Received: by 2002:a05:7412:8d09:b0:fa:4c10:6cad with SMTP id bj9csp323179rdb; Tue, 16 Jan 2024 01:00:48 -0800 (PST) X-Google-Smtp-Source: AGHT+IHuZP+DJKMtIBGU1CXZ0eJBFQ297LnTWu/Lgpogx+xtBsCmEpT/SaE2+Q1xlXWToiBufHj6 X-Received: by 2002:a05:620a:26aa:b0:781:2c00:c89d with SMTP id c42-20020a05620a26aa00b007812c00c89dmr9164727qkp.42.1705395648766; Tue, 16 Jan 2024 01:00:48 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1705395648; cv=none; d=google.com; s=arc-20160816; b=ksHJXyjtVIexvB9/L5OZzH0dKEwU1dg2akkdWTV8vCVD0tZ4HS3XjVHxNvmPsdsqGF JL6EtN13tFS42gU/AFW6BsektbY3gMTGtA+EoICxSe5om3z1zrPd++PaL6ORjcrgZrL+ YQZz/HpUgS5F2hqlrOz4wnaG3MaeMNT/8M8HZAiQW4CgaTVvNVFQ53UiSFb8APiPaGEB p66P1VVlUusbkiLGvsUovB4c9u2d132RLyP/oNITGeIWn5rcwsBhENixnmFP50t6an4c Oa+6tiOTbt13becpbKC8XnYxVZg87dQcdH3IKSfPPiwtfzHyluPp8s9hTys0Ba1GvXPm M5Mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date:dkim-signature; bh=CJmA02bPSkBd1C+82jaXiMWxN0EvzvO9M0rqWP7Yb5c=; fh=jSVXU66wQvmQ6AQ+SKC9fOxZXhpXpgUREmpw4V9SWP0=; b=iz4bDluV91Xhpc+0lnAiDx41trdm94KQsmnOsoFwPVRnBXdUJnjykNvjert3KcUhPE UQiSe240mSSOvGE5LQSn4fc5M3qxRlicHQ04IcEY1kf7Sli/pXqvxrgvLQZJty5q+Tf5 lAL9yoKKfNqnimMsiVE7dxuRG9rVMGbSbdCgNbfKg0ACYBr6Re7X5Z0kqECB6MK+LuJt IiGDmuzHDlo9+em+LebIRet8sPEID5IkJsLXO3gqI6nDRXJWjODDD5I7m+x0tB8PVc7x y302fhOMrAaH7gHyy7ZKUzCI+lWQwtUjuXFxu2/ribWd/QxlrUhnnCJoCwjyXpawBxuu q6YA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hklNV1fF; spf=pass (google.com: domain of linux-kernel+bounces-27147-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27147-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id j5-20020a37c245000000b00783376514b6si9390487qkm.366.2024.01.16.01.00.48 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 16 Jan 2024 01:00:48 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-27147-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=hklNV1fF; spf=pass (google.com: domain of linux-kernel+bounces-27147-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-27147-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 846C41C22ED6 for ; Tue, 16 Jan 2024 09:00:48 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id B2DA512E40; Tue, 16 Jan 2024 09:00:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="hklNV1fF" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id EAA0312B97 for ; Tue, 16 Jan 2024 09:00:28 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 00F66C433F1; Tue, 16 Jan 2024 09:00:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1705395628; bh=di/4fMjfr6Qyln0B/UJqaBwpqtAPoZXkJ8p/k1oNafw=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=hklNV1fFN5eLri4NfL+3V9gE5akiVw5GC5qfmWJrOJgIe/0OgrBA88PLZdwcQ2TnL NMxykHRst2G33UAwtW2S+gB54g0d7ynHHt0jO3nkgPdZqDLpIHXN2oOFQYyY/dcq8O 7Bc/gn/BYJOZeNdfL3Da9m851xUT4LGjp53eu1Molfld2Rvde8QVQH1ACz1svNE1dd 83h8DAu8JipA583K64Q6n9I1e7YSEOpqLd88wt4yJk98ckAH05EKRkrifAvdlCT2D1 dnK4iCvRmz9AI7KT6yXVPmhhrrEK+L+mpgm/Kr0J9zdfUXqa7xUuOp00p3CQrptDmy 2MF0CJGGMq+3A== Date: Tue, 16 Jan 2024 16:47:36 +0800 From: Jisheng Zhang To: Alexandre Ghiti Cc: Paul Walmsley , Palmer Dabbelt , Albert Ou , linux-riscv@lists.infradead.