[PATCH v2 4/5] iommu/arm-smmu-v3: Install bypass STEs for IOMMU_DOMAIN_IDENTITY domains

Nate Watterson nwatters at codeaurora.org
Thu Mar 16 09:24:56 PDT 2017


Hi Will,

On 2017-03-10 15:49, Will Deacon wrote:
> In preparation for allowing the default domain type to be overridden,
> this patch adds support for IOMMU_DOMAIN_IDENTITY domains to the
> ARM SMMUv3 driver.
> 
> An identity domain is created by placing the corresponding stream table
> entries into "bypass" mode, which allows transactions to flow through
> the SMMU without any translation.
> 

What about masters that require SMMU intervention to override their
native memory attributes to make them consistent with the CCA (acpi)
or dma-coherent (dt) values specified in FW? To make sure those cases
are handled, you could store away the master's coherency setting in
its strtab_ent at attach time and then setup STE[MemAttr/ALLOCCFG/SHCFG]
so the attributes are forced to the correct values while still
bypassing translation.

> Signed-off-by: Will Deacon <will.deacon at arm.com>
> ---
>  drivers/iommu/arm-smmu-v3.c | 58 
> +++++++++++++++++++++++++++++----------------
>  1 file changed, 37 insertions(+), 21 deletions(-)
> 
> diff --git a/drivers/iommu/arm-smmu-v3.c b/drivers/iommu/arm-smmu-v3.c
> index e18dbcd26f66..75fa4809f49e 100644
> --- a/drivers/iommu/arm-smmu-v3.c
> +++ b/drivers/iommu/arm-smmu-v3.c
> @@ -554,9 +554,14 @@ struct arm_smmu_s2_cfg {
>  };
> 
>  struct arm_smmu_strtab_ent {
> -	bool				valid;
> -
> -	bool				bypass;	/* Overrides s1/s2 config */
> +	/*
> +	 * An STE is "assigned" if the master emitting the corresponding SID
> +	 * is attached to a domain. The behaviour of an unassigned STE is
> +	 * determined by the disable_bypass parameter, whereas an assigned
> +	 * STE behaves according to s1_cfg/s2_cfg, which themselves are
> +	 * configured according to the domain type.
> +	 */
> +	bool				assigned;
>  	struct arm_smmu_s1_cfg		*s1_cfg;
>  	struct arm_smmu_s2_cfg		*s2_cfg;
>  };
> @@ -632,6 +637,7 @@ enum arm_smmu_domain_stage {
>  	ARM_SMMU_DOMAIN_S1 = 0,
>  	ARM_SMMU_DOMAIN_S2,
>  	ARM_SMMU_DOMAIN_NESTED,
> +	ARM_SMMU_DOMAIN_BYPASS,
>  };
> 
>  struct arm_smmu_domain {
> @@ -1005,9 +1011,9 @@ static void arm_smmu_write_strtab_ent(struct
> arm_smmu_device *smmu, u32 sid,
>  	 * This is hideously complicated, but we only really care about
>  	 * three cases at the moment:
>  	 *
> -	 * 1. Invalid (all zero) -> bypass  (init)
> -	 * 2. Bypass -> translation (attach)
> -	 * 3. Translation -> bypass (detach)
> +	 * 1. Invalid (all zero) -> bypass/fault (init)
> +	 * 2. Bypass/fault -> translation/bypass (attach)
> +	 * 3. Translation/bypass -> bypass/fault (detach)
>  	 *
>  	 * Given that we can't update the STE atomically and the SMMU
>  	 * doesn't read the thing in a defined order, that leaves us
> @@ -1046,11 +1052,15 @@ static void arm_smmu_write_strtab_ent(struct
> arm_smmu_device *smmu, u32 sid,
>  	}
> 
>  	/* Nuke the existing STE_0 value, as we're going to rewrite it */
> -	val = ste->valid ? STRTAB_STE_0_V : 0;
> +	val = STRTAB_STE_0_V;
> +
> +	/* Bypass/fault */
> +	if (!ste->assigned || !(ste->s1_cfg || ste->s2_cfg)) {
> +		if (!ste->assigned && disable_bypass)
> +			val |= STRTAB_STE_0_CFG_ABORT;
> +		else
> +			val |= STRTAB_STE_0_CFG_BYPASS;
