Received: by 2002:a05:6a10:1287:0:0:0:0 with SMTP id d7csp6918872pxv; Fri, 30 Jul 2021 05:54:16 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw81gdZVcgAYsGcXpD/BbL+Q4zMQOZkX4UAaqsxdaG5JEWbl4SUJ1T/3c/o4i2qjUNeCnPS X-Received: by 2002:a50:fb05:: with SMTP id d5mr2526395edq.5.1627649656730; Fri, 30 Jul 2021 05:54:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1627649656; cv=none; d=google.com; s=arc-20160816; b=EqUadLtHaLyQzk8wHN1VXaw17p16M46csmmtXx7mo6t0NRDs8ajir3CEAust7Ynatl bIjV3vk5MbP6IXGJox3fbbzonJnDV4ZiaYKvv5dpt79aMDhgQMGXhVa6jT7Po+xn+gnw rS++lwiQuGus28zuND0l73susBEW4pK7YIs9JvKFQ2coAohTmNE71uP0gqfoOKQ7wvdD vGLbUG0fUWyW60e4lTOklW2dBihigQ6qw5Uk7U6k5w3Erxb4HWf484vERkpICp9J0uFH TZ7bx4eYuaDWwgy2PjTBYAkEDt78x7HFvYVjJP4sg1AJFA8ML/q5Ql7LMnQVY7GEP5pg cDBQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=JRJg8Yt0U6MfjJjZ+DX2839RWMcH0T2dHrmZnol6HtM=; b=tojj/ZXPFpwqfj7TX5OYnhV5LZntqL9GF0EQ+O1YM4r+TQZTsC1elH7NMeQeizN3tA BJ0N7349OYOYdoG2LJpvCjb3bQJ6o6XdXNLy6hmCSsbpu+Tjh4luE/3FXtF67MFH8EbJ 93oZZ8jc7UxQk8C2NKs24N5KWuYdf0d+4fs/ge7awwL8lT3Ygl8PSKC2Ec5Kihv5oNel 5/L2SLB3w0Y0VHUgRPR7Ynr9njlLoHR3smWDRepSwJxJbYz2vNoaBptMqh0rTLLpXe1J YJfRDy7mf+Hi6oiS9bvfumRbt0NL4ZbUpZ363QT3m2y1juBMuOHfPKykCM5XpufJS/b5 sL5g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e11si1463615edv.530.2021.07.30.05.53.52; Fri, 30 Jul 2021 05:54:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=collabora.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231266AbhG3MwO (ORCPT + 99 others); Fri, 30 Jul 2021 08:52:14 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44042 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230445AbhG3MwN (ORCPT ); Fri, 30 Jul 2021 08:52:13 -0400 Received: from bhuna.collabora.co.uk (bhuna.collabora.co.uk [IPv6:2a00:1098:0:82:1000:25:2eeb:e3e3]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 425E1C061765; Fri, 30 Jul 2021 05:52:09 -0700 (PDT) Received: from [IPv6:2a02:810a:880:f54:51e7:d967:c146:d0c] (unknown [IPv6:2a02:810a:880:f54:51e7:d967:c146:d0c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: dafna) by bhuna.collabora.co.uk (Postfix) with ESMTPSA id 7DA241F448DA; Fri, 30 Jul 2021 13:52:07 +0100 (BST) Subject: Re: [PATCH v7 3/4] iommu: rockchip: Add internal ops to handle variants To: Robin Murphy , =?UTF-8?Q?Heiko_St=c3=bcbner?= , Benjamin Gaignard , joro@8bytes.org, will@kernel.org, robh+dt@kernel.org, xxm@rock-chips.com, Ezequiel Garcia Cc: devicetree@vger.kernel.org, linux-kernel@vger.kernel.org, linux-rockchip@lists.infradead.org, iommu@lists.linux-foundation.org, kernel@collabora.com, linux-arm-kernel@lists.infradead.org References: <20210525121551.606240-1-benjamin.gaignard@collabora.com> <20210525121551.606240-4-benjamin.gaignard@collabora.com> <3544194.oiGErgHkdL@diego> <06cdd178-66af-9ff7-5100-3da4e901040f@arm.com> From: Dafna Hirschfeld Message-ID: <4ad13d07-85d3-390d-123c-a7ed47056385@collabora.com> Date: Fri, 30 Jul 2021 14:52:03 +0200 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.11.0 MIME-Version: 1.0 In-Reply-To: <06cdd178-66af-9ff7-5100-3da4e901040f@arm.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 29.07.21 18:58, Robin Murphy wrote: > On 2021-07-29 17:08, Heiko Stübner wrote: >> Hi Dafna, >> >> Am Donnerstag, 29. Juli 2021, 17:59:26 CEST schrieb Dafna Hirschfeld: >>> On 25.05.21 14:15, Benjamin Gaignard wrote: >>>> @@ -879,7 +895,7 @@ static int rk_iommu_enable(struct rk_iommu *iommu) >>>>        for (i = 0; i < iommu->num_mmu; i++) { >>>>            rk_iommu_write(iommu->bases[i], RK_MMU_DTE_ADDR, >>>> -                   rk_domain->dt_dma); >>>> +                   rk_ops->dma_addr_dte(rk_domain->dt_dma)); >>> >>> Hi, >>> This is not related to that patch, I was wondring why are all mmu devices initialized >>> with the same dt_dma? >>> I see for example that the isp0_mmu in rk3399.dtsi has two resources. Can't each resource >>> be initialized with different dt_dma and this way there are two dt tables instead of the two mmus pointing >>> to the same dt table. >> >> maybe >> git log -1 cd6438c5f8446691afa4829fe1a9d7b656204f11 >> >> "iommu/rockchip: Reconstruct to support multi slaves >> There are some IPs, such as video encoder/decoder, contains 2 slave iommus, >> one for reading and the other for writing. They share the same irq and >> clock with master. >> This patch reconstructs to support this case by making them share the same >> Page Directory, Page Tables and even the register operations. >> That means every instruction to the reading MMU registers would be >> duplicated to the writing MMU and vice versa." > > Right. In theory we *could* maintain a separate pagetable for each IOMMU instance, but it would just lead to a load of complexity and overhead. For a map request, we'd have to do extra work to decide which table(s) need modifying, and duplicate all the work of the actual mapping if it's more than one. For an unmap request, we'd have no choice but to walk *all* the tables backing that domain to figure out which (if any) actually had it mapped in the first place. > > Given that we already have distinct read and write permissions for mappings within a single table, there's not even any functional benefit that could be gained in this case (and in the more general case where the device might emit all kinds of transactions from all its interfaces you'd have to maintain identical mappings for all its IOMMUs anyway). Saving memory and code complexity by physically sharing one pagetable and not worrying about trying to do selective TLB maintenance is a bigger win than anything else could be. > > Robin. Hi, I just try to understand how this iommu hardware/software works. I have two questions, 1. So we currently miss a potential mapping of the hardware right? I mean , each mmu can map 1024*1024*4K = 4G addresses, so two mmus can potentially map 8G. But since we set them to identical values, we can map only up to 4G. 2. What is the benefit of setting all mmus if they are all set to the same values? Can't we just work with the first mmu like it was done before that patch cd6438c5f8446691afa4829fe1a9d7b656204f11 Thanks, Dafna