Received: by 10.192.165.156 with SMTP id m28csp473608imm; Fri, 13 Apr 2018 02:24:12 -0700 (PDT) X-Google-Smtp-Source: AIpwx4/5mEocnvnNsA28GVbHSj5JVnGRvn8V0uizVTqevaHwQTRgvq439zlk1dtuYPbvJZj+yx80 X-Received: by 10.98.32.87 with SMTP id g84mr10720129pfg.28.1523611452061; Fri, 13 Apr 2018 02:24:12 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1523611452; cv=none; d=google.com; s=arc-20160816; b=0l4UEBcW4p7avyxZ8RoVDtcb+ZvghPbxRw7qLErtbf2pUJvimQvVZM6ezdwDzrH5ae VPAgDGZ+QeihVT6v3TL3Zlvttz92jEAjAcDRCprxX5+Faf9hjFCi2WaFqjnTG+2aiTUX X8/emA2Pm7rOl1LrsE2Egklsumw56IdaZkqxcnZfHhTuUOriQK75MPQt99iUjukKGCbH J8Cba/WOBWT1/8bzLv1zE/iJygMMQSYHG6BtvfalG1QOau/OoplgGFvNgH3OX/eUNzCB 4+ZmGkGaBOmr/y2EG3yVDnuoM8qcZpTLGmcgIzUfNGrNqNtATVm6hZdtOMHz2rL+d6VO W6GQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id :arc-authentication-results; bh=Ze47+vH3PXFKuXp0KbnHSemySKM2khI+7tE0bfDaQ68=; b=WmWxTJbEa5MQ7SPAZm1F6UePshNSdySiHhKQVMxDkCOboRNAh6OwjIrJDwTvkzOybM 77DzdU9JwDGC5Rr8kUHT1CNw6ye8LV3MmwXLmxu68sFcBORtXnuAC1zz24iDoys7l9Y2 4P1ytxM9CrQSs08LtKrEXuPIqJFEdvMSYDkFNTTGskTOPeDGyqSmFAjtXzfGuHCziu4G OqFgS7Ch41qap3T0moU2p0djdtWrPN72xy+ae4nIeZstqq0SnIdPY725L20o9YJn6U0i DqUWT8y73FBOygnUULrNRsl5fbHNScDC9qSFSaB9Yncj9mX40M+mDDfE4YgBiN26NHtq Jw9g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q6si3614868pgt.130.2018.04.13.02.23.57; Fri, 13 Apr 2018 02:24:11 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754120AbeDMJWu (ORCPT + 99 others); Fri, 13 Apr 2018 05:22:50 -0400 Received: from metis.ext.pengutronix.de ([85.220.165.71]:49993 "EHLO metis.ext.pengutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753967AbeDMJWt (ORCPT ); Fri, 13 Apr 2018 05:22:49 -0400 Received: from lupine.hi.pengutronix.de ([2001:67c:670:100:3ad5:47ff:feaf:1a17] helo=lupine) by metis.ext.pengutronix.de with esmtp (Exim 4.89) (envelope-from ) id 1f6uue-0005W7-NJ; Fri, 13 Apr 2018 11:22:32 +0200 Message-ID: <1523611347.3396.3.camel@pengutronix.de> Subject: Re: [PATCH v3 2/2] vfio: platform: Add generic DT reset support From: Philipp Zabel To: Geert Uytterhoeven Cc: Sinan Kaya , Auger Eric , Geert Uytterhoeven , Baptiste Reynal , Alex Williamson , Rob Herring , Mark Rutland , KVM list , "open list:OPEN FIRMWARE AND FLATTENED DEVICE TREE BINDINGS" , Linux-Renesas , Linux Kernel Mailing List Date: Fri, 13 Apr 2018 11:22:27 +0200 In-Reply-To: References: <1523438149-16433-1-git-send-email-geert+renesas@glider.be> <1523438149-16433-4-git-send-email-geert+renesas@glider.be> <2e09425d-0f27-3069-3421-e454ee70e3b2@redhat.com> <1523542206.3689.10.camel@pengutronix.de> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.22.6-1+deb9u1 Mime-Version: 1.0 Content-Transfer-Encoding: 7bit X-SA-Exim-Connect-IP: 2001:67c:670:100:3ad5:47ff:feaf:1a17 X-SA-Exim-Mail-From: p.zabel@pengutronix.de X-SA-Exim-Scanned: No (on metis.ext.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Geert, On Thu, 2018-04-12 at 18:02 +0200, Geert Uytterhoeven wrote: > Hi Philipp, > > On Thu, Apr 12, 2018 at 4:10 PM, Philipp Zabel wrote: > > On Thu, 2018-04-12 at 15:12 +0200, Geert Uytterhoeven wrote: > > > On Thu, Apr 12, 2018 at 2:36 PM, Sinan Kaya wrote: > > > > On 4/12/2018 7:49 AM, Auger Eric wrote: > > > > > On 12/04/18 13:32, Geert Uytterhoeven wrote: > > > > > > On Thu, Apr 12, 2018 at 12:31 PM, Auger Eric wrote: > > > > > > > On 11/04/18 11:15, Geert Uytterhoeven wrote: > > > > > > > > Vfio-platform requires reset support, provided either by ACPI, or, on DT > > > > > > > > platforms, by a device-specific reset driver matching against the > > > > > > > > device's compatible value. > > > > > > > > > > > > > > > > On many