[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/2] xen/arm: smmuv3: Advertise coherent table walk if supported


  • To: Ayan Kumar Halder <ayankuma@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Michal Orzel <michal.orzel@xxxxxxx>
  • Date: Mon, 15 May 2023 08:46:25 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=lists.xenproject.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cQjuZJ+G8w7Al9J6uPj6xfFtjYRtiwRu9tQGQhkRkYQ=; b=KqNQKocoYfph6c+Lb8uEyYbZp7580Zbdj1vfK6nyh8njFpQWiDzjLZiBcjAhNeJnDbFBXmKzSsLK5tiwEWT8N56/IVHjW17raCHcChUseJyl5/yEQpQ/BQmB0Oc0dHrYcgdbB8oDkON5Shb6ATDaulnmadi3V7m0+8bhjN6c6VTCXNGKlxfKidfIcyT0DcIqsZap8bQi/mmqOBq0wLlHsucJy12I80GFw8QvoZegJFEBr0CWLHsvP2rgbdSTEjviuDo7OvXKCmizu8HC95SqeSgPknDQqIFMHN3cO9otqEEN8tMKC9kpYy6htOZ9C4MSVes89ZjfMQHhp36pIVhyFw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=AvaPYCm/YWSl2rscrd+0iR0LjXjJmYkqXN+3HHnjl+gaJLoOfJAZhMsc/DA1p+c46ebuaT5lcAs+ealuHOWffuvfDYCEXu/ojNi3dB4olQJz4BTz6dmLVaptD64j7z9SoAO+fuip9/qaoBmESbBVmmPqXLndx/th0KUGVmfjrw3Y9zRUsZMBzNHi1OlnyhnvB2X2g9NmVKhRf9yHHIQRVc8DUYr3p0uEGh4i9mggi1QtEBVYUwO29JnLfX/SvXZx91Iqg9ucEjLQyYdc+7V35ETZfhaRer5G6oM87PAj1Mvm/1ZnuB0evOoz1SHnJti89binX+kXhegNP9oaPaoEEA==
  • Cc: Bertrand Marquis <bertrand.marquis@xxxxxxx>, Rahul Singh <rahul.singh@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, "Julien Grall" <julien@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Mon, 15 May 2023 06:47:06 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hi Ayan,

On 12/05/2023 18:59, Ayan Kumar Halder wrote:
> Hi Michal,
> 
> On 12/05/2023 15:35, Michal Orzel wrote:
>> At the moment, even in case of a SMMU being I/O coherent, we clean the
>> updated PT as a result of not advertising the coherency feature. SMMUv3
>> coherency feature means that page table walks, accesses to memory
>> structures and queues are I/O coherent (refer ARM IHI 0070 E.A, 3.15).
>>
>> Follow the same steps that were done for SMMU v1,v2 driver by the commit:
>> 080dcb781e1bc3bb22f55a9dfdecb830ccbabe88
>>
>> The same restrictions apply, meaning that in order to advertise coherent
>> table walk platform feature, all the SMMU devices need to report coherency
>> feature. This is because the page tables (we are sharing them with CPU)
>> are populated before any device assignment and in case of a device being
>> behind non-coherent SMMU, we would have to scan the tables and clean
>> the cache.
>>
>> It is to be noted that the SBSA/BSA (refer ARM DEN0094C 1.0C, section D)
>> requires that all SMMUv3 devices support I/O coherency.
>>
>> Signed-off-by: Michal Orzel <michal.orzel@xxxxxxx>
>> ---
>> There are very few platforms out there with SMMUv3 but I have never seen
>> a SMMUv3 that is not I/O coherent.
>> ---
>>   xen/drivers/passthrough/arm/smmu-v3.c | 24 +++++++++++++++++++++++-
>>   1 file changed, 23 insertions(+), 1 deletion(-)
>>
>> diff --git a/xen/drivers/passthrough/arm/smmu-v3.c 
>> b/xen/drivers/passthrough/arm/smmu-v3.c
>> index bf053cdb6d5c..2adaad0fa038 100644
>> --- a/xen/drivers/passthrough/arm/smmu-v3.c
>> +++ b/xen/drivers/passthrough/arm/smmu-v3.c
>> @@ -2526,6 +2526,15 @@ static const struct dt_device_match 
>> arm_smmu_of_match[] = {
>>   };
>>   
>>   /* Start of Xen specific code. */
>> +
>> +/*
>> + * Platform features. It indicates the list of features supported by all
>> + * SMMUs. Actually we only care about coherent table walk, which in case of
>> + * SMMUv3 is implied by the overall coherency feature (refer ARM IHI 0070 
>> E.A,
>> + * section 3.15 and SMMU_IDR0.COHACC bit description).
>> + */
>> +static uint32_t platform_features = ARM_SMMU_FEAT_COHERENCY;
>> +
>>   static int __must_check arm_smmu_iotlb_flush_all(struct domain *d)
>>   {
>>      struct arm_smmu_xen_domain *xen_domain = dom_iommu(d)->arch.priv;
>> @@ -2708,8 +2717,12 @@ static int arm_smmu_iommu_xen_domain_init(struct 
>> domain *d)
>>      INIT_LIST_HEAD(&xen_domain->contexts);
>>   
>>      dom_iommu(d)->arch.priv = xen_domain;
>> -    return 0;
>>   
>> +    /* Coherent walk can be enabled only when all SMMUs support it. */
>> +    if (platform_features & ARM_SMMU_FEAT_COHERENCY)
>> +            iommu_set_feature(d, IOMMU_FEAT_COHERENT_WALK);
>> +
>> +    return 0;
>>   }
>>   
> All good till here.
>>   static void arm_smmu_iommu_xen_domain_teardown(struct domain *d)
>> @@ -2738,6 +2751,7 @@ static __init int arm_smmu_dt_init(struct 
>> dt_device_node *dev,
>>                              const void *data)
>>   {
>>      int rc;
>> +    const struct arm_smmu_device *smmu;
>>   
>>      /*
>>       * Even if the device can't be initialized, we don't want to
>> @@ -2751,6 +2765,14 @@ static __init int arm_smmu_dt_init(struct 
>> dt_device_node *dev,
>>   
>>      iommu_set_ops(&arm_smmu_iommu_ops);
>>   
>> +    /* Find the just added SMMU and retrieve its features. */
>> +    smmu = arm_smmu_get_by_dev(dt_to_dev(dev));
>> +
>> +    /* It would be a bug not to find the SMMU we just added. */
>> +    BUG_ON(!smmu);
>> +
>> +    platform_features &= smmu->features;
>> +
> 
> Can you explain this change in the commit message ?
I think it is already explained by saying that in order to advertise the 
*platform* feature, all
SMMUs need to report it. If at least one doesn't, the feature is disabled. This 
is exactly
what this line is doing. It is comparing platform features with a just probed 
SMMU features (arm_smmu_dt_init()
is called for each SMMU).

~Michal



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.