Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp5409977pxv; Wed, 21 Jul 2021 04:57:24 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwno5pshGi8hLANoZ6TlYnHW3Gde7pAnxy9sZkU1qlGGhSfnjqRfYJ+KM9faW7bYK8+HG2X X-Received: by 2002:aa7:dd8d:: with SMTP id g13mr47698519edv.336.1626868644494; Wed, 21 Jul 2021 04:57:24 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1626868644; cv=none; d=google.com; s=arc-20160816; b=i2lijs3MwWXQLr7W2/stO1nUpfPwHWf+6VFSY6BnauVkB2DE8fiAxI3Xs6TTfbXVZ3 OGVN1wSQe9EBYVYOr/P6YGmvo7lTPSGsL14cgbf1QtnfG9vzfNcCaNUJyoZCXThFGD3B NsH3sNPUM8RGQRdoMxSh1whJ38vbywiDY9VmfdPm3YVNCCxB8u4yuAjM8OP/mf32ljBB 0HF6ep0FkqMq0JcscZaFG2Jt16c2UjwH+ifnv6nb1RIyXSFJE2+FEWYHF/BRDqA+1k6J SXMsAsPCeHuEpvx7gLMxtFlS23iepuBEdvyPPAx3mwlR1gvVduW1PF1i3rRTAUl0FwA8 IdGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=tPx3pj7zRbkSOPg7Bv7K/B+BSmdfuF+H8Iy1MkcKET8=; b=vlpAkjDUWt/DWqGidyfJ3E1Td6PQJ/RG41g0ldfatV7/wWR6kpsFlRpY12fYXa8tmu qz0V2JuuoIkNSmoLvDRjHHnrwzHlKrrG1tLk4P7pjcYaFMi/KeMRciMuWoXk+Xh24MEn MnspMR1hUaB7Az6paWaMItRNbqml8sPFDqi+Z/UVtk9fDP0nyFE2WYOvLVuL+fdkkCQd rtJnq5qLDy1wsEZb+eDhOa6tgVU4H3OFGroOXFf01QyF0l9LaoV3g/4PFmfE+IeHZkLR wwBtzS1LBLjvoNcYLusVTIeYnZWbgNz19p6Ca0t2Qw4d2Ic4jsw9raVRtaI7D032c/kY vb6w== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b10si15289984edr.274.2021.07.21.04.57.01; Wed, 21 Jul 2021 04:57:24 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238723AbhGULOu (ORCPT + 99 others); Wed, 21 Jul 2021 07:14:50 -0400 Received: from foss.arm.com ([217.140.110.172]:52530 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239238AbhGULBp (ORCPT ); Wed, 21 Jul 2021 07:01:45 -0400 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 63E9E31B; Wed, 21 Jul 2021 04:42:22 -0700 (PDT) Received: from [10.57.36.146] (unknown [10.57.36.146]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 2D1273F694; Wed, 21 Jul 2021 04:42:20 -0700 (PDT) Subject: Re: [PATCH -next] iommu/arm-smmu-v3: Add suspend and resume support To: Bixuan Cui , iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org, will@kernel.org Cc: weiyongjun1@huawei.com, john.wanghui@huawei.com, dingtianhong@huawei.com, thunder.leizhen@huawei.com, guohanjun@huawei.com, joro@8bytes.org, jean-philippe@linaro.org, Jonathan.Cameron@huawei.com, song.bao.hua@hisilicon.com, linux-arm-kernel@lists.infradead.org, Marc Zyngier References: <20210721013350.17664-1-cuibixuan@huawei.com> From: Robin Murphy Message-ID: <4e506481-5f6c-9c5e-eda3-300861581080@arm.com> Date: Wed, 21 Jul 2021 12:42:14 +0100 User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:78.0) Gecko/20100101 Thunderbird/78.12.0 MIME-Version: 1.0 In-Reply-To: <20210721013350.17664-1-cuibixuan@huawei.