Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp2133676pxa; Mon, 3 Aug 2020 08:16:52 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw92dj20t3gxeLiMoujnMv75kbzfOObC53Hq4s6TwqcY5mFoDHmp+ZJxrt+yRMaS1sfvo5O X-Received: by 2002:a17:906:1ed3:: with SMTP id m19mr16275577ejj.396.1596467811642; Mon, 03 Aug 2020 08:16:51 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1596467811; cv=none; d=google.com; s=arc-20160816; b=Peno3KDaAwvqAUZIbv0sbvpp+94vtFAgvk7PL4pk5lqe8yeY6gEcq+hN6LiVeeouCx imDFer3fSw1TAxyrhBRisGLnZzNl/q3184JKhsDhWjMhNsqPCugmU0bzULJR8imSWeQd zdRcJH2oDAbnXfJFml1eZhg0QYxGdaauTGfNB9mlL9rsPU6BJPTUYUEqFnMOWsLXw6Nb 0YrBfVjzQMze6YdBDAa+X+3PxyDhZyqOTuFQSyIpqA47TggwCBjLtiyFmOiXlmJTnW2s EJ3pVtRCZOA7vko3z+hTJDZB2Wk//rdwX3v+OldGv3V4eAX4gfNiwAzEb5T6SYnVNZPY 3/8A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=ZuffSV18EU8xXSBhhfIwDGXYr/xPk0io21XcCQbtbWg=; b=dHvgCIlacem4Zk5BSxffnjMjrEhg06qlTpCWF1VlUMRR902oJYmZsvtUBsUfkBqAUX EDkD/GpbDlPaYfq0kdBr129+zp5hk8L98X1ldTwoBwtwrOwBitk15nvvCmUbdXaAsyDH gGmpuviC87vmLUABtOHE/5rra3AgMJnVOTaC/bE8hDP2ayiGZa4oRioDYaquSVhcIaQL wuLyZ9+ZQJSFZBx4BI7t7tK4DOG4Llz8aixPqYVgz6tSJdDewZyAH59rh0hk9ez8y8rQ etPVe0Hy1qZTqVElXB4/tTFIVgWwM9nA8XW9WYXPXqOFxRgpyn70aohSd518IGHeasYA v41Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Xh6Tk89e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id i19si1843920edv.605.2020.08.03.08.16.28; Mon, 03 Aug 2020 08:16:51 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Xh6Tk89e; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728107AbgHCPPf (ORCPT + 99 others); Mon, 3 Aug 2020 11:15:35 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40114 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725933AbgHCPPf (ORCPT ); Mon, 3 Aug 2020 11:15:35 -0400 Received: from mail-ej1-x641.google.com (mail-ej1-x641.google.com [IPv6:2a00:1450:4864:20::641]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C2B75C06174A for ; Mon, 3 Aug 2020 08:15:34 -0700 (PDT) Received: by mail-ej1-x641.google.com with SMTP id d6so25172842ejr.5 for ; Mon, 03 Aug 2020 08:15:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=ZuffSV18EU8xXSBhhfIwDGXYr/xPk0io21XcCQbtbWg=; b=Xh6Tk89eXSY7i4v3XL6YA/R//V/PF6If0rB7BsjJsL1YvBB2H6U2naNnR4xQgcVtK9 5NMYwXK2oHiQcbumBgSP1qBIr1C6/6/JPq0EV+XOE3xiFQZn3ZnGx02QsR3aMU/cHkxg ivTK+tKnbWJ+7aVF2V+YV6Qqiv2o1MQ4lbzqk= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=ZuffSV18EU8xXSBhhfIwDGXYr/xPk0io21XcCQbtbWg=; b=mD7yayNqj0dDuoadchA9S9qJMHTHWVAhZaouLpC4JFwgf64LkXC0/1ljQtiiMKMiWs 918302qYDAHtmuzL6Xexq1bOpSd7FoywZgbls+ygc52yPHhxslIlrQHk1Y/3DvPqq4w/ EjXKz7hP9LdAWgKP0xhUHb44FXQ/FqQBgT3sSVc0MXzAaybcZYVuF4zfJs68AB9691D4 wLShXSnulpTLgDRdhb0KyN4t7U8GFvI20PYkkiJZXUj2UwhzMjjzFywPEedUl3yRrIF/ yrE4ZefPIYApEo/xjirBwfPpRe4Ehf0ZuBAh/n/UF4Py2+9nm/D6Gj9rzz/DZIUmSzIz Thxg== X-Gm-Message-State: AOAM532e9OhKTchFOF/1xT5Pnf6e/1tVxmgU1janCJX2F/5rvna7vPuA nIWZyI+HGhXfP8HijNbmCcGmSg0qLjo= X-Received: by 2002:a17:906:f8d5:: with SMTP id lh21mr17735314ejb.360.1596467733548; Mon, 03 Aug 2020 08:15:33 -0700 (PDT) Received: from mail-wr1-f52.google.com (mail-wr1-f52.google.com. [209.85.221.52]) by smtp.gmail.com with ESMTPSA id bw7sm16652955ejb.5.2020.08.03.08.15.33 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 03 Aug 2020 08:15:33 -0700 (PDT) Received: by mail-wr1-f52.google.com with SMTP id a15so34548756wrh.10 for ; Mon, 03 Aug 2020 08:15:33 -0700 (PDT) X-Received: by 2002:a5d:6744:: with SMTP id l4mr16794657wrw.105.1596467732538; Mon, 03 Aug 2020 08:15:32 -0700 (PDT) MIME-Version: 1.0 References: <20200728050140.996974-1-tientzu@chromium.org> <20200728050140.996974-5-tientzu@chromium.org> <20200731205804.GB756942@bogus> In-Reply-To: From: Tomasz Figa Date: Mon, 3 Aug 2020 17:15:20 +0200 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC v2 4/5] dt-bindings: of: Add plumbing for restricted