Received: by 2002:a05:7412:b101:b0:e2:908c:2ebd with SMTP id az1csp2655266rdb; Wed, 15 Nov 2023 07:05:57 -0800 (PST) X-Google-Smtp-Source: AGHT+IHRjyrhPG4bpRnys2Ob0LNUKKywnrBmkOsas7oeuFbUXyU8rNHwyaj69a2u5k/KbvMJtJ36 X-Received: by 2002:a05:6a20:7fa2:b0:186:cbf2:d99e with SMTP id d34-20020a056a207fa200b00186cbf2d99emr8917623pzj.18.1700060757048; Wed, 15 Nov 2023 07:05:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700060757; cv=none; d=google.com; s=arc-20160816; b=WpqfUNyL1/xRFd17AfAPRj6HCHAdTLauT9j39xLlrI6U9b2sPqOnDeVfMY+eVrB364 bPqplT774wjXS9u1YwO1gjwqq93tm46QcwSXh+tRqt5jNzREEATthgKQMzAWkb8vPo1+ BFlb2QHKEHA9+/TAZcOgE/diwTvY1GayrLfNiGQQkyZzGod6v6N5W17HVXeN0oIxuPEs 90sTirBFV4woJ9YKAl7M2oIonU4TLLcC3alsSXOU0tnx6a4eKGGO8HMAsXt49yn1xxxo /Ow9y1I19U9OFKfbM06zGwBEkTFNgrT2vznNzIik9uKueW0lCFKc/UTlKUgz5S6yoxQj VaUQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id; bh=M5VUkH23tXguBwpwMAWxKJPy0JqAK5+Ak4PCWVzatAQ=; fh=VmMUTRhJr0azYbrrY0CN1zjZsTXZ7ZLjg9BDB7KItW0=; b=E6J7l3vMDCF54BIuVZvJmkjhfms1eOP6wGHp5ECPaW0XVYX3co1jHHMS+Lt7QN6d6t uswAwDME++laxtODLUdZ0aonftfJ/YXXbCUakZGGO8bda+0+402xLhrsYJB8BX7fqDA1 6jfDWHMfyapnaVWo1GsT4uqdnLgN5N5C1RJfAJipg4hD7IPrbcF1HVTQ+w8P6v3EezLg Q+hCtZfJVHiMexc3N8Gwqj02OLJSx8o+7N/xwKmOmFhLVKAjgpCJSlT02a13X6lGHIIO GfzUdwl/lv0haTryBsGmmp4PNzOtV0709A8Tost1kal0fxYiF9ntQtYz/Jqxu10Bl4Ol YFyA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Return-Path: Received: from groat.vger.email (groat.vger.email. [23.128.96.35]) by mx.google.com with ESMTPS id cl9-20020a056a02098900b005ad5178d053si10730541pgb.347.2023.11.15.07.05.50 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 15 Nov 2023 07:05:57 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) client-ip=23.128.96.35; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.35 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=arm.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 4605F802A3F0; Wed, 15 Nov 2023 07:05:48 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1344065AbjKOPFD (ORCPT + 99 others); Wed, 15 Nov 2023 10:05:03 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44572 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234954AbjKOPFB (ORCPT ); Wed, 15 Nov 2023 10:05:01 -0500 Received: from foss.arm.com (foss.arm.com [217.140.110.172]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 9419F8E; Wed, 15 Nov 2023 07:04:57 -0800 (PST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.121.207.14]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id F3775C15; Wed, 15 Nov 2023 07:05:42 -0800 (PST) Received: from [10.57.83.164] (unknown [10.57.83.164]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 5755F3F641; Wed, 15 Nov 2023 07:04:55 -0800 (PST) Message-ID: <23944508-1054-4a31-b119-66f006cf10de@arm.com> Date: Wed, 15 Nov 2023 15:04:53 +0000 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [PATCH v2 1/3] iommu/arm-smmu: introduction of ACTLR for custom prefetcher settings Content-Language: en-GB To: Bibek Kumar Patro , will@kernel.org, joro@8bytes.org, dmitry.baryshkov@linaro.org, a39.skl@gmail.com, konrad.dybcio@linaro.org, quic_pkondeti@quicinc.com, quic_molvera@quicinc.com Cc: linux-arm-msm@vger.kernel.org, linux-arm-kernel@lists.infradead.org, iommu@lists.linux.dev, linux-kernel@vger.kernel.org, qipl.kernel.upstream@quicinc.com References: <20231114135654.30475-1-quic_bibekkum@quicinc.com> <20231114135654.30475-2-quic_bibekkum@quicinc.com> <372885ab-b24d-44ae-afb8-76755bcd6e21@arm.com> <2a65a498-6a0f-445c-9c00-9e9e4fbc3a98@quicinc.com> From: Robin Murphy In-Reply-To: <2a65a498-6a0f-445c-9c00-9e9e4fbc3a98@quicinc.