Received: by 2002:a89:413:0:b0:1fd:dba5:e537 with SMTP id m19csp455826lqs; Thu, 13 Jun 2024 15:41:46 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXwf5OpDAch1RZdzxhPaUrFMZQUvQamBTK7+rRe1ewajN5gJo2Tj1hryIveRuNQ1F7ZwhCoSJesze8Z0BWpJCfq6qlEWTq8bOZs6CfncA== X-Google-Smtp-Source: AGHT+IFMqLMuVezp3T8ehVYoF70Vx52ip7IuponP+2KjYPDMVckcOsSlwSvkvPHALSf7Wf96LO/R X-Received: by 2002:a17:90a:c204:b0:2bd:6552:6474 with SMTP id 98e67ed59e1d1-2c4dbd38eb5mr1130049a91.41.1718318506014; Thu, 13 Jun 2024 15:41:46 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1718318505; cv=pass; d=google.com; s=arc-20160816; b=HZGoAkddZ+2Nf+GE3yPZbLISlgQ2Eiu4762F+bG8n7nsvvvm2u3toc3xOr0OdlNyRP T8uif40/PZZlCJO+trWJ624ucAVRa5EbpyHyV2tK29jpKwkq1v1NmqRvvEwM0F6wQdpf k0XCXWEURLrbvh0BDeP+0b+Uff2cNRKVAR5cS67fZi5yRqz/qWWxHvHIEsVDGWlryPB+ 8t9Lvd/OaWtdG6QMYRMRYUPtznVGA9zdIuBsBrsVnWvEzhob+xh/l7wDx9U93mjIWVyX 4WPpIBmYcQxcnr4QQVDRD6BSOjpjGRi5bu0+w+oPP7XnZSRd3keLisr2oEZ2GrkcxrvC KfCA== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:subject:cc:to:from :date:dkim-signature; bh=k9uj6YTk26weaFMyB7e3dv1sV5UdbYndkoTPvZ18+H0=; fh=eoeyQ+7pAG9wBpLG/osH4S5eZG4x9wc39KM36HUr448=; b=CuSRAsrgfPqk7fQxjFR2DaZw8Lx9uCXMLlQ0/bRUUB39xk0RjEXOfL2ngRY9fMa0d8 0nDze6kdgdFOqVLZ8j8bK/x81bX8ayx5RLLBF2aqB0wmSCcn/5ArjMqvVptIhowb0Yru xebVfnNWtWplQoMEv4lfiFy3ZS1yhEPB3y+iSFkBlcKS4mcZiUM+s6XAo16QSaiA0V9C 8wCIaPS/Qk4RCp2wCsppeBg/yrPhgys3zjD69QAX0ZsxYrafAjDYGOU3JL3k6wEiX8Y2 yRzF9uyoh8wPj3LbuFLESTs3DD3oG5XTSglN0aMDP+3mxNnaJgZvjB1QuFXgWylmGbo+ LO0A==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=sfkfPoff; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-214072-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-214072-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from sv.mirrors.kernel.org (sv.mirrors.kernel.org. [2604:1380:45e3:2400::1]) by mx.google.com with ESMTPS id 98e67ed59e1d1-2c4c460257bsi2320057a91.33.2024.06.13.15.41.45 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 13 Jun 2024 15:41:45 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-214072-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) client-ip=2604:1380:45e3:2400::1; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=sfkfPoff; arc=pass (i=1 dkim=pass dkdomain=kernel.org); spf=pass (google.com: domain of linux-kernel+bounces-214072-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:45e3:2400::1 as permitted sender) smtp.mailfrom="linux-kernel+bounces-214072-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by sv.mirrors.kernel.org (Postfix) with ESMTPS id 9D077282DD7 for ; Thu, 13 Jun 2024 22:41:45 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 1B88114EC49; Thu, 13 Jun 2024 22:41:29 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b="sfkfPoff" Received: from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org [10.30.226.201]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id E646614A4D0; Thu, 13 Jun 2024 22:41:27 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=10.30.226.201 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718318488; cv=none; b=rcHL8hR88vWkxBfT9dyGnjA2KeALP8qQw5PrZ4+GQ7792baMETHkU6zq5BKZDowsrRT/YCJP4AnE45m12grlPQP366LDqz0L+1MHgcm5bgciuT9EyVvunL8Ufj5yoL692QFeENrVXIzZEDHfOFtjGzu5Hn1frrOwSFixHwMBc/U= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1718318488; c=relaxed/simple; bh=I9Ug++9hFjoSfnXDvmv1adlwtek43vk/5jLycz5Z9s4=; h=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type: Content-Disposition:In-Reply-To; b=OhMzlzc6q3p400dtFvv3sExCtTpQjsCC7THJEYivY18XnWgfMDj9NFjXPBUTIKrlty2qNBMsj7lv1bk2VyVhgDlukDe9nA7qymObMXEuz2CvpDzwF0j0u0k3oCc4a+w+q6nlhom+UYPdcmkkWm2yq6jLXyObTNsitFqtkUwtL5Y= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org header.b=sfkfPoff; arc=none smtp.client-ip=10.30.226.201 Received: by smtp.kernel.org (Postfix) with ESMTPSA id 3075EC32786; Thu, 13 Jun 2024 22:41:27 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1718318487; bh=I9Ug++9hFjoSfnXDvmv1adlwtek43vk/5jLycz5Z9s4=; h=Date:From:To:Cc:Subject:In-Reply-To:From; b=sfkfPoffiVHqdWcnrOgfR3Fp1oRr2Ge3fQT3kAvUdcirOKe1QiILb7dCjYWtbMMOg odrPT8DYYPb/W2K2aSqoiheqNNc7d8kMUWFHxcVrbIspWF2aWzG/Eh7hbQEvEYrXUU w2Onpm3oDuR//mLnErFbRwecYmvnsP/shc53Tok0v4/wDBlY2humHotEujw+DRIfh6 boFRKx0ntz0uXir8MqUuaUoSCtTdJn7oFjZ+zI01MrUwhi5g3zSFaGfU7zs8UA5ySi j/cRBn9WR+Yd5Va6kSWeSIEaOQDmjfXy4iXdz5ROlMjI/sVETcRKMi85rUGvrcRA3f Wg5zW3T7p7DfA== Date: Thu, 13 Jun 2024 17:41:25 -0500 From: Bjorn Helgaas To: Frank Li Cc: Robin Murphy , Richard Zhu , Lucas Stach , Lorenzo Pieralisi , Krzysztof =?utf-8?Q?Wilczy=C5=84ski?