> 
> -	if (ste->bypass) {
> -		val |= disable_bypass ? STRTAB_STE_0_CFG_ABORT
> -				      : STRTAB_STE_0_CFG_BYPASS;
>  		dst[0] = cpu_to_le64(val);
>  		dst[1] = cpu_to_le64(STRTAB_STE_1_SHCFG_INCOMING
>  			 << STRTAB_STE_1_SHCFG_SHIFT);
> @@ -1111,10 +1121,7 @@ static void arm_smmu_write_strtab_ent(struct
> arm_smmu_device *smmu, u32 sid,
>  static void arm_smmu_init_bypass_stes(u64 *strtab, unsigned int nent)
>  {
>  	unsigned int i;
> -	struct arm_smmu_strtab_ent ste = {
> -		.valid	= true,
> -		.bypass	= true,
> -	};
> +	struct arm_smmu_strtab_ent ste = { .assigned = false };
> 
>  	for (i = 0; i < nent; ++i) {
>  		arm_smmu_write_strtab_ent(NULL, -1, strtab, &ste);
> @@ -1378,7 +1385,9 @@ static struct iommu_domain
> *arm_smmu_domain_alloc(unsigned type)
>  {
>  	struct arm_smmu_domain *smmu_domain;
> 
> -	if (type != IOMMU_DOMAIN_UNMANAGED && type != IOMMU_DOMAIN_DMA)
> +	if (type != IOMMU_DOMAIN_UNMANAGED &&
> +	    type != IOMMU_DOMAIN_DMA &&
> +	    type != IOMMU_DOMAIN_IDENTITY)
>  		return NULL;
> 
>  	/*
> @@ -1509,6 +1518,11 @@ static int arm_smmu_domain_finalise(struct
> iommu_domain *domain)
>  	struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain);
>  	struct arm_smmu_device *smmu = smmu_domain->smmu;
> 
> +	if (domain->type == IOMMU_DOMAIN_IDENTITY) {
> +		smmu_domain->stage = ARM_SMMU_DOMAIN_BYPASS;
> +		return 0;
> +	}
> +
>  	/* Restrict the stage to what we can actually support */
>  	if (!(smmu->features & ARM_SMMU_FEAT_TRANS_S1))
>  		smmu_domain->stage = ARM_SMMU_DOMAIN_S2;
> @@ -1597,7 +1611,7 @@ static void arm_smmu_detach_dev(struct device 
> *dev)
>  {
>  	struct arm_smmu_master_data *master = dev->iommu_fwspec->iommu_priv;
> 
> -	master->ste.bypass = true;
> +	master->ste.assigned = false;
>  	arm_smmu_install_ste_for_dev(dev->iommu_fwspec);
>  }
> 
> @@ -1617,7 +1631,7 @@ static int arm_smmu_attach_dev(struct
> iommu_domain *domain, struct device *dev)
>  	ste = &master->ste;
> 
>  	/* Already attached to a different domain? */
> -	if (!ste->bypass)
> +	if (ste->assigned)
>  		arm_smmu_detach_dev(dev);
> 
>  	mutex_lock(&smmu_domain->init_mutex);
> @@ -1638,10 +1652,12 @@ static int arm_smmu_attach_dev(struct
> iommu_domain *domain, struct device *dev)
>  		goto out_unlock;
>  	}
> 
> -	ste->bypass = false;
> -	ste->valid = true;
> +	ste->assigned = true;
> 
> -	if (smmu_domain->stage == ARM_SMMU_DOMAIN_S1) {
> +	if (smmu_domain->stage == ARM_SMMU_DOMAIN_BYPASS) {
> +		ste->s1_cfg = NULL;
> +		ste->s2_cfg = NULL;
> +	} else if (smmu_domain->stage == ARM_SMMU_DOMAIN_S1) {
>  		ste->s1_cfg = &smmu_domain->s1_cfg;
>  		ste->s2_cfg = NULL;
>  		arm_smmu_write_ctx_desc(smmu, ste->s1_cfg);
> @@ -1801,7 +1817,7 @@ static void arm_smmu_remove_device(struct device 
> *dev)
> 
>  	master = fwspec->iommu_priv;
>  	smmu = master->smmu;
> -	if (master && master->ste.valid)
> +	if (master && master->ste.assigned)
>  		arm_smmu_detach_dev(dev);
>  	iommu_group_remove_device(dev);
>  	iommu_device_unlink(&smmu->iommu, dev);

-- 
Qualcomm Datacenter Technologies, Inc. on behalf of Qualcomm 
Technologies, Inc.
Qualcomm Technologies, Inc. is a member of the Code Aurora Forum, a 
Linux
Foundation Collaborative Project.



More information about the linux-arm-kernel mailing list