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-GB Content-Transfer-Encoding: 7bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org [ +Marc for MSI bits ] On 2021-07-21 02:33, Bixuan Cui wrote: > Add suspend and resume support for arm-smmu-v3 by low-power mode. > > When the smmu is suspended, it is powered off and the registers are > cleared. So saves the msi_msg context during msi interrupt initialization > of smmu. When resume happens it calls arm_smmu_device_reset() to restore > the registers. > > Signed-off-by: Bixuan Cui > Reviewed-by: Wei Yongjun > Reviewed-by: Zhen Lei > Reviewed-by: Ding Tianhong > Reviewed-by: Hanjun Guo > --- > > drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c | 72 ++++++++++++++++++--- > 1 file changed, 64 insertions(+), 8 deletions(-) > > diff --git a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > index 235f9bdaeaf2..bf1163acbcb1 100644 > --- a/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > +++ b/drivers/iommu/arm/arm-smmu-v3/arm-smmu-v3.c > @@ -40,6 +40,7 @@ MODULE_PARM_DESC(disable_bypass, > > static bool disable_msipolling; > module_param(disable_msipolling, bool, 0444); > +static bool bypass; > MODULE_PARM_DESC(disable_msipolling, > "Disable MSI-based polling for CMD_SYNC completion."); > > @@ -3129,11 +3130,37 @@ static void arm_smmu_write_msi_msg(struct msi_desc *desc, struct msi_msg *msg) > doorbell = (((u64)msg->address_hi) << 32) | msg->address_lo; > doorbell &= MSI_CFG0_ADDR_MASK; > > + /* Saves the msg context for resume if desc->msg is empty */ > + if (desc->msg.address_lo == 0 && desc->msg.address_hi == 0) { > + desc->msg.address_lo = msg->address_lo; > + desc->msg.address_hi = msg->address_hi; > + desc->msg.data = msg->data; > + } My gut feeling is that this is something a device driver maybe shouldn't be poking into, but I'm not entirely familiar with the area :/ > + > writeq_relaxed(doorbell, smmu->base + cfg[0]); > writel_relaxed(msg->data, smmu->base + cfg[1]); > writel_relaxed(ARM_SMMU_MEMATTR_DEVICE_nGnRE, smmu->base + cfg[2]); > } > > +static void arm_smmu_resume_msis(struct arm_smmu_device *smmu) > +{ > + struct msi_desc *desc; > + struct device *dev = smmu->dev; > + > + for_each_msi_entry(desc, dev) { > + switch (desc->platform.msi_index) { > + case EVTQ_MSI_INDEX: > + case GERROR_MSI_INDEX: > + case PRIQ_MSI_INDEX: > + arm_smmu_write_msi_msg(desc, &(desc->msg)); > + break; > + default: > + continue; > + > + } > + } > +} > + > static void arm_smmu_setup_msis(struct arm_smmu_device *smmu) > { > struct msi_desc *desc; > @@ -3184,11 +3211,17 @@ static void arm_smmu_setup_msis(struct arm_smmu_device *smmu) > devm_add_action(dev, arm_smmu_free_msis, dev); > } > > -static void arm_smmu_setup_unique_irqs(struct arm_smmu_device *smmu) > +static void arm_smmu_setup_unique_irqs(struct arm_smmu_device *smmu, bool resume_mode) > { > int irq, ret; > > - arm_smmu_setup_msis(smmu); > + if (!resume_mode) > + arm_smmu_setup_msis(smmu); > + else { > + /* The irq doesn't need to be re-requested during resume */ > + arm_smmu_resume_msis(smmu); > + return; What about wired IRQs? > + } > > /* Request interrupt lines */ > irq = smmu->evtq.q.irq; > @@ -3230,7 +3263,7 @@ static void arm_smmu_setup_unique_irqs(struct arm_smmu_device *smmu) > } > } > > -static int arm_smmu_setup_irqs(struct arm_smmu_device *smmu) > +static int arm_smmu_setup_irqs(struct arm_smmu_device *smmu, bool resume_mode) > { > int ret, irq; > u32 irqen_flags = IRQ_CTRL_EVTQ_IRQEN | IRQ_CTRL_GERROR_IRQEN; > @@ -3257,7 +3290,7 @@ static int arm_smmu_setup_irqs(struct arm_smmu_device *smmu) > if (ret < 