= , Rob Herring , Bjorn Helgaas , Shawn Guo , Sascha Hauer , Pengutronix Kernel Team , Fabio Estevam , NXP Linux Team , Philipp Zabel , Liam Girdwood , Mark Brown , Manivannan Sadhasivam , Krzysztof Kozlowski , Conor Dooley , linux-pci@vger.kernel.org, imx@lists.linux.dev, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org, devicetree@vger.kernel.org, Will Deacon , Joerg Roedel , Jason Gunthorpe , Alyssa Rosenzweig , Marc Zyngier Subject: Re: [PATCH v5 08/12] PCI: imx6: Config look up table(LUT) to support MSI ITS and IOMMU for i.MX95 Message-ID: <20240613224125.GA1087289@bhelgaas> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: On Thu, Jun 06, 2024 at 04:24:17PM -0400, Frank Li wrote: > On Mon, Jun 03, 2024 at 04:07:55PM -0400, Frank Li wrote: > > On Mon, Jun 03, 2024 at 01:56:27PM -0500, Bjorn Helgaas wrote: > > > On Mon, Jun 03, 2024 at 02:42:45PM -0400, Frank Li wrote: > > > > On Mon, Jun 03, 2024 at 12:19:21PM -0500, Bjorn Helgaas wrote: > > > > > On Fri, May 31, 2024 at 03:58:49PM +0100, Robin Murphy wrote: > > > > > > On 2024-05-31 12:08 am, Bjorn Helgaas wrote: > > > > > > > [+cc IOMMU and pcie-apple.c folks for comment] > > > > > > > > > > > > > > On Tue, May 28, 2024 at 03:39:21PM -0400, Frank Li wrote: > > > > > > > > For the i.MX95, configuration of a LUT is necessary to convert Bus Device > > > > > > > > Function (BDF) to stream IDs, which are utilized by both IOMMU and ITS. > > > > > > > > This involves examining the msi-map and smmu-map to ensure consistent > > > > > > > > mapping of PCI BDF to the same stream IDs. Subsequently, LUT-related > > > > > > > > registers are configured. In the absence of an msi-map, the built-in MSI > > > > > > > > controller is utilized as a fallback. > > > > > > > > > > > > > > > > Additionally, register a PCI bus notifier to trigger imx_pcie_add_device() > > > > > > > > upon the appearance of a new PCI device and when the bus is an iMX6 PCI > > > > > > > > controller. This function configures the correct LUT based on Device Tree > > > > > > > > Settings (DTS). > > > > > > > > > > > > > > This scheme is pretty similar to apple_pcie_bus_notifier(). If we > > > > > > > have to do this, I wish it were *more* similar, i.e., copy the > > > > > > > function names, bitmap tracking, code structure, etc. > > > > > > > > > > > > > > I don't really know how stream IDs work, but I assume they are used on > > > > > > > most or all arm64 platforms, so I'm a little surprised that of all the > > > > > > > PCI host drivers used on arm64, only pcie-apple.c and pci-imx6.c need > > > > > > > this notifier. > > > > > > > > > > > > This is one of those things that's mostly at the mercy of the PCIe root > > > > > > complex implementation. Typically the SMMU StreamID and/or GIC ITS DeviceID > > > > > > is derived directly from the PCI RID, sometimes with additional high-order > > > > > > bits hard-wired to disambiguate PCI segments. I believe this RID-translation > > > > > > LUT is a particular feature of the the Synopsys IP - I know there's also one > > > > > > on the NXP Layerscape platforms, but on those it's programmed by the > > > > > > bootloader, which also generates the appropriate "msi-map" and "iommu-map" > > > > > > properties to match. Ideally that's what i.MX should do as well, but hey. > > > > > > > > > > Maybe this RID-translation is a feature of i.MX, not of Synopsys? I > > > > > see that the LUT CSR accesses use IMX95_* definitions. > > > > > > > > Yes, it convert 16bit RID to 6bit stream id. > > > > > > IIUC, you're saying this is not a Synopsys feature, it's an i.MX > > > feature. > > > > Yes, it is i.MX feature. But I think other vendor should have similar > > situation if use old arm smmu. > > > > > > > > > > > If it's really necessary to do this programming from Linux, then there's > > > > > > still no point in it being dynamic - the mappings cannot ever change, since > > > > > > the