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH v2] riscv: mm: still create swiotlb buffer for kmalloc() bouncing if required Message-ID: References: <20231202134224.4029-1-jszhang@kernel.org> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: On Tue, Jan 16, 2024 at 09:23:47AM +0100, Alexandre Ghiti wrote: > Hi Jisheng, > > On 02/12/2023 14:42, Jisheng Zhang wrote: > > After commit f51f7a0fc2f4 ("riscv: enable DMA_BOUNCE_UNALIGNED_KMALLOC > > for !dma_coherent"), for non-coherent platforms with less than 4GB > > memory, we rely on users to pass "swiotlb=mmnn,force" kernel parameters > > to enable DMA bouncing for unaligned kmalloc() buffers. Now let's go > > further: If no bouncing needed for ZONE_DMA, let kernel automatically > > allocate 1MB swiotlb buffer per 1GB of RAM for kmalloc() bouncing on > > non-coherent platforms, so that no need to pass "swiotlb=mmnn,force" > > any more. > > IIUC, DMA_BOUNCE_UNALIGNED_KMALLOC is enabled for all non-coherent > platforms, even those with less than 4GB of memory. But the DMA bouncing > (which is necessary to enable kmalloc-8/16/32/96...) was not enabled unless > the user specified "swiotlb=mmnn,force" on the kernel command line. But does > that mean that if the user did not specify "swiotlb=mmnn,force", the > kmalloc-8/16/32/96 were enabled anyway and the behaviour was wrong (by lack > of DMA bouncing)? Hi Alex, For coherent platforms, kmalloc-8/16/32/96 was enabled. For non-coherent platforms, if memory is more than 4GB, kmalloc-8/16/32/96 was enabled. For non-coherent platforms, if memory is less than 4GB, kmalloc-8/16/32/96 was not enabled. If users want kmalloc-8/16/32/96, we rely on users to pass "swiotlb=mmnn,force" This patch tries to remove the "swiotlb=mmnn,force" requirement for the last case. After this patch, kernel automatically uses "1MB swiotlb buffer per 1GB of RAM for kmalloc() bouncing" by default. So this is an enhancement. Thanks > > I'm trying to understand if that's a fix or an enhancement. > > Thanks, > > Alex > > > > > > The math of "1MB swiotlb buffer per 1GB of RAM for kmalloc() bouncing" > > is taken from arm64. Users can still force smaller swiotlb buffer by > > passing "swiotlb=mmnn". > > > > Signed-off-by: Jisheng Zhang > > --- > > > > since v2: > > - fix build error if CONFIG_RISCV_DMA_NONCOHERENT=n > > > > arch/riscv/include/asm/cache.h | 2 +- > > arch/riscv/mm/init.c | 16 +++++++++++++++- > > 2 files changed, 16 insertions(+), 2 deletions(-) > > > > diff --git a/arch/riscv/include/asm/cache.h b/arch/riscv/include/asm/cache.h > > index 2174fe7bac9a..570e9d8acad1 100644 > > --- a/arch/riscv/include/asm/cache.h > > +++ b/arch/riscv/include/asm/cache.h > > @@ -26,8 +26,8 @@ > > #ifndef __ASSEMBLY__ > > -#ifdef CONFIG_RISCV_DMA_NONCOHERENT > > extern int dma_cache_alignment; > > +#ifdef CONFIG_RISCV_DMA_NONCOHERENT > > #define dma_get_cache_alignment dma_get_cache_alignment > > static inline int dma_get_cache_alignment(void) > > { > > diff --git a/arch/riscv/mm/init.c b/arch/riscv/mm/init.c > > index 2e011cbddf3a..cbcb9918f721 100644 > > --- a/arch/riscv/mm/init.c > > +++ b/arch/riscv/mm/init.c > > @@ -162,11 +162,25 @@ static void print_vm_layout(void) { } > > void __init mem_init(void) > > { > > + bool swiotlb = max_pfn > PFN_DOWN(dma32_phys_limit); > > #ifdef CONFIG_FLATMEM > > BUG_ON(!mem_map); > > #endif /* CONFIG_FLATMEM */ > > - swiotlb_init(max_pfn > PFN_DOWN(dma32_phys_limit), SWIOTLB_VERBOSE); > > + if (IS_ENABLED(CONFIG_DMA_BOUNCE_UNALIGNED_KMALLOC) && !swiotlb && > > + dma_cache_alignment != 1) { > > + /* > > + * If no bouncing needed for ZONE_DMA, allocate 1MB swiotlb > > + * buffer per 1GB of RAM for kmalloc() bouncing on > > + * non-coherent platforms. > > + */ > > + unsigned long size = > > + DIV_ROUND_UP(memblock_phys_mem_size(), 1024); > > + swiotlb_adjust_size(min(swiotlb_size_or_default(), size)); > > + swiotlb = true; > > + } > > + > > + swiotlb_init(swiotlb, SWIOTLB_VERBOSE); > > memblock_free_all(); > > print_vm_layout();