Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp2559774rdb; Wed, 15 Nov 2023 04:33:54 -0800 (PST) X-Google-Smtp-Source: AGHT+IFv2A/SibrwN0+iEXzse059faWQBbeekj0M4+5W5BL4LHNYWKEevoYx2Q03bxuDrf9LNjji X-Received: by 2002:a92:c269:0:b0:35a:b126:5cd3 with SMTP id h9-20020a92c269000000b0035ab1265cd3mr14755019ild.12.1700051634281; Wed, 15 Nov 2023 04:33:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700051634; cv=none; d=google.com; s=arc-20160816; b=pS5BMvngWKCzQJyGEhsB/v1KxQZmJ0zKE5rnkZ1LaKNZksCu0WyRF8nrUJMo6iypG9 8D74TAwkDnolMIOUQkKPr27juk5rzOEWqTpL3VY/RfMggnKwnLpdmMOHePlrEA8IWAy/ 1jLn25F9uIz6q7EPQXra0pgf30JsCgtaPcwdimuay12xFSzcO2Y5Ab8rOD3m4ef3D+lE Z3a16tAVRlu8HkNtaZwFnAX24TOax+wkI3HoIOiCok6popgrq8MtCe5HVR7xeKaOTGJk covHvVXT5WcM39QZaSzR5seH7bsYb3006ioK5Dh8O6CqiDqsQ4NHFsbJfx4txaPJ1/S2 x5Ag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=+bQBLNYBHmMmudPkza+zGHnV3erCE+9fpiGeOg9TFG0=; fh=zOT4QarmElDHzvl2qlkHSWhCLWnUES+3DMRs1rESuX0=; b=itgc/zJtS0sMXputHVv5iXiPwCt1HC7Y9Oa79446pcfRPFwhWPTCaOXGCmhTxLOKx/ 2kbficeZQhrKsnU2swFhsFEAwfM7dTf6AMVq73coxkr5u2bKhVWmZOMMzf6ZSzAW4Keo g7iSKGBhngvguEebzQb5bVttXeG9iK/dBEfEaRhvJk8YdB81E/4rtHoHDR2ytpBYpOkE 4kdDarSpUCgtfrGCY5c5J43XwYHE8LWVQsTAboTmZP14gZAIVEcLMY8cjbYH9K+NHA8I CtL1qa+Ap78JV+3KaT0sLAGn5TapjPHI5isHnn8T6vvWqUi6jm4CAHTdujswhzymplbd vt3g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=GhKB2nU1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id 78-20020a630151000000b005bd2c1c6f60si9947696pgb.459.2023.11.15.04.33.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Nov 2023 04:33:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=GhKB2nU1; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 343F5802B3F1; Wed, 15 Nov 2023 04:33:48 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1343781AbjKOMd2 (ORCPT + 99 others); Wed, 15 Nov 2023 07:33:28 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40850 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1343773AbjKOMdZ (ORCPT ); Wed, 15 Nov 2023 07:33:25 -0500 Received: from mx0a-0031df01.pphosted.com (mx0a-0031df01.pphosted.com [205.220.168.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 3B9BA120; Wed, 15 Nov 2023 04:33:22 -0800 (PST) Received: from pps.filterd (m0279866.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3AFC8jwi003356; Wed, 15 Nov 2023 12:33:01 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=+bQBLNYBHmMmudPkza+zGHnV3erCE+9fpiGeOg9TFG0=; b=GhKB2nU1LoTqsR2eV7ZPPHf15awBcusmt/pFoseDlSF/RUKwSiHmFirXu06L1T5a6pqM NAEV03dIF5qpVwzaoEbfiBKImZiCVZCeNogKURfOIY9xHLahM7r99B2v/pagnx3Ok32t 4lC8Gfz3DAnn9AAqU9hSCmDIIg9ywxIaAoXz1XRExJ5tKANUzqv4q+7qVaHyvPf8UjPA urxnvsUPgt0Uh4q2ui+9/KFs+pz5KVtK+NhvGn4OzIQQxh/3D8nNVtM6C4JD1HzIXiaV 2mWU/l0dDeewDIpAv/qb/ywY/cM51+uYqZgrvM+uFWeOxDYyfsW7KRS787LFq8mAdmg9 UQ== Received: from nasanppmta04.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3ucfka9xcy-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 15 Nov 2023 12:33:01 +0000 Received: from nasanex01c.na.qualcomm.com (nasanex01c.na.qualcomm.com [10.45.79.139]) by NASANPPMTA04.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 3AFCX0JO011172 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Wed, 15 Nov 2023 12:33:00 GMT Received: from [10.214.227.50] (10.80.80.8) by nasanex01c.na.qualcomm.com (10.45.79.139) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.39; Wed, 15 Nov 2023 04:32:55 -0800 Message-ID: <2a65a498-6a0f-445c-9c00-9e9e4fbc3a98@quicinc.com> Date: Wed, 15 Nov 2023 18:02:52 +0530 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 1/3] iommu/arm-smmu: introduction of ACTLR for custom prefetcher settings Content-Language: en-US To: Robin Murphy , , , , , , , CC: , , , , References: <20231114135654.30475-1-quic_bibekkum@quicinc.com> <20231114135654.30475-2-quic_bibekkum@quicinc.com> <372885ab-b24d-44ae-afb8-76755bcd6e21@arm.com> From: Bibek Kumar Patro In-Reply-To: <372885ab-b24d-44ae-afb8-76755bcd6e21@arm.com> Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01a.na.qualcomm.com (10.52.223.231) To nasanex01c.na.qualcomm.com (10.45.79.139) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-ORIG-GUID: v84a0kpEEPTvhyA8EjhmdlwiqJbvOBWe X-Proofpoint-GUID: v84a0kpEEPTvhyA8EjhmdlwiqJbvOBWe X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-15_11,2023-11-15_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 lowpriorityscore=0 adultscore=0 clxscore=1015 spamscore=0 bulkscore=0 phishscore=0 mlxscore=0 mlxlogscore=999 priorityscore=1501 suspectscore=0 impostorscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311060000 definitions=main-2311150096 X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Wed, 15 Nov 2023 04:33:48 -0800 (PST) On 11/14/2023 10:25 PM, Robin Murphy wrote: > On 14/11/2023 1:56 pm, Bibek Kumar Patro wrote: >> Currently in Qualcomm  SoCs the default prefetch is set to 1 which allows >> the TLB to fetch just the next page table. MMU-500 features ACTLR >> register which is implementation defined and is used for Qualcomm SoCs >> to have a prefetch setting of 1/3/7/15 enabling TLB to prefetch >> the next set of page tables accordingly allowing for faster translations. >> >> ACTLR value is unique for each SMR (Stream matching register) and stored >> in a pre-populated table. This value is set to the register during >> context bank initialisation. >> >> Signed-off-by: Bibek Kumar Patro >> --- >>   drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c | 41 ++++++++++++++++++++++ >>   drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h |  2 ++ >>   drivers/iommu/arm/arm-smmu/arm-smmu.c      |  5 +-- >>   drivers/iommu/arm/arm-smmu/arm-smmu.h      |  5 +++ >>   4 files changed, 51 insertions(+), 2 deletions(-) >> >> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >> b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >> index 549ae4dba3a6..578c662c7c30 100644 >> --- a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >> @@ -14,6 +14,17 @@ >> >>   #define QCOM_DUMMY_VAL    -1 >> >> +struct actlr_config { >> +    const struct actlr_data *adata; >> +    size_t size; >> +}; >> + >> +struct actlr_data { >> +    u16 sid; >> +    u16 mask; > > Do we need to worry about masks? If you're already assuming that any SMR > will be programmed to match a superset of the data here, surely a single > unique ID per device would suffice? > If you refer to the arm_smmu_set_actlr below, mask would be needed as we would check for mask along with sid as well while assigning actlr configuration. Also with mask no of actlr entries can be reduces as with out mask we have to have entry for each sid. >> +    u32 actlr; >> +}; >> + >>   static struct qcom_smmu *to_qcom_smmu(struct arm_smmu_device *smmu) >>   { >>       return container_of(smmu, struct qcom_smmu, smmu); >> @@ -261,9 +272,36 @@ static const struct of_device_id >> qcom_smmu_client_of_match[] __maybe_unused = { >>       { } >>   }; >> >> +static void arm_smmu_set_actlr(struct arm_smmu_device *smmu, int idx, >> +        const struct actlr_config *actlrcfg) >> +{ >> +    struct arm_smmu_smr *smr = smmu->smrs; >> +    int i; >> +    u16 id; >> +    u16 mask; >> + >> +    for (i = 0; i < actlrcfg->size; ++i) { >> +        id = actlrcfg->adata[i].sid; >> +        mask = actlrcfg->adata[i].mask; >> +        if (!smr_is_subset(*smr, id, mask)) > > How well have you tested this? ;) > Well, this logic has worked pretty good for us till now in our downstream implementation. :) (During testing as well this logic helped to better match the SMRs instead of manually mathcing the mask and SID which missed some SIDs) Also this is already being used to arm_smmu_find_sme hence packaged this logic in a wrapper to be used in other places as well(including ACTLR register setting case here.) >> +            