DMA pool To: Claire Chang , Rob Herring Cc: Frank Rowand , Christoph Hellwig , Marek Szyprowski , Robin Murphy , Thierry Reding , Greg KH , Saravana Kannan , suzuki.poulose@arm.com, dan.j.williams@intel.com, heikki.krogerus@linux.intel.com, Bartosz Golaszewski , linux-devicetree , lkml , "list@263.net:IOMMU DRIVERS , Joerg Roedel ," , Nicolas Boichat Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Claire and Rob, On Mon, Aug 3, 2020 at 4:26 PM Claire Chang wrote: > > On Sat, Aug 1, 2020 at 4:58 AM Rob Herring wrote: > > > > On Tue, Jul 28, 2020 at 01:01:39PM +0800, Claire Chang wrote: > > > Introduce the new compatible string, device-swiotlb-pool, for restricted > > > DMA. One can specify the address and length of the device swiotlb memory > > > region by device-swiotlb-pool in the device tree. > > > > > > Signed-off-by: Claire Chang > > > --- > > > .../reserved-memory/reserved-memory.txt | 35 +++++++++++++++++++ > > > 1 file changed, 35 insertions(+) > > > > > > diff --git a/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt b/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt > > > index 4dd20de6977f..78850896e1d0 100644 > > > --- a/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt > > > +++ b/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt > > > @@ -51,6 +51,24 @@ compatible (optional) - standard definition > > > used as a shared pool of DMA buffers for a set of devices. It can > > > be used by an operating system to instantiate the necessary pool > > > management subsystem if necessary. > > > + - device-swiotlb-pool: This indicates a region of memory meant to be > > > > swiotlb is a Linux thing. The binding should be independent. > Got it. Thanks for pointing this out. > > > > > > + used as a pool of device swiotlb buffers for a given device. When > > > + using this, the no-map and reusable properties must not be set, so the > > > + operating system can create a virtual mapping that will be used for > > > + synchronization. Also, there must be a restricted-dma property in the > > > + device node to specify the indexes of reserved-memory nodes. One can > > > + specify two reserved-memory nodes in the device tree. One with > > > + shared-dma-pool to handle the coherent DMA buffer allocation, and > > > + another one with device-swiotlb-pool for regular DMA to/from system > > > + memory, which would be subject to bouncing. The main purpose for > > > + restricted DMA is to mitigate the lack of DMA access control on > > > + systems without an IOMMU, which could result in the DMA accessing the > > > + system memory at unexpected times and/or unexpected addresses, > > > + possibly leading to data leakage or corruption. The feature on its own > > > + provides a basic level of protection against the DMA overwriting buffer > > > + contents at unexpected times. However, to protect against general data > > > + leakage and system memory corruption, the system needs to provide a > > > + way to restrict the DMA to a predefined memory region. > > > > I'm pretty sure we already support per device carveouts and I don't > > understand how this is different. > We use this to bounce streaming DMA in and out of a specially allocated region. > I'll try to merge this with the existing one (i.e., shared-dma-pool) > to see if that > makes things clearer. > Indeed, from the firmware point of view, this is just a carveout, for which we have the "shared-dma-pool" compatible string defined already. However, depending on the device and firmware setup, the way the carevout is used may change. I can see the following scenarios: 1) coherent DMA (dma_alloc_*) within a reserved pool and no non-coherent DMA (dma_map_*). This is how the "memory-region" property is handled today in Linux for devices which can only DMA from/to the given memory region. However, I'm not sure if no non-coherent DMA is actually enforced in any way by the DMA subsystem. 