rest of the kernel believes that what the DT said at boot time was > > > > > > already a property of the hardware. It would be a lot more logical, and > > > > > > likely simpler, for the driver to just read the relevant map property and > > > > > > program the entire LUT to match, all in one go at controller probe time. > > > > > > Rather like what's already commonly done with the parsing of "dma-ranges" to > > > > > > program address-translation LUTs for inbound windows. > > > > > > > > > > > > Plus that would also give a chance of safely dealing with bad DTs specifying > > > > > > invalid ID mappings (by refusing to probe at all). As it is, returning an > > > > > > error from a child's BUS_NOTIFY_ADD_DEVICE does nothing except prevent any > > > > > > further notifiers from running at that point - the device will still be > > > > > > added, allowed to bind a driver, and able to start sending DMA/MSI traffic > > > > > > without the controller being correctly programmed, which at best won't work > > > > > > and at worst may break the whole system. > > > > > > > > > > Frank, could the imx LUT be programmed once at boot-time instead of at > > > > > device-add time? I'm guessing maybe not because apparently there is a > > > > > risk of running out of LUT entries? > > > > > > > > It is not good idea to depend on boot loader so much. > > > > > > I meant "could this be programmed once when the Linux imx host > > > controller driver is probed?" But from the below, it sounds like > > > that's not possible in general because you don't have enough stream > > > IDs to do that. > > > > Oh! sorry miss understand what your means. It is possible like what I did > > at v3 version. But I think it is not good enough. > > > > > > > > > Some hot plug devics > > > > (SD7.0) may plug after system boot. Two PCIe instances shared one set > > > > of 6bits stream id (total 64). Assume total 16 assign to two PCIe > > > > controllers. each have 8 stream id. If use uboot assign it static, each > > > > PCIe controller have below 8 devices. It will be failrue one controller > > > > connect 7, another connect 9. but if dynamtic alloc when devices add, both > > > > controller can work. > > > > > > > > Although we have not so much devices now, this way give us possility to > > > > improve it in future. > > > > > > > > > It sounds like the consequences of running out of LUT entries are > > > > > catastrophic, e.g., memory corruption from mis-directed DMA? If > > > > > that's possible, I think we need to figure out how to prevent the > > > > > device from being used, not just dev_warn() about it. > > > > > > > > Yes, but so far, we have not met such problem now. We can improve it when > > > > we really face such problem. > > > > > > If this controller can only support DMA from a limited number of > > > endpoints below it, I think we should figure out how to enforce that > > > directly. Maybe we can prevent drivers from enabling bus mastering or > > > something. I'm not happy with the idea of waiting for and debugging a > > > report of data corruption. > > > > It may add a pre-add hook function to pci bridge. let me do more research. > > Hi Bjorn: > > int pci_setup_device(struct pci_dev *dev) > { > dev->error_state = pci_channel_io_normal; > ... > pci_fixup_device(pci_fixup_early, dev); > > ^^^ I can add fixup hook for pci_fixup_early. If not resource, > I can set dev->error_state to pci_channel_io_frozen or > pci_channel_io_perm_failure > > And add below check here after call hook function. > > if (dev->error_state != pci_channel_io_normal) > return -EIO; > > } > > How do you think this method? If you agree, I can continue search device > remove hook up. I think this would mean the device would not appear to be enumerated at all, right? I.e., it wouldn't show up in lspci? And we couldn't use even a pure programmed IO driver with no DMA or MSI? I wonder if we should have a function pointer in struct pci_host_bridge, kind of like the existing ->map_irq(), where we could do host bridge-specific setup when enumerating a PCI device. We'd still have to solve the issue of preventing DMA, but a hook like that might avoid the need for a quirk or the bus notifier approach. Bjorn