Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp3804616pxk; Tue, 8 Sep 2020 03:01:08 -0700 (PDT) X-Google-Smtp-Source: ABdhPJz2gO5btYaj1DZ+eWVDY2QqIokE/s/IJYR1kxoG7FWgZ9u95132qgcjvWbEOzC/QG4EhGQC X-Received: by 2002:a05:6402:17b5:: with SMTP id j21mr25328036edy.276.1599559268772; Tue, 08 Sep 2020 03:01:08 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1599559268; cv=none; d=google.com; s=arc-20160816; b=cCpxSNEhFWvRDcggpVaOCYPPfiARsz1Top8rHAMXRIKYN66+v/OLJZaBNAGO4Exlum YBPg9ZskzyeqwALGZBYiD1MCgRVZAbiZPskzWWZpquGzM2/MhyOWdxyrWHEifWCJjWU1 G22HiodNyivn/DygTzDqfopGjN6ucsMi+T637/MEz6cyzmdWDP2Oe6K5UWwB1J7u86gi EbU6h1WO95g0kdjurg8Bfx/K4+rB9XWCeUYzTYcC0VcSmRPyFx9MiUHGU0/+feg3E4vm N/Q1cTM/yH+LMATG6I1PQkoQGCf+tDhmteDq+XOd+JbdJdFbPpcymZdOHcz6HkVaH050 zVKg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=gAXgXLHr4sZUGmR5wWRvQIZcW8h+Tv26UAX12qfpm58=; b=JmP9hXdx+TzR9y0u3uikSGU89VMsbdXZgUShW1iY3+/30o/PPxc3dnyakVcepMITHJ ZWfzHLtBDnWyVmQPCaNJtDlzFMmfQDUIVJ9Wq2ucGBu+ly7j4MBh0p+yYQKOQVViXimh 7w1omB/MLQVVZfDvydYHZswQH39p2PX3qU2L5/crmAcb7Jr3GbkgPejrcDQ2YVoWEpu9 I+wzZ8xgyLB+4YcLcGetl4oPCR9BjTDaUtnmh3dWFxlwG4PqYymf4GoqRnkApRxSm3hv YJYK49rpyF8ItsfmGmR4zgv9MNZuc5kBmSQB89d/568T9/aDJpNiw4M75InUw6fLTHbq DSGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Zz9Xr5hi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id wk12si11715531ejb.130.2020.09.08.03.00.45; Tue, 08 Sep 2020 03:01:08 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=Zz9Xr5hi; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729053AbgIHJ5S (ORCPT + 99 others); Tue, 8 Sep 2020 05:57:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54688 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728873AbgIHJ5N (ORCPT ); Tue, 8 Sep 2020 05:57:13 -0400 Received: from mail-il1-x141.google.com (mail-il1-x141.google.com [IPv6:2607:f8b0:4864:20::141]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 178FEC061573 for ; Tue, 8 Sep 2020 02:57:13 -0700 (PDT) Received: by mail-il1-x141.google.com with SMTP id t13so14770219ile.9 for ; Tue, 08 Sep 2020 02:57:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=gAXgXLHr4sZUGmR5wWRvQIZcW8h+Tv26UAX12qfpm58=; b=Zz9Xr5hidITx4JOxvC6dEk1TLY5MJQa1WczmuIckQJWDwNyn9CCC5UcO34yEAC2CMZ CsROkGHodev4SuThtZ4ypLG/0HCKWWCPgpRiWkTTCORBmyh5C7LtbeBOVt+Bns+rjt0R Hgbd1S9JxaIw67qRt0A7Q5rIqtgR0RyNI6Zdo= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=gAXgXLHr4sZUGmR5wWRvQIZcW8h+Tv26UAX12qfpm58=; b=r8+5b3KZqIpymtZDq1bBJs+sUYKfsdFOxj0TRecehC+wcJSKudPJMzcm0u5HaWI9ZF c0zCSy4Eochg7Ut4j50WtaPNPtJ9HVmwLJqyaL0l501/M+yP6Q810T97AIe3kLV1+5Cx stizdEvQqUrg8afSztgy+JNGKP5rOzNvGotLniyoB2OwX8wr1W+6tRlf7YtBtfuaQFnK w4lN44SEEKRW+Hd7WWJfG41lZ+dYyZwiDvbqI2H6Sk3Mgx8oB5Ef2ADoblIbgRUVAx6G /o+NmCjMDYUM+9htOHvErHa4vJRTMW5+DqHwvsCe67Ne1K2OQ62viJNBf8yz5V44W4tW /KAw== X-Gm-Message-State: AOAM532PGMj/rTwNL8ZIJpJa5mV1M2TSzN3s1/4tjIf7K+NC99bGorJw zWLle16VZRKVnvyNevhbztOYrblzKUK+3w== X-Received: by 2002:a92:15c5:: with SMTP id 66mr22365638ilv.44.1599559032011; Tue, 08 Sep 2020 02:57:12 -0700 (PDT) Received: from mail-io1-f51.google.com (mail-io1-f51.google.com. [209.85.166.51]) by smtp.gmail.com with ESMTPSA id k14sm8370049ioa.7.2020.09.08.02.57.11 for (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 08 Sep 2020 02:57:11 -0700 (PDT) Received: by mail-io1-f51.google.com with SMTP id r25so5439560ioj.0 for ; Tue, 08 Sep 2020 02:57:11 -0700 (PDT) X-Received: by 2002:a92:6f0a:: with SMTP id k10mr20571863ilc.5.1599558565722; Tue, 08 Sep 2020 02:49:25 -0700 (PDT) MIME-Version: 1.0 References: <20200728050140.996974-1-tientzu@chromium.org> <20200728050140.996974-5-tientzu@chromium.org> <20200731205804.GB756942@bogus> In-Reply-To: From: Claire Chang Date: Tue, 8 Sep 2020 17:49:14 +0800 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [RFC v2 4/5] dt-bindings: of: Add plumbing for restricted DMA pool To: Tomasz Figa Cc: Rob Herring , Robin Murphy , Frank Rowand , Christoph Hellwig , Marek Szyprowski , Thierry Reding , Greg KH , Saravana Kannan , suzuki.poulose@arm.com, dan.j.williams@intel.com, heikki.krogerus@linux.intel.com, Bartosz Golaszewski , linux-devicetree , lkml , "list@263.net:IOMMU DRIVERS , Joerg Roedel ," , Nicolas Boichat Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 25, 2020 at 1:30 AM Tomasz Figa wrote: > > On Tue, Aug 11, 2020 at 11:15 AM Tomasz Figa wrote: > > > > On Mon, Aug 3, 