[PATCH v5 00/15] mm, dma, arm64: Reduce ARCH_KMALLOC_MINALIGN to 8
Jonathan Cameron
Jonathan.Cameron at Huawei.com
Tue May 30 09:31:30 PDT 2023
On Tue, 30 May 2023 14:38:55 +0100
Catalin Marinas <catalin.marinas at arm.com> wrote:
> On Fri, May 26, 2023 at 05:29:30PM +0100, Jonathan Cameron wrote:
> > On Fri, 26 May 2023 17:07:40 +0100
> > Jonathan Cameron <Jonathan.Cameron at Huawei.com> wrote:
> > > On Thu, 25 May 2023 15:31:34 +0100
> > > Catalin Marinas <catalin.marinas at arm.com> wrote:
> > > > On Thu, May 25, 2023 at 01:31:38PM +0100, Jonathan Cameron wrote:
> > > > > On Wed, 24 May 2023 18:18:49 +0100
> > > > > Catalin Marinas <catalin.marinas at arm.com> wrote:
> > > > > > Another version of the series reducing the kmalloc() minimum alignment
> > > > > > on arm64 to 8 (from 128). Other architectures can easily opt in by
> > > > > > defining ARCH_KMALLOC_MINALIGN as 8 and selecting
> > > > > > DMA_BOUNCE_UNALIGNED_KMALLOC.
> > > > > >
> > > > > > The first 10 patches decouple ARCH_KMALLOC_MINALIGN from
> > > > > > ARCH_DMA_MINALIGN and, for arm64, limit the kmalloc() caches to those
> > > > > > aligned to the run-time probed cache_line_size(). On arm64 we gain the
> > > > > > kmalloc-{64,192} caches.
> > > > > >
> > > > > > The subsequent patches (11 to 15) further reduce the kmalloc() caches to
> > > > > > kmalloc-{8,16,32,96} if the default swiotlb is present by bouncing small
> > > > > > buffers in the DMA API.
> > > > >
> > > > > I think IIO_DMA_MINALIGN needs to switch to ARCH_DMA_MINALIGN as well.
> > > > >
> > > > > It's used to force static alignement of buffers with larger structures,
> > > > > to make them suitable for non coherent DMA, similar to your other cases.
> > > >
> > > > Ah, I forgot that you introduced that macro. However, at a quick grep, I
> > > > don't think this forced alignment always works as intended (irrespective
> > > > of this series). Let's take an example:
> > > >
> > > > struct ltc2496_driverdata {
> > > > /* this must be the first member */
> > > > struct ltc2497core_driverdata common_ddata;
> > > > struct spi_device *spi;
> > > >
> > > > /*
> > > > * DMA (thus cache coherency maintenance) may require the
> > > > * transfer buffers to live in their own cache lines.
> > > > */
> > > > unsigned char rxbuf[3] __aligned(IIO_DMA_MINALIGN);
> > > > unsigned char txbuf[3];
> > > > };
> > > >
> > > > The rxbuf is aligned to IIO_DMA_MINALIGN, the structure and its size as
> > > > well but txbuf is at an offset of 3 bytes from the aligned
> > > > IIO_DMA_MINALIGN. So basically any cache maintenance on rxbuf would
> > > > corrupt txbuf.
> > >
> > > That was intentional (though possibly wrong if I've misunderstood
> > > the underlying issue).
> > >
> > > For SPI controllers at least my understanding was that it is safe to
> > > assume that they won't trample on themselves. The driver doesn't
> > > touch the buffers when DMA is in flight - to do so would indeed result
> > > in corruption.
> > >
> > > So whilst we could end up with the SPI master writing stale data back
> > > to txbuf after the transfer it will never matter (as the value is unchanged).
> > > Any flushes in the other direction will end up flushing both rxbuf and
> > > txbuf anyway which is also harmless.
> >
> > Adding missing detail. As the driver never writes txbuf whilst any DMA
> > is going on, the second cache evict (to flush out any lines that have
> > crept back into cache after the flush - and write backs - pre DMA) will
> > find a clean line and will drop it without writing back - thus no corruption.
>
> Thanks for the clarification. One more thing, can the txbuf be written
> prior to the DMA_FROM_DEVICE transfer into rxbuf? Or the txbuf writing
> is always followed by a DMA_TO_DEVICE mapping (which would flush the
> cache line).
>
In practice, the driver should never write the txbuf unless it's about to
use it for a transfer (and a lock prevents anything racing against that -
the lock covering both tx and rx buffers), then the SPI controller would
have to follow it with a DMA_TO_DEVICE mapping.
Having said that there might be examples in tree where a really weird sequence occurs.
1. tx is written with a default value (say in probe()).
2. An rx only transfer occurs first.
Would require something like a device that needs a read to wake it up before it'll
take any transmitted data. Or one that resets on a particularly long read (yuk,
the ad7476 does that, but it has no tx buffer so that's fine).
I don't think we have that case, but may be worth looking out for in future.
In more detail:
The two buffers are either both used for a given call to the SPI core driver
or they are used individually.
In any case where the data is used by host or device the mappings should be
fine.
TX and RX pair.
- Take lock
- Write tx from CPU
- Pass both tx and rx to the spi controller which will map tx line DMA_TO_DEVICE and
rx DMA_FROM_DEVICE - write back the line to memory (dcache_clean_poc() for tx map
and rx map)
- On interrupt or similar spi controller will use unmap DMA_FROM_DEVICE on the rx buffer - caches
drop what they think are clean lines, so read will then be from memory
(dcache_inval_poc() for rx unmap, noop for tx unmap - but taken out anyway by the
rx one which is fine)
- Read rx content from CPU.
- Release lock
TX only
- Take lock
- Write tx from CPU
- tx only passed to spi controller ... DMA_TO_DEVICE... write back line to memory
- No unmap DMA_FROM_DEVICE needed as nothing updated by device (device reads only) so no need
to flush anything any cached lines are still correct.
- Mapping torn down.
- Release lock
RX only
- Take lock
- rx only passed to spi controller.. DMA_FROM_DEVICE.. cleans rx (probably clean anyway)
- Device fills rx in memory.
- rx DMA_FROM_DEVICE to drop any clean lines from cache and ensures we get rx from memory.
- Mapping torn down.
- CPU reads rx
- Release lock
I've probably missed some mappings in there, but short version is that rx and tx are
treated as one resource by the driver will all access serialized. In some cases we will
get bonus flushes but shouldn't hurt anything.
Jonathan
More information about the linux-arm-kernel
mailing list