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Wed, 15 Nov 2023 07:05:48 -0800 (PST) On 2023-11-15 12:32 pm, Bibek Kumar Patro wrote: > > > On 11/14/2023 10:25 PM, Robin Murphy wrote: >> On 14/11/2023 1:56 pm, Bibek Kumar Patro wrote: >>> Currently in Qualcomm  SoCs the default prefetch is set to 1 which >>> allows >>> the TLB to fetch just the next page table. MMU-500 features ACTLR >>> register which is implementation defined and is used for Qualcomm SoCs >>> to have a prefetch setting of 1/3/7/15 enabling TLB to prefetch >>> the next set of page tables accordingly allowing for faster >>> translations. >>> >>> ACTLR value is unique for each SMR (Stream matching register) and stored >>> in a pre-populated table. This value is set to the register during >>> context bank initialisation. >>> >>> Signed-off-by: Bibek Kumar Patro >>> --- >>>   drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c | 41 ++++++++++++++++++++++ >>>   drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h |  2 ++ >>>   drivers/iommu/arm/arm-smmu/arm-smmu.c      |  5 +-- >>>   drivers/iommu/arm/arm-smmu/arm-smmu.h      |  5 +++ >>>   4 files changed, 51 insertions(+), 2 deletions(-) >>> >>> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >>> b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >>> index 549ae4dba3a6..578c662c7c30 100644 >>> --- a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >>> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.c >>> @@ -14,6 +14,17 @@ >>> >>>   #define QCOM_DUMMY_VAL    -1 >>> >>> +struct actlr_config { >>> +    const struct actlr_data *adata; >>> +    size_t size; >>> +}; >>> + >>> +struct actlr_data { >>> +    u16 sid; >>> +    u16 mask; >> >> Do we need to worry about masks? If you're already assuming that any >> SMR will be programmed to match a superset of the data here, surely a >> single unique ID per device would suffice? >> > > If you refer to the arm_smmu_set_actlr below, mask would be needed as we > would check for mask along with sid as well while assigning actlr > configuration. Also with mask no of actlr entries can be reduces as > with out mask we have to have entry for each sid. But why? As far as I can tell, the design in patch #2 is to have a single data entry for each distinct device, since you're expecting to see a single SMR programmed to match at least the full id/mask range of the entry. However any SMR which matches that full range will by definition also match any smaller subset of that range as well, so we can uniquely identify any device in this context from just any *one* of its IDs, thus we could store less data and have simpler matching logic. >>> +    u32 actlr; >>> +}; >>> + >>>   static struct qcom_smmu *to_qcom_smmu(struct arm_smmu_device *smmu) >>>   { >>>       return container_of(smmu, struct qcom_smmu, smmu); >>> @@ -261,9 +272,36 @@ static const struct of_device_id >>> qcom_smmu_client_of_match[] __maybe_unused = { >>>       { } >>>   }; >>> >>> +static void arm_smmu_set_actlr(struct arm_smmu_device *smmu, int idx, >>> +        const struct actlr_config *actlrcfg) >>> +{ >>> +    struct arm_smmu_smr *smr = smmu->smrs; >>> +    int i; >>> +    u16 id; >>> +    u16 mask; >>> + >>> +    for (i = 0; i < actlrcfg->size; ++i) { >>> +        id = actlrcfg->adata[i].sid; >>> +        mask = actlrcfg->adata[i].mask; >>> +        if (!smr_is_subset(*smr, id, mask)) >> >> How well have you tested this? ;) >> > > Well, this logic has worked pretty good for us till now in our > downstream implementation. :) (During testing as well this logic helped > to better match the SMRs instead of manually mathcing the mask and SID > which missed some SIDs) > Also this is already being used to arm_smmu_find_sme hence packaged this > logic in a wrapper to be used in other places as well(including ACTLR > register setting case here.) 1) Look at what you're matching the id and mask values *against* 2) Look at the polarity of the condition 3) Consider the old saying "two wrongs don't make a right" >>> +            arm_smmu_cb_write(smmu, idx, ARM_SMMU_CB_ACTLR, >>> +                    