arm_smmu_cb_write(smmu, idx, ARM_SMMU_CB_ACTLR, >> +                    actlrcfg->adata[i].actlr); >> +    } >> +} >> + >>   static int qcom_smmu_init_context(struct arm_smmu_domain *smmu_domain, >>           struct io_pgtable_cfg *pgtbl_cfg, struct device *dev) >>   { >> +    struct arm_smmu_device *smmu = smmu_domain->smmu; >> +    struct qcom_smmu *qsmmu = to_qcom_smmu(smmu); >> +    const struct actlr_config *actlrcfg; >> +    int idx = smmu_domain->cfg.cbndx; >> + >> +    if (qsmmu->actlrcfg) { >> +        actlrcfg = qsmmu->actlrcfg; >> +        arm_smmu_set_actlr(smmu, idx, actlrcfg); >> +    } >> + >>       smmu_domain->cfg.flush_walk_prefer_tlbiasid = true; >> >>       return 0; >> @@ -467,6 +505,9 @@ static struct arm_smmu_device >> *qcom_smmu_create(struct arm_smmu_device *smmu, >>       qsmmu->smmu.impl = impl; >>       qsmmu->cfg = data->cfg; >> >> +    if (data->actlrcfg && (data->actlrcfg->size)) >> +        qsmmu->actlrcfg = data->actlrcfg; > > Do we really need to replicate multiple parts of the data, or would it > be sensible to just replace qsmmu->cfg with qsmmu->data and handle the > further dereferences in the places that want them? > >> + >>       return &qsmmu->smmu; >>   } >> >> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >> b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >> index 593910567b88..4b6862715070 100644 >> --- a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >> @@ -9,6 +9,7 @@ >>   struct qcom_smmu { >>       struct arm_smmu_device smmu; >>       const struct qcom_smmu_config *cfg; >> +    const struct actlr_config *actlrcfg; >>       bool bypass_quirk; >>       u8 bypass_cbndx; >>       u32 stall_enabled; >> @@ -25,6 +26,7 @@ struct qcom_smmu_config { >>   }; >> >>   struct qcom_smmu_match_data { >> +    const struct actlr_config *actlrcfg; >>       const struct qcom_smmu_config *cfg; >>       const struct arm_smmu_impl *impl; >>       const struct arm_smmu_impl *adreno_impl; >> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c >> b/drivers/iommu/arm/arm-smmu/arm-smmu.c >> index d6d1a2a55cc0..8e4faf015286 100644 >> --- a/drivers/iommu/arm/arm-smmu/arm-smmu.c >> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c >> @@ -990,9 +990,10 @@ static int arm_smmu_find_sme(struct >> arm_smmu_device *smmu, u16 id, u16 mask) >>            * expect simply identical entries for this case, but there's >>            * no harm in accommodating the generalisation. >>            */ >> -        if ((mask & smrs[i].mask) == mask && >> -            !((id ^ smrs[i].id) & ~smrs[i].mask)) >> + >> +        if (smr_is_subset(smrs[i], id, mask)) >>               return i; >> + >>           /* >>            * If the new entry has any other overlap with an existing one, >>            * though, then there always exists at least one stream ID >> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.h >> b/drivers/iommu/arm/arm-smmu/arm-smmu.h >> index 703fd5817ec1..b1638bbc41d4 100644 >> --- a/drivers/iommu/arm/arm-smmu/arm-smmu.h >> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.h >> @@ -501,6 +501,11 @@ static inline void arm_smmu_writeq(struct >> arm_smmu_device *smmu, int page, >>           writeq_relaxed(val, arm_smmu_page(smmu, page) + offset); >>   } >> >> +static inline bool smr_is_subset(struct arm_smmu_smr smrs, u16 id, >> u16 mask) > > Hmm, that name reads as implying the opposite of what it actually tests, > not to mention that passing structs by value is a bit horrid as well :( > It might be okay to name it as subset_of_smr() though. You have any other naming suggestion in mind which could correctly describe the logic? Thanks & regards, Bibek > Thanks, > Robin. > >> +{ >> +    return (mask & smrs.mask) == mask && !((id ^ smrs.id) & ~smrs.mask); >> +} >> + >>   #define ARM_SMMU_GR0        0 >>   #define ARM_SMMU_GR1        1 >>   #define ARM_SMMU_CB(s, n)    ((s)->numpage + (n)) >> -- >> 2.17.1 >>