2) coherent DMA from a reserved pool and non-coherent DMA from system memory This is the case for the systems which have some dedicated part of memory which is guaranteed to be coherent with the DMA, but still can do non-coherent DMA to any part of the system memory. Linux handles it the same way as 1), which is what made me believe that 1) might not actually be handled correctly. 3) coherent DMA and bounced non-coherent DMA within a reserved pool 4) coherent DMA within one pool and bounced non-coherent within another pool These are the two cases we're interested in. Basically they make it possible for non-coherent DMA from arbitrary system memory to be bounced through a reserved pool, which the device has access to. The current series implements 4), but I'd argue that it: - is problematic from the firmware point of view, because on most of the systems, both pools would be just some carveouts and the fact that Linux would use one for coherent and the other for non-coherent DMA would be an OS implementation detail, - suffers from the static memory split between coherent and non-coherent DMA, which could either result in some wasted memory or the DMA stopped working after a kernel update if the driver changes its allocation pattern, and so we should rather go with 3). Now, from the firmware point of view, it doesn't matter how the OS uses the carveout, but I think it's still necessary to tell the OS about the device DMA capability. Right now we use "memory-region" for any kind of reserved memory, but looking at the above scenarios, there are 2 cases: a) the memory region is preferred for the device, e.g. it enables coherency, but the device can still DMA across the rest of the system memory. This is the case in scenario 2) and is kind of assumed in the Linux DMA subsystem, although it's certainly not the case for a lot of hardware, even if they use the "memory-region" binding. b) the memory region is the only region that the device can access. This is the case in scenarios 1), 3) and 4). For this, I'd like to propose a "restricted-dma-region" (feel free to suggest a better name) binding, which is explicitly specified to be the only DMA-able memory for this device and make Linux use the given pool for coherent DMA allocations and bouncing non-coherent DMA. What do you think? Best regards, Tomasz > > > > What is the last sentence supposed to imply? You need an IOMMU? > The main purpose is to mitigate the lack of DMA access control on > systems without an IOMMU. > For example, we plan to use this plus a MPU for our PCIe WiFi which is > not behind an IOMMU. > > > > > > - vendor specific string in the form ,[-] > > > no-map (optional) - empty property > > > - Indicates the operating system must not create a virtual mapping > > > @@ -117,6 +135,16 @@ one for multimedia processing (named multimedia-memory@77000000, 64MiB). > > > compatible = "acme,multimedia-memory"; > > > reg = <0x77000000 0x4000000>; > > > }; > > > + > > > + wifi_coherent_mem_region: wifi_coherent_mem_region { > > > + compatible = "shared-dma-pool"; > > > + reg = <0x50000000 0x400000>; > > > + }; > > > + > > > + wifi_device_swiotlb_region: wifi_device_swiotlb_region { > > > + compatible = "device-swiotlb-pool"; > > > + reg = <0x50400000 0x4000000>; > > > + }; > > > }; > > > > > > /* ... */ > > > @@ -135,4 +163,11 @@ one for multimedia processing (named multimedia-memory@77000000, 64MiB). > > > memory-region = <&multimedia_reserved>; > > > /* ... */ > > > }; > > > + > > > + pcie_wifi: pcie_wifi@0,0 { > > > + memory-region = <&wifi_coherent_mem_region>, > > > + <&wifi_device_swiotlb_region>; > > > + restricted-dma = <0>, <1>; > > > + /* ... */ > > > + }; > > > }; > > > -- > > > 2.28.0.rc0.142.g3c755180ce-goog > > >