SoCs, devices are connected to an SoC-internal reset controller. > > > > > > > > If the reset hierarchy is described in DT using "resets" properties, > > > > > > > > such devices can be reset in a generic way through the reset controller > > > > > > > > subsystem. Hence add support for this, avoiding the need to write > > > > > > > > device-specific reset drivers for each single device on affected SoCs. > > > > > > > > > > > > > > > > Devices that do require a more complex reset procedure can still provide > > > > > > > > a device-specific reset driver, as that takes precedence. > > > > > > > > > > > > > > > > Note that this functionality depends on CONFIG_RESET_CONTROLLER=y, and > > > > > > > > becomes a no-op (as in: "No reset function found for device") if reset > > > > > > > > controller support is disabled. > > > > > > > > > > > > > > > > Signed-off-by: Geert Uytterhoeven > > > > > > > > Reviewed-by: Philipp Zabel > > > > > > > > --- a/drivers/vfio/platform/vfio_platform_common.c > > > > > > > > +++ b/drivers/vfio/platform/vfio_platform_common.c > > > > > > > > @@ -127,8 +130,16 @@ static int vfio_platform_get_reset(struct vfio_platform_device *vdev) > > > > > > > > vdev->of_reset = vfio_platform_lookup_reset(vdev->compat, > > > > > > > > &vdev->reset_module); > > > > > > > > } > > > > > > > > + if (vdev->of_reset) > > > > > > > > + return 0; > > > > > > > > + > > > > > > > > + rstc = of_reset_control_get_exclusive(vdev->device->of_node, NULL); > > > > > > > > > > > > > > Shouldn't we prefer the top level reset_control_get_exclusive()? > > > > > > > > > > > > I guess that should work, too. > > > > > > > > > > > > > To make sure about the exclusive/shared terminology, does > > > > > > > get_reset_control_get_exclusive() check we have an exclusive wire > > > > > > > between this device and the reset controller? > > > > > > > > > > > > AFAIU, the "exclusive" means that only a single user can obtain access to > > > > > > the reset, and it does not guarantee that we have an exclusive wire between > > > > > > the device and the reset controller. > > > > > > > > > > > > The latter depends on the SoC's reset topology. If a reset wire is shared > > > > > > by multiple devices (e.g. resets shared by PWM or Display Unit devices on > > > > > > R-Car SoCs), exporting a subset of these devices to a guest is a bad idea, > > > > > > indeed. > > > > > > > > > > So who's going to check this assigned device will not trigger a reset of > > > > > other non assigned devices sharing the same reset controller? > > > > If the reset control is requested as exclusive, any other driver > > requesting the same reset control will fail (or this reset_control_get > > will fail, whichever comes last). > > > > > > I like the direction in general. I was hoping that you'd call it of_reset_control > > > > rather than reset_control. > > > > > > You mean vfio_platform_device.of_reset_control? > > > If we switch to reset_control_get_exclusive(), that doesn't make much sense... > > > > > > > Is there anything in the OF spec about what to expect from DT's reset? > > > > > > Documentation/devicetree/bindings/reset/reset.txt says: > > > > > > "A word on where to place reset signal consumers in device tree: It is possible > > > in hardware for a reset signal to affect multiple logically separate HW blocks > > > at once. In this case, it would be unwise to represent this reset signal in > > > the DT node of each affected HW block, since if activated, an unrelated block > > > may be reset. Instead, reset signals should be represented in the DT node > > > where it makes most sense