Received: by 2002:a5b:505:0:0:0:0:0 with SMTP id o5csp5433878ybp; Mon, 14 Oct 2019 22:40:34 -0700 (PDT) X-Google-Smtp-Source: APXvYqy3F2SRUthHKIcMFFN5c/YxjUNDSmdE+/74dN/xK5fVgPsr1ZaoprbiHlxBejbrNZDhvUFu X-Received: by 2002:a05:6402:7d2:: with SMTP id u18mr32700715edy.23.1571118033922; Mon, 14 Oct 2019 22:40:33 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1571118033; cv=none; d=google.com; s=arc-20160816; b=btLwGq4FsE6wneitvB6rVUMqUtrZR80iORCWk9vUviWFdmuBj0CO9k5f/ECrUC3XT4 CZWO8GYrzHuqdwCO/0HyyW/IUmo4ypIco+tF+jSl3JKOF8445BvGLsOcOkV026QK7Da3 6cKw32JkUbdRyxSOYzOKQ8pnLgDIvoXbi+d1NWr3MOJz9rc7jm+oDidEkYlER4U2+FvK pxSrpQywMydroOyCBzCuS4eE/HDqtp2jp89h2q6qm8hy6CiVcHs4lnjKQF0UpK5Wy84x /B/9DQiP0u5H6vIbMRS85YpjchJFj0m7NUZaK9SRaVAKRyqkh5973O6sD/tuOjjJhRlv SBSQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id; bh=Lnfvql7HW/8rohdgwH4bFa5yMGS8QEQr26xQYoAEclY=; b=VbdQ8k4/AORU/I4lVI7YUHIwO6lGx6GLhSAf67Gy47/JV6o15VHhgobZ19RxZ9DrO+ VMqy+HWrmJes1LLhziKjlbcQntoQ6vZbL1bbUcQIo7xq5zio8KeovLIddDxotlNas4N/ SOzimTmRuOQEVI1bwho6xbd9Sjy8N8Nd5YUIi0adMt7sT7Jgvg/whdn51HH/Wn9ScRNI rpz7sb9J04kDxOcQYABQotkzlaRy4/d43xKtPXDSS9xSJCHgKw8rrxASY3C5QuRr04+y dWiAazNZqHmm1abDY5j9xpe5XPJJp2zF8r8j1q2Wrc3lIVUb6w6BT/AWYeij7XntEZcf 5GcQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id x51si14470317eda.272.2019.10.14.22.40.10; Mon, 14 Oct 2019 22:40:33 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=mediatek.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728325AbfJOF0N (ORCPT + 99 others); Tue, 15 Oct 2019 01:26:13 -0400 Received: from Mailgw01.mediatek.com ([1.203.163.78]:25494 "EHLO mailgw01.mediatek.com" rhost-flags-OK-FAIL-OK-FAIL) by vger.kernel.org with ESMTP id S1726004AbfJOF0N (ORCPT ); Tue, 15 Oct 2019 01:26:13 -0400 X-UUID: e3df01c6f2004888a356a9b510f70f67-20191015 X-UUID: e3df01c6f2004888a356a9b510f70f67-20191015 Received: from mtkcas34.mediatek.inc [(172.27.4.253)] by mailgw01.mediatek.com (envelope-from ) (mailgw01.mediatek.com ESMTP with TLS) with ESMTP id 2096386606; Tue, 15 Oct 2019 13:26:08 +0800 Received: from MTKCAS32.mediatek.inc (172.27.4.184) by MTKMBS32DR.mediatek.inc (172.27.6.104) with Microsoft SMTP Server (TLS) id 15.0.1395.4; Tue, 15 Oct 2019 13:26:05 +0800 Received: from [10.17.3.153] (172.27.4.253) by MTKCAS32.mediatek.inc (172.27.4.170) with Microsoft SMTP Server id 15.0.1395.4 via Frontend Transport; Tue, 15 Oct 2019 13:26:04 +0800 Message-ID: <1571117166.19130.83.camel@mhfsdcap03> Subject: Re: [PATCH v3 3/7] iommu/mediatek: Use gather to achieve the tlb range flush From: Yong Wu To: Robin Murphy CC: Matthias Brugger , Joerg Roedel , Will Deacon , Evan Green , Tomasz Figa , , , , , , , Nicolas Boichat , , , , Date: Tue, 15 Oct 2019 13:26:06 +0800 In-Reply-To: References: <1571035101-4213-1-git-send-email-yong.wu@mediatek.com> <1571035101-4213-4-git-send-email-yong.wu@mediatek.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.10.4-0ubuntu2 MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-TM-SNTS-SMTP: 493B811D3A4FB41E5FE1A33A5F26255A7FD2DDEB47E946C9A789C9EA07E415032000:8 X-MTK: N Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 2019-10-14 at 15:21 +0100, Robin Murphy wrote: > On 14/10/2019 07:38, Yong Wu wrote: > > Use the iommu_gather mechanism to achieve the tlb range flush. > > Gather the iova range in the "tlb_add_page", then flush the merged iova > > range in iotlb_sync. > > > > Note: If iotlb_sync comes from iommu_iotlb_gather_add_page, we have to > > avoid retry the lock since the spinlock have already been