Received: by 2002:a05:7412:3784:b0:e2:908c:2ebd with SMTP id jk4csp2826866rdb; Wed, 4 Oct 2023 12:39:11 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGjHsVpP7z0HvGKE6NAf8aI8nIc/9D+J12fVUikJE33xfN27vp/6HkitadLLeLXwO5TNNM5 X-Received: by 2002:a17:903:2287:b0:1c5:ff18:98af with SMTP id b7-20020a170903228700b001c5ff1898afmr4051303plh.4.1696448351338; Wed, 04 Oct 2023 12:39:11 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696448351; cv=none; d=google.com; s=arc-20160816; b=LeBxCw9yDj2UbM9PbWL97bs+AJ3u7ZHZkn/2hqcr+2PWtVrUiObu+FVfh5TKzmwoSy 2wjAmBzKJg88efofDLYZQq1xAn9f/flHP0LevtoJUMc4y6jCqLBi8jnzuJFZe35+6kHA 1Y2pUL00JLVv7MTK6SX1aN8u871hOKEc7QIPzvraY7pcsgH5Gh41o27MEimutiPDlWYt f543i3UkwABqzaMqUvIFyrtb20adFNDK48a6kZH+tuKfLEDcwfKFop/KP/qovY2BJI2F JbahswNSdwifGKj3b1xXCHv92fdW5Cwo2fQbYqDahKoGaLuKgL9PpMSBEuAGSYSk9hei qT0Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=BiIXaYgf+cTlwMdh3Etf3VuVxQGaXSPvbSsTq7S8dSw=; fh=Bk2XjfFtbQWI3zfi/dhOFelDRBzPjmYFR4jZqX4FCrs=; b=wHMboXvYozMal9r0frb9StQQ5NuGv71M8U7xKBeLgdaodvrVq7zOyNb2hJVDVTcl9j Fb+3k7bXa2SX+iddmNnAH1mvIHpiiuN3PCnJJ+gv0SAoofTRepYI4N4X1qwnsFMtnbjv Z2dzI1CLKSCY+YHLpg41akqHShVo4l2nBsTq++yBtdCXs6Mqys/lUzcYyqm9CB3A8j+d 1n2+xIMp6E+lGyMEqPKZdXxLoyJysBwWCMAeGcG4JYoogcvBDve2PtMmGwTGP/ssnX4m SuM21Gf2TumMbH74ry7cz3i+wc4F0l+7inJLkQ1nOmRKcVfDaIiOT1j9hImFEBoAuRgS 9wTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id kt15-20020a170903088f00b001bb9533b968si4193929plb.408.2023.10.04.12.39.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 04 Oct 2023 12:39:11 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 84D8B8120448; Wed, 4 Oct 2023 12:39:08 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233827AbjJDTi7 (ORCPT + 99 others); Wed, 4 Oct 2023 15:38:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34436 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233651AbjJDTi6 (ORCPT ); Wed, 4 Oct 2023 15:38:58 -0400 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id EFD31AB; Wed, 4 Oct 2023 12:38:52 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 3BC50C15; Wed, 4 Oct 2023 12:39:31 -0700 (PDT) Received: from [10.57.67.242] (unknown [10.57.67.242]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 89C933F762; Wed, 4 Oct 2023 12:38:47 -0700 (PDT) Message-ID: <498ffcef-2ff9-495b-8544-b87c5c2eb6e1@arm.com> Date: Wed, 4 Oct 2023 20:38:39 +0100 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH 0/6] RISC-V: Add eMMC support for TH1520 boards Content-Language: en-GB To: Samuel Holland , "Lad, Prabhakar" Cc: Ulf Hansson , Jisheng Zhang , Drew Fustini , linux-kernel@vger.kernel.org, Linux-MM , Guo Ren , Krzysztof Kozlowski , linux-riscv@lists.infradead.org, Christoph Hellwig , Geert Uytterhoeven , Fabrizio Castro , devicetree@vger.kernel.org, Conor Dooley , Albert Ou , Alexandre Ghiti , Arnd Bergmann , Han Gao , Lad Prabhakar , Jason Kridner , Paul Walmsley , Robert Nelson , linux-mmc@vger.kernel.org, Adrian Hunter , Conor Dooley , =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , Rob Herring , Palmer Dabbelt , Xi Ruoyao , Fu Wei References: <20230921-th1520-mmc-v1-0-49f76c274fb3@baylibre.com> <20075b03-e3b0-4f29-9ba1-98eed361a44f@sifive.com> From: Robin Murphy In-Reply-To: <20075b03-e3b0-4f29-9ba1-98eed361a44f@sifive.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=2.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RCVD_IN_SBL_CSS,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 04 Oct 2023 12:39:08 -0700 (PDT) X-Spam-Level: ** On 2023-10-04 19:49, Samuel Holland wrote: > On 2023-10-04 12:16 PM, Lad, Prabhakar wrote: >> On Wed, Oct 4, 2023 at 5:03 PM Lad, Prabhakar >> wrote: >>> >>> On Wed, Oct 4, 2023 at 3:18 PM Robin Murphy wrote: >>>> >>>> On 04/10/2023 3:02 pm, Icenowy Zheng wrote: >>>> [...] >>>>>>>> I believe commit 484861e09f3e ("soc: renesas: Kconfig: Select the >>>>>>>> required configs for RZ/Five SoC") can cause regression on all >>>>>>>> non-dma-coherent riscv platforms with generic defconfig. This is >>>>>>>> a common issue. The logic here is: generic riscv defconfig >>>>>>>> selects >>>>>>>> ARCH_R9A07G043 which selects DMA_GLOBAL_POOL, which assumes all >>>>>>>> non-dma-coherent riscv platforms have a dma global pool, this >>>>>>>> assumption >>>>>>>> seems not correct. And I believe DMA_GLOBAL_POOL should not be >>>>>>>> selected by ARCH_SOCFAMILIY, instead, only ARCH under some >>>>>>>> specific >>>>>>>> conditions can select it globaly, for example NOMMU ARM and so >>>>>>>> on. >>>>>>>> >>>>>>>> Since this is a regression, what's proper fix? any suggestion is >>>>>>>> appreciated. >>>>>> >>>>>> I think the answer is to not select DMA_GLOBAL_POOL, since that is >>>>>> only >>>>> >>>>> Well I think for RISC-V, it's not NOMMU only but applicable for every >>>>> core that does not support Svpbmt or vendor-specific alternatives, >>>>> because the original RISC-V priv spec does not define memory attributes >>>>> in page table entries. >>>>> >>>>> For the Renesas/Andes case I think a pool is set by OpenSBI with >>>>> vendor-specific M-mode facility and then passed in DT, and the S-mode >>>>> (which MMU is enabled in) just sees fixed memory attributes, in this >>>>> case I think DMA_GLOBAL_POOL is needed. >>>> >>>> Oh wow, is that really a thing? In that case, either you just can't >>>> support this platform in a multi-platform kernel, or someone needs to do >>>> some fiddly work in dma-direct to a) introduce the notion of an optional >>>> global pool, >>> Looking at the code [0] we do have compile time check for >>> CONFIG_DMA_GLOBAL_POOL irrespective of this being present in DT or >>> not, instead if we make it compile time and runtime check ie either >>> check for DT node or see if pool is available and only then proceed >>> for allocation form this pool. >>> >>> What are your thoughts on this? >>> >> Something like the below: >> >> diff --git a/include/linux/dma-map-ops.h b/include/linux/dma-map-ops.h >> index f2fc203fb8a1..7bf41a4634a4 100644 >> --- a/include/linux/dma-map-ops.h >> +++ b/include/linux/dma-map-ops.h >> @@ -198,6 +198,7 @@ int dma_release_from_global_coherent(int order, >> void *vaddr); >> int dma_mmap_from_global_coherent(struct vm_area_struct *vma, void *cpu_addr, >> size_t size, int *ret); >> int dma_init_global_coherent(phys_addr_t phys_addr, size_t size); >> +bool dma_global_pool_available(void); >> #else >> static inline void *dma_alloc_from_global_coherent(struct device *dev, >> ssize_t size, dma_addr_t *dma_handle) >> @@ -213,6 +214,10 @@ static inline int >> dma_mmap_from_global_coherent(struct vm_area_struct *vma, >> { >> return 0; >> } >> +static inline bool dma_global_pool_available(void) >> +{ >> + return false; >> +} >> #endif /* CONFIG_DMA_GLOBAL_POOL */ >> >> /* >> diff --git a/kernel/dma/coherent.c b/kernel/dma/coherent.c >> index c21abc77c53e..605f243b8262 100644 >> --- a/kernel/dma/coherent.c >> +++ b/kernel/dma/coherent.c >> @@ -277,6 +277,14 @@ int dma_mmap_from_dev_coherent(struct device >> *dev, struct vm_area_struct *vma, >> #ifdef CONFIG_DMA_GLOBAL_POOL >> static struct dma_coherent_mem *dma_coherent_default_memory __ro_after_init; >> >> +bool dma_global_pool_available(void) >> +{ >> + if (!dma_coherent_default_memory) >> + return false; >> + >> + return true; >> +} >> + >> void *dma_alloc_from_global_coherent(struct device *dev, ssize_t size, >> dma_addr_t *dma_handle) >> { >> diff --git a/kernel/dma/direct.c b/kernel/dma/direct.c >> index 9596ae1aa0da..a599bb731ceb 100644 >> --- a/kernel/dma/direct.c >> +++ b/kernel/dma/direct.c >> @@ -235,7 +235,7 @@ void *dma_direct_alloc(struct device *dev, size_t size, >> * If there is a global pool, always allocate from it for >> * non-coherent devices. >> */ >> - if (IS_ENABLED(CONFIG_DMA_GLOBAL_POOL)) >> + if (IS_ENABLED(CONFIG_DMA_GLOBAL_POOL) && >> dma_global_pool_available()) >> return dma_alloc_from_global_coherent(dev, size, >> dma_handle); > > dma_alloc_from_global_coherent() already checks dma_coherent_default_memory, so > the solution could be even simpler: > > --- a/kernel/dma/direct.c > +++ b/kernel/dma/direct.c > @@ -232,12 +232,12 @@ void *dma_direct_alloc(struct device *dev, size_t size, > attrs); > > /* > - * If there is a global pool, always allocate from it for > + * If there is a global pool, always try to allocate from it for > * non-coherent devices. > */ > - if (IS_ENABLED(CONFIG_DMA_GLOBAL_POOL)) > - return dma_alloc_from_global_coherent(dev, size, > - dma_handle); > + ret = dma_alloc_from_global_coherent(dev, size, dma_handle); > + if (ret) > + return ret; So if allocation fails because the pool is full, we should go ahead and remap something that can't work? ;) The dma_global_pool_available() idea sort of works, but I'm still concerned about the case where it *should* have been available but the platform has been misconfigured, so again we fall through to DMA_DIRECT_REMAP "successfully" returning a coherent buffer that isn't, and the user's filesystem gets corrupted. Or at best, they get confused by weird errors from random devices going wrong. That's why I said it would be fiddly - the current state of DMA_GLOBAL_POOL as a binary arch-wide thing is relatively robust and easy to reason about, but attempting to generalise it further is... less so. Thanks, Robin. > > /* > * Otherwise remap if the architecture is asking for it. But > > Regards, > Samuel >