIR_ATTR_IDX_INC_OCACHE)); > > cfg->arm_lpae_s1_cfg.mair[0] = reg; > cfg->arm_lpae_s1_cfg.mair[1] = 0; > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > index a815cf6f6f47..8ee3fbaf5855 100644 > --- a/include/linux/iommu.h > +++ b/include/linux/iommu.h > @@ -41,6 +41,12 @@ > * if the IOMMU page table format is equivalent. > */ > #define IOMMU_PRIV (1 << 5) > +/* > + * Non-coherent masters on few Qualcomm SoCs can use this page protection flag > + * to set correct cacheability attributes to use an outer level of cache - > + * last level cache, aka system cache. > + */ > +#define IOMMU_QCOM_SYS_CACHE (1 << 6) > > struct iommu_ops; > struct iommu_group; > -- > QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member > of Code Aurora Forum, hosted by The Linux Foundation > > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation