Received: by 2002:a25:868d:0:0:0:0:0 with SMTP id z13csp2793417ybk; Mon, 18 May 2020 08:04:39 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzJfUGpsFY16z694iw+6B7nqmMb8I5vvZr8YYTms+muYt/1nAj3cfdCehyB+2bn2sVb9GS9 X-Received: by 2002:a17:906:2f8d:: with SMTP id w13mr11798853eji.102.1589814278868; Mon, 18 May 2020 08:04:38 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1589814278; cv=none; d=google.com; s=arc-20160816; b=f7nnPGPNIIPQ4WExIadX7fNfzOJW4PX0b6drEpvYxqo57i+6vEpMIEmyq64DMb8JOS xjbFq1O8rUhIptBbb/37lXTZPI2EbQTMgRJ5WYQxcHlNCUYsBnY1AQJq3BA4Eix+Y9FM Af+iRqYUQcyv6xqGsuy1H2M7JQw32zxbaltGjSXHZYIDt56IWIX/DDuN/3drVHftl5x2 6XqwiFtswjSACAjOsoaQ4310V1gPPcgOmCajd/COrQS7tneIj7DwH6MvgssuO2YruA76 Mu2lmGG1QPXqtTvgXnbaNvhvYcz/MUGb/NsRywaRVWFMbapGcEqlaC6sF3v2U2OQ6n5n BTKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:dkim-signature; bh=yWMgFewGSggd3U6vlw5hEY3/wBCR8bMITGRKHqqhpDA=; b=eq7V6wgyaNAH04zKeC1EWulNY8IBjVrwCobSiVZpGsnk0rOH87n0nHuIi9EL+hov/f xMMCVr9EiirIML/HCEdzNqj85dWjBRnZicDuhrhJ2xwY9Zw6/VXcSGZwZDe/zu3e5k8V kq7JM17MveBlMsmzPWs22ffa9rsZyJ7uI8nyOrTJHctzVn/SbizYQcN5PBfwcDqXq2rg uMF0VaNXvnXCXB/5R45eA089nXA61ZVpQ9mIoJS0Dl8qZ5YP5p45Ux6izqqvvg4xY0HH B1+VHE+YnB9UfpHuJXnobgZWA2BXwkiDT26A6YFl3OydwPNH3t3X6DElZDVsI8wwhPTY BTtg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uNdmSK6q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id lb23si6611724ejb.28.2020.05.18.08.04.13; Mon, 18 May 2020 08:04:38 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=uNdmSK6q; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728015AbgERPAG (ORCPT + 99 others); Mon, 18 May 2020 11:00:06 -0400 Received: from mail.kernel.org ([198.145.29.99]:47584 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726998AbgERPAF (ORCPT ); Mon, 18 May 2020 11:00:05 -0400 Received: from willie-the-truck (236.31.169.217.in-addr.arpa [217.169.31.236]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 118762065F; Mon, 18 May 2020 15:00:02 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1589814004; bh=RNl6fktbFCVNb99FAXoUAHm7HFGk+HnBZtNJ3HcZJYk=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=uNdmSK6qwH2wEs1Dmvxn71gST5OtXhoWG1ERuWlW5HjkBatY1wakm3u6qeoCeqxQW UuvTXUIqydZD04oNCS+WbK4w0/gvCkAac2cxw5Mi7eEB0fEgZsx14Ig0Tku6fZMYvL iKvPC/+BLbKoO+lQB9OJpljl83PFqCY4jW7yueIM= Date: Mon, 18 May 2020 15:59:59 +0100 From: Will Deacon To: Jordan Crouse Cc: iommu@lists.linux-foundation.org, linux-arm-msm@vger.kernel.org, robin.murphy@arm.com, linux-arm-kernel@lists.infradead.org, Joerg Roedel , linux-kernel@vger.kernel.org Subject: Re: [PATCH v6 2/5] iommu/arm-smmu: Add support for TTBR1 Message-ID: <20200518145959.GK32394@willie-the-truck> References: <20200409233350.6343-1-jcrouse@codeaurora.org> <20200409233350.6343-3-jcrouse@codeaurora.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20200409233350.6343-3-jcrouse@codeaurora.org> User-Agent: Mutt/1.10.1 (2018-07-13) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 09, 2020 at 05:33:47PM -0600, Jordan Crouse wrote: > Add support to enable TTBR1 if the domain requests it via the > DOMAIN_ATTR_SPLIT_TABLES attribute. If enabled by the hardware > and pagetable configuration the driver will configure the TTBR1 region > and program the domain pagetable on TTBR1. TTBR0 will be disabled. > > After attaching the device the value of he domain attribute can > be queried to see if the split pagetables were successfully programmed. > The domain geometry will be updated as well so that the caller can > determine the active region for the pagetable that was programmed. > > Signed-off-by: Jordan Crouse > --- > > drivers/iommu/arm-smmu.c | 48 ++++++++++++++++++++++++++++++++++------ > drivers/iommu/arm-smmu.h | 24 +++++++++++++++----- > 2 files changed, 59 insertions(+), 13 deletions(-) > > diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c > index a6a5796e9c41..db6d503c1673 100644 > --- a/drivers/iommu/arm-smmu.c > +++ b/drivers/iommu/arm-smmu.c > @@ -555,11 +555,16 @@ static void arm_smmu_init_context_bank(struct arm_smmu_domain *smmu_domain, > cb->ttbr[0] = pgtbl_cfg->arm_v7s_cfg.ttbr; > cb->ttbr[1] = 0; > } else { > - cb->ttbr[0] = pgtbl_cfg->arm_lpae_s1_cfg.ttbr; > - cb->ttbr[0] |= FIELD_PREP(ARM_SMMU_TTBRn_ASID, > - cfg->asid); > - cb->ttbr[1] = FIELD_PREP(ARM_SMMU_TTBRn_ASID, > - cfg->asid); > + cb->ttbr[0] = FIELD_PREP(ARM_SMMU_TTBRn_ASID, > + cfg->asid); > + > + if (pgtbl_cfg->quirks & IO_PGTABLE_QUIRK_ARM_TTBR1) { > + cb->ttbr[1] = pgtbl_cfg->arm_lpae_s1_cfg.ttbr; > + } else { > + cb->ttbr[0] |= pgtbl_cfg->arm_lpae_s1_cfg.ttbr; > + cb->ttbr[1] = FIELD_PREP(ARM_SMMU_TTBRn_ASID, > + cfg->asid); > + } This looks odd to me. As I mentioned before, the SMMU driver absolutely has to manage the ASID space, so we should be setting it in both TTBRs here. > diff --git a/drivers/iommu/arm-smmu.h b/drivers/iommu/arm-smmu.h > index 8d1cd54d82a6..5f6d0af7c8c8 100644 > --- a/drivers/iommu/arm-smmu.h > +++ b/drivers/iommu/arm-smmu.h > @@ -172,6 +172,7 @@ enum arm_smmu_cbar_type { > #define ARM_SMMU_TCR_SH0 GENMASK(13, 12) > #define ARM_SMMU_TCR_ORGN0 GENMASK(11, 10) > #define ARM_SMMU_TCR_IRGN0 GENMASK(9, 8) > +#define ARM_SMMU_TCR_EPD0 BIT(7) > #define ARM_SMMU_TCR_T0SZ GENMASK(5, 0) > > #define ARM_SMMU_VTCR_RES1 BIT(31) > @@ -343,16 +344,27 @@ struct arm_smmu_domain { > struct mutex init_mutex; /* Protects smmu pointer */ > spinlock_t cb_lock; /* Serialises ATS1* ops and TLB syncs */ > struct iommu_domain domain; > + bool split_pagetables; > }; > > static inline u32 arm_smmu_lpae_tcr(struct io_pgtable_cfg *cfg) > { > - return ARM_SMMU_TCR_EPD1 | > - FIELD_PREP(ARM_SMMU_TCR_TG0, cfg->arm_lpae_s1_cfg.tcr.tg) | > - FIELD_PREP(ARM_SMMU_TCR_SH0, cfg->arm_lpae_s1_cfg.tcr.sh) | > - FIELD_PREP(ARM_SMMU_TCR_ORGN0, cfg->arm_lpae_s1_cfg.tcr.orgn) | > - FIELD_PREP(ARM_SMMU_TCR_IRGN0, cfg->arm_lpae_s1_cfg.tcr.irgn) | > - FIELD_PREP(ARM_SMMU_TCR_T0SZ, cfg->arm_lpae_s1_cfg.tcr.tsz); > + u32 tcr = FIELD_PREP(ARM_SMMU_TCR_TG0, cfg->arm_lpae_s1_cfg.tcr.tg) | > + FIELD_PREP(ARM_SMMU_TCR_SH0, cfg->arm_lpae_s1_cfg.tcr.sh) | > + FIELD_PREP(ARM_SMMU_TCR_ORGN0, cfg->arm_lpae_s1_cfg.tcr.orgn) | > + FIELD_PREP(ARM_SMMU_TCR_IRGN0, cfg->arm_lpae_s1_cfg.tcr.irgn) | > + FIELD_PREP(ARM_SMMU_TCR_T0SZ, cfg->arm_lpae_s1_cfg.tcr.tsz); > + > + /* > + * When TTBR1 is selected shift the TCR fields by 16 bits and disable > + * translation in TTBR0 > + */ > + if (cfg->quirks & IO_PGTABLE_QUIRK_ARM_TTBR1) > + tcr = (tcr << 16) | ARM_SMMU_TCR_EPD0; This looks reasonably dodgy to me, as you copy a RESERVED bit into the A1 field. Furthermore, for 32-bit context banks you've got the EAE bit to contend with as well. Perhaps we shouldn't expose DOMAIN_ATTR_SPLIT_TABLES for anything other than the 64-bit page table format. Will