acquired. > > I think this could probably be even simpler - once the actual > register-poking is all confined to mtk_iommu_tlb_sync(), you should be > able get rid of the per-domain locking in map/unmap and just have a > single per-IOMMU lock to serialise syncs. The io-pgtable code itself > hasn't needed external locking for a while now. This is more simpler! Thanks very much. I will try this. The only concern is there is no lock in the iova_to_phys then, maybe use the new lock instead. > > Robin. > > > Suggested-by: Tomasz Figa > > Signed-off-by: Yong Wu > > --- > > 1) This is the special case backtrace: > > > > mtk_iommu_iotlb_sync+0x50/0xa0 > > mtk_iommu_tlb_flush_page_nosync+0x5c/0xd0 > > __arm_v7s_unmap+0x174/0x598 > > arm_v7s_unmap+0x30/0x48 > > mtk_iommu_unmap+0x50/0x78 > > __iommu_unmap+0xa4/0xf8 > > > > 2) The checking "if (gather->start == ULONG_MAX) return;" also is > > necessary. It will happened when unmap only go to _flush_walk, then > > enter this tlb_sync. > > --- > > drivers/iommu/mtk_iommu.c | 29 +++++++++++++++++++++++++---- > > drivers/iommu/mtk_iommu.h | 1 + > > 2 files changed, 26 insertions(+), 4 deletions(-) > > > > diff --git a/drivers/iommu/mtk_iommu.c b/drivers/iommu/mtk_iommu.c > > index 5f594d6..8712afc 100644 > > --- a/drivers/iommu/mtk_iommu.c > > +++ b/drivers/iommu/mtk_iommu.c > > @@ -234,7 +234,12 @@ static void mtk_iommu_tlb_flush_page_nosync(struct iommu_iotlb_gather *gather, > > unsigned long iova, size_t granule, > > void *cookie) > > { > > - mtk_iommu_tlb_add_flush_nosync(iova, granule, granule, true, cookie); > > + struct mtk_iommu_data *data = cookie; > > + struct iommu_domain *domain = &data->m4u_dom->domain; > > + > > + data->is_in_tlb_gather_add_page = true; > > + iommu_iotlb_gather_add_page(domain, gather, iova, granule); > > + data->is_in_tlb_gather_add_page = false; > > } > > > > static const struct iommu_flush_ops mtk_iommu_flush_ops = { > > @@ -453,12 +458,28 @@ static void mtk_iommu_flush_iotlb_all(struct iommu_domain *domain) > > static void mtk_iommu_iotlb_sync(struct iommu_domain *domain, > > struct iommu_iotlb_gather *gather) > > { > > + struct mtk_iommu_data *data = mtk_iommu_get_m4u_data(); > > struct mtk_iommu_domain *dom = to_mtk_domain(domain); > > + bool is_in_gather = data->is_in_tlb_gather_add_page; > > + size_t length = gather->end - gather->start; > > unsigned long flags; > > > > - spin_lock_irqsave(&dom->pgtlock, flags); > > - mtk_iommu_tlb_sync(mtk_iommu_get_m4u_data()); > > - spin_unlock_irqrestore(&dom->pgtlock, flags); > > + if (gather->start == ULONG_MAX) > > + return; > > + > > + /* > > + * Avoid acquire the lock when it's in gather_add_page since the lock > > + * has already been held. > > + */ > > + if (!is_in_gather) > > + spin_lock_irqsave(&dom->pgtlock, flags); > > + > > + mtk_iommu_tlb_add_flush_nosync(gather->start, length, gather->pgsize, > > + false, data); > > + mtk_iommu_tlb_sync(data); > > + > > + if (!is_in_gather) > > + spin_unlock_irqrestore(&dom->pgtlock, flags); > > } > > > > static phys_addr_t mtk_iommu_iova_to_phys(struct iommu_domain *domain, > > diff --git a/drivers/iommu/mtk_iommu.h b/drivers/iommu/mtk_iommu.h > > index fc0f16e..d29af1d 100644 > > --- a/drivers/iommu/mtk_iommu.h > > +++ b/drivers/iommu/mtk_iommu.h > > @@ -58,6 +58,7 @@ struct mtk_iommu_data { > > struct iommu_group *m4u_group; > > bool enable_4GB; > > bool tlb_flush_active; > > + bool is_in_tlb_gather_add_page; > > > > struct iommu_device iommu; > > const struct mtk_iommu_plat_data *plat_data; > >