0) > dev_warn(smmu->dev, "failed to enable combined irq\n"); > } else > - arm_smmu_setup_unique_irqs(smmu); > + arm_smmu_setup_unique_irqs(smmu, resume_mode); > > if (smmu->features & ARM_SMMU_FEAT_PRI) > irqen_flags |= IRQ_CTRL_PRIQ_IRQEN; > @@ -3282,7 +3315,7 @@ static int arm_smmu_device_disable(struct arm_smmu_device *smmu) > return ret; > } > > -static int arm_smmu_device_reset(struct arm_smmu_device *smmu, bool bypass) > +static int arm_smmu_device_reset(struct arm_smmu_device *smmu, bool resume_mode) Er, what about the use of "bypass" towards the end of the function. Have you even compiled this? > { > int ret; > u32 reg, enables; > @@ -3392,7 +3425,7 @@ static int arm_smmu_device_reset(struct arm_smmu_device *smmu, bool bypass) > } > } > > - ret = arm_smmu_setup_irqs(smmu); > + ret = arm_smmu_setup_irqs(smmu, resume_mode); > if (ret) { > dev_err(smmu->dev, "failed to setup irqs\n"); > return ret; > @@ -3749,6 +3782,24 @@ static void __iomem *arm_smmu_ioremap(struct device *dev, resource_size_t start, > return devm_ioremap_resource(dev, &res); > } > > +static int __maybe_unused arm_smmu_suspend(struct device *dev) > +{ > + /* > + * The smmu is powered off and related registers are automatically > + * cleared when suspend. No need to do anything. > + */ Is that guaranteed? What if suspend is only implemented by external clock-gating? > + return 0; > +} > + > +static int __maybe_unused arm_smmu_resume(struct device *dev) > +{ > + struct arm_smmu_device *smmu = dev_get_drvdata(dev); > + > + arm_smmu_device_reset(smmu, true); > + > + return 0; > +} > + > static int arm_smmu_device_probe(struct platform_device *pdev) > { > int irq, ret; > @@ -3756,7 +3807,6 @@ static int arm_smmu_device_probe(struct platform_device *pdev) > resource_size_t ioaddr; > struct arm_smmu_device *smmu; > struct device *dev = &pdev->dev; > - bool bypass; Once again... > smmu = devm_kzalloc(dev, sizeof(*smmu), GFP_KERNEL); > if (!smmu) > @@ -3831,7 +3881,7 @@ static int arm_smmu_device_probe(struct platform_device *pdev) > platform_set_drvdata(pdev, smmu); > > /* Reset the device */ > - ret = arm_smmu_device_reset(smmu, bypass); ...either this is based on some out-of-tree hack which introduced its own uninitialised-usage bug here, or it doesn't even compile. > + ret = arm_smmu_device_reset(smmu, false); > if (ret) > return ret; > > @@ -3884,6 +3934,11 @@ static const struct of_device_id arm_smmu_of_match[] = { > }; > MODULE_DEVICE_TABLE(of, arm_smmu_of_match); > > +static const struct dev_pm_ops arm_smmu_pm_ops = { > + .suspend = arm_smmu_suspend, > + .resume = arm_smmu_resume, Either use SET_SYSTEM_SLEEP_PM_OPS() here or drop the __maybe_unused annmotations above - they're pointless if the callbacks are referenced unconditionally. Robin. > +}; > + > static void arm_smmu_driver_unregister(struct platform_driver *drv) > { > arm_smmu_sva_notifier_synchronize(); > @@ -3895,6 +3950,7 @@ static struct platform_driver arm_smmu_driver = { > .name = "arm-smmu-v3", > .of_match_table = arm_smmu_of_match, > .suppress_bind_attrs = true, > + .pm = &arm_smmu_pm_ops, > }, > .probe = arm_smmu_device_probe, > .remove = arm_smmu_device_remove, >