2020 at 5:15 PM Tomasz Figa wrote: > > > > > > Hi Claire and Rob, > > > > > > On Mon, Aug 3, 2020 at 4:26 PM Claire Chang wrote: > > > > > > > > On Sat, Aug 1, 2020 at 4:58 AM Rob Herring wrote: > > > > > > > > > > On Tue, Jul 28, 2020 at 01:01:39PM +0800, Claire Chang wrote: > > > > > > Introduce the new compatible string, device-swiotlb-pool, for restricted > > > > > > DMA. One can specify the address and length of the device swiotlb memory > > > > > > region by device-swiotlb-pool in the device tree. > > > > > > > > > > > > Signed-off-by: Claire Chang > > > > > > --- > > > > > > .../reserved-memory/reserved-memory.txt | 35 +++++++++++++++++++ > > > > > > 1 file changed, 35 insertions(+) > > > > > > > > > > > > diff --git a/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt b/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt > > > > > > index 4dd20de6977f..78850896e1d0 100644 > > > > > > --- a/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt > > > > > > +++ b/Documentation/devicetree/bindings/reserved-memory/reserved-memory.txt > > > > > > @@ -51,6 +51,24 @@ compatible (optional) - standard definition > > > > > > used as a shared pool of DMA buffers for a set of devices. It can > > > > > > be used by an operating system to instantiate the necessary pool > > > > > > management subsystem if necessary. > > > > > > + - device-swiotlb-pool: This indicates a region of memory meant to be > > > > > > > > > > swiotlb is a Linux thing. The binding should be independent. > > > > Got it. Thanks for pointing this out. > > > > > > > > > > > > > > > + used as a pool of device swiotlb buffers for a given device. When > > > > > > + using this, the no-map and reusable properties must not be set, so the > > > > > > + operating system can create a virtual mapping that will be used for > > > > > > + synchronization. Also, there must be a restricted-dma property in the > > > > > > + device node to specify the indexes of reserved-memory nodes. One can > > > > > > + specify two reserved-memory nodes in the device tree. One with > > > > > > + shared-dma-pool to handle the coherent DMA buffer allocation, and > > > > > > + another one with device-swiotlb-pool for regular DMA to/from system > > > > > > + memory, which would be subject to bouncing. The main purpose for > > > > > > + restricted DMA is to mitigate the lack of DMA access control on > > > > > > + systems without an IOMMU, which could result in the DMA accessing the > > > > > > + system memory at unexpected times and/or unexpected addresses, > > > > > > + possibly leading to data leakage or corruption. The feature on its own > > > > > > + provides a basic level of protection against the DMA overwriting buffer > > > > > > + contents at unexpected times. However, to protect against general data > > > > > > + leakage and system memory corruption, the system needs to provide a > > > > > > + way to restrict the DMA to a predefined memory region. > > > > > > > > > > I'm pretty sure we already support per device carveouts and I don't > > > > > understand how this is different. > > > > We use this to bounce streaming DMA in and out of a specially allocated region. > > > > I'll try to merge this with the existing one (i.e., shared-dma-pool) > > > > to see if that > > > > makes things clearer. > > > > > > > > > > Indeed, from the firmware point of view, this is just a carveout, for > > > which we have the "shared-dma-pool" compatible string defined already. > > > > > > However, depending on the device and firmware setup, the way the > > > carevout is used may change. I can see the following scenarios: > > > > > > 1) coherent DMA (dma_alloc_*) within a reserved pool and no > > > non-coherent DMA (dma_map_*). > > > > > > This is how the "memory-region" property is handled today in Linux for > > > devices which can only DMA from/to the given memory region. However, > > > I'm not sure if no non-coherent DMA is actually enforced in any way by > > > the DMA subsystem. > > > > > > 2) coherent DMA from a reserved pool and non-coherent DMA from system memory > > > > > > This is the case for the systems which have some dedicated part of > > > memory which is guaranteed to be coherent with the DMA, but still can > > > do non-coherent DMA to any part of the system memory. Linux handles it > > > the same way as 1), which is what