actlrcfg->adata[i].actlr); >>> +    } >>> +} >>> + >>>   static int qcom_smmu_init_context(struct arm_smmu_domain *smmu_domain, >>>           struct io_pgtable_cfg *pgtbl_cfg, struct device *dev) >>>   { >>> +    struct arm_smmu_device *smmu = smmu_domain->smmu; >>> +    struct qcom_smmu *qsmmu = to_qcom_smmu(smmu); >>> +    const struct actlr_config *actlrcfg; >>> +    int idx = smmu_domain->cfg.cbndx; >>> + >>> +    if (qsmmu->actlrcfg) { >>> +        actlrcfg = qsmmu->actlrcfg; >>> +        arm_smmu_set_actlr(smmu, idx, actlrcfg); >>> +    } >>> + >>>       smmu_domain->cfg.flush_walk_prefer_tlbiasid = true; >>> >>>       return 0; >>> @@ -467,6 +505,9 @@ static struct arm_smmu_device >>> *qcom_smmu_create(struct arm_smmu_device *smmu, >>>       qsmmu->smmu.impl = impl; >>>       qsmmu->cfg = data->cfg; >>> >>> +    if (data->actlrcfg && (data->actlrcfg->size)) >>> +        qsmmu->actlrcfg = data->actlrcfg; >> >> Do we really need to replicate multiple parts of the data, or would it >> be sensible to just replace qsmmu->cfg with qsmmu->data and handle the >> further dereferences in the places that want them? >> >>> + >>>       return &qsmmu->smmu; >>>   } >>> >>> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >>> b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >>> index 593910567b88..4b6862715070 100644 >>> --- a/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >>> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu-qcom.h >>> @@ -9,6 +9,7 @@ >>>   struct qcom_smmu { >>>       struct arm_smmu_device smmu; >>>       const struct qcom_smmu_config *cfg; >>> +    const struct actlr_config *actlrcfg; >>>       bool bypass_quirk; >>>       u8 bypass_cbndx; >>>       u32 stall_enabled; >>> @@ -25,6 +26,7 @@ struct qcom_smmu_config { >>>   }; >>> >>>   struct qcom_smmu_match_data { >>> +    const struct actlr_config *actlrcfg; >>>       const struct qcom_smmu_config *cfg; >>>       const struct arm_smmu_impl *impl; >>>       const struct arm_smmu_impl *adreno_impl; >>> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.c >>> b/drivers/iommu/arm/arm-smmu/arm-smmu.c >>> index d6d1a2a55cc0..8e4faf015286 100644 >>> --- a/drivers/iommu/arm/arm-smmu/arm-smmu.c >>> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.c >>> @@ -990,9 +990,10 @@ static int arm_smmu_find_sme(struct >>> arm_smmu_device *smmu, u16 id, u16 mask) >>>            * expect simply identical entries for this case, but there's >>>            * no harm in accommodating the generalisation. >>>            */ >>> -        if ((mask & smrs[i].mask) == mask && >>> -            !((id ^ smrs[i].id) & ~smrs[i].mask)) >>> + >>> +        if (smr_is_subset(smrs[i], id, mask)) >>>               return i; >>> + >>>           /* >>>            * If the new entry has any other overlap with an existing >>> one, >>>            * though, then there always exists at least one stream ID >>> diff --git a/drivers/iommu/arm/arm-smmu/arm-smmu.h >>> b/drivers/iommu/arm/arm-smmu/arm-smmu.h >>> index 703fd5817ec1..b1638bbc41d4 100644 >>> --- a/drivers/iommu/arm/arm-smmu/arm-smmu.h >>> +++ b/drivers/iommu/arm/arm-smmu/arm-smmu.h >>> @@ -501,6 +501,11 @@ static inline void arm_smmu_writeq(struct >>> arm_smmu_device *smmu, int page, >>>           writeq_relaxed(val, arm_smmu_page(smmu, page) + offset); >>>   } >>> >>> +static inline bool smr_is_subset(struct arm_smmu_smr smrs, u16 id, >>> u16 mask) >> >> Hmm, that name reads as implying the opposite of what it actually >> tests, not to mention that passing structs by value is a bit horrid as >> well :( >> > > It might be okay to name it as subset_of_smr() though. You have any > other naming suggestion in mind which could correctly describe the > logic? As above I think the ideal answer is to avoid the reason for factoring it out at all, by using a simpler matching process to begin with. Thanks, Robin.