made me believe that 1) might not > > > actually be handled correctly. > > > > > > 3) coherent DMA and bounced non-coherent DMA within a reserved pool > > > 4) coherent DMA within one pool and bounced non-coherent within another pool > > > > > > These are the two cases we're interested in. Basically they make it > > > possible for non-coherent DMA from arbitrary system memory to be > > > bounced through a reserved pool, which the device has access to. The > > > current series implements 4), but I'd argue that it: > > > > > > - is problematic from the firmware point of view, because on most of > > > the systems, both pools would be just some carveouts and the fact that > > > Linux would use one for coherent and the other for non-coherent DMA > > > would be an OS implementation detail, > > > - suffers from the static memory split between coherent and > > > non-coherent DMA, which could either result in some wasted memory or > > > the DMA stopped working after a kernel update if the driver changes > > > its allocation pattern, > > > > > > and so we should rather go with 3). > > > > > > Now, from the firmware point of view, it doesn't matter how the OS > > > uses the carveout, but I think it's still necessary to tell the OS > > > about the device DMA capability. Right now we use "memory-region" for > > > any kind of reserved memory, but looking at the above scenarios, there > > > are 2 cases: > > > > > > a) the memory region is preferred for the device, e.g. it enables > > > coherency, but the device can still DMA across the rest of the system > > > memory. This is the case in scenario 2) and is kind of assumed in the > > > Linux DMA subsystem, although it's certainly not the case for a lot of > > > hardware, even if they use the "memory-region" binding. > > > > > > b) the memory region is the only region that the device can access. > > > This is the case in scenarios 1), 3) and 4). > > > > > > For this, I'd like to propose a "restricted-dma-region" (feel free to > > > suggest a better name) binding, which is explicitly specified to be > > > the only DMA-able memory for this device and make Linux use the given > > > pool for coherent DMA allocations and bouncing non-coherent DMA. > > > > > > What do you think? > > > > Rob, Robin, we'd appreciate your feedback on this when you have a > > chance to take a look again. Thanks! > > Gentle ping. The "restricted-dma-region" idea sounds good to me and I'm happy to submit a new version implementing it. Rob, Robin, please kindly let us know if you have any concerns about it. Thanks! Best regards, Claire > > > > > Best regards, > > Tomasz > > > > > > > > Best regards, > > > Tomasz > > > > > > > > > > > > > What is the last sentence supposed to imply? You need an IOMMU? > > > > The main purpose is to mitigate the lack of DMA access control on > > > > systems without an IOMMU. > > > > For example, we plan to use this plus a MPU for our PCIe WiFi which is > > > > not behind an IOMMU. > > > > > > > > > > > > > > > - vendor specific string in the form ,[-] > > > > > > no-map (optional) - empty property > > > > > > - Indicates the operating system must not create a virtual mapping > > > > > > @@ -117,6 +135,16 @@ one for multimedia processing (named multimedia-memory@77000000, 64MiB). > > > > > > compatible = "acme,multimedia-memory"; > > > > > > reg = <0x77000000 0x4000000>; > > > > > > }; > > > > > > + > > > > > > + wifi_coherent_mem_region: wifi_coherent_mem_region { > > > > > > + compatible = "shared-dma-pool"; > > > > > > + reg = <0x50000000 0x400000>; > > > > > > + }; > > > > > > + > > > > > > + wifi_device_swiotlb_region: wifi_device_swiotlb_region { > > > > > > + compatible = "device-swiotlb-pool"; > > > > > > + reg = <0x50400000 0x4000000>; > > > > > > + }; > > > > > > }; > > > > > > > > > > > > /* ... */ > > > > > > @@ -135,4 +163,11 @@ one for multimedia processing (named multimedia-memory@77000000, 64MiB). > > > > > > memory-region = <&multimedia_reserved>; > > > > > > /* ... */ > > > > > > }; > > > > > > + > > > > > > + pcie_wifi: pcie_wifi@0,0 { > > > > > > + memory-region = <&wifi_coherent_mem_region>, > > > > > > + <&wifi_device_swiotlb_region>; > > > > > > + restricted-dma = <0>, <1>; > > > > > > + /* ... */ > > > > > > + }; > > > > > > }; > > > > > > -- > > > > > > 2.28.0.rc0.142.g3c755180ce-goog > > > > > >