to control it; this may be a bus node if all > > > children of the bus are affected by the reset signal, or an individual HW > > > block node for dedicated reset signals. The intent of this binding is to give > > > appropriate software access to the reset signals in order to manage the HW, > > > rather than to slavishly enumerate the reset signal that affects each HW > > > block." > > > > This was written in 2012, and unfortunately the DT binding documentation > > does not inform hardware development, and has not been updated since. > > > > There's generally two kinds of reset uses: > > - either to bring a device into a known state at a given point in time, > > which is often done using a timed assert/deassert sequence, > > - or just to park a device while not in active use (must deassert any > > time before use, may or may not assert any time after use) > > > > For the former case, the above paragraph makes a lot of sense, because > > when it is necessary to reset a device that shares the reset line with > > another, either choice between disturbing the other device, or not > > being able to reset when necessary, is a bad one. The reset controller > > framework supports those use cases via the reset_control_get_exclusive > > function variants. > > > > But for the latter case, there is absolutely no need to forbid sharing > > reset lines among multiple devices, as deassertion/assertion can just be > > handled reference counted, like clocks or power management. The reset > > controller framework supports those use cases via the > > reset_control_get_shared function variants. > > > > The case we are talking about here is the first one. > > Except that vfio-platform wants to reset the device before and after its > use by the guest, for isolation reasons, which does cause a major > disturbance in case of a shared reset. Right. So suddenly we are making devices / drivers that usually would fall into the latter case add a requirement from the first case. That also means it is impossible to use just one of the devices that share a reset line for vfio individually, while the other ones are still in use by the host. Currently the reset line is a shared resource similar to the iommu for devices in the same iommu_group. Is there any mechanism in vfio that would allow modeling other shared resources apart from iommu? [...] > > For some of those it may be possible, but that is basically just a work- > > around for reality not matching expectations. There may be other cases > > where devices sharing a reset line are not even in the same parent node > > because they are controlled via a different bus. In general, I don't > > think it is feasible or desirable to force grouping of devices that > > share the same reset line into a common parent node. > > At least for Renesas R-Car SoCs, I think this is feasible, as all affected > devices are currently grouped under the same /soc node. > I added subnodes for all devices sharing resets (one for pwm, 4 for USB2, > and one for USB3; display doesn't have resets yet), and it still boots ;-) Is this grouping enough to make sure all of the pwm/usb2/usb3 devices are only ever configured for vfio use together? Assuming I have pwm[1-4] all sharing the same reset line, and I want pwm2 to be used by a vfio guest, I first have to make sure that all of pwm[1-4] are unbound, releasing their shared resets, before vfio- platform can request the same reset line as exclusive. Thinking about it, if the pwm drivers keep their requested reset control around for the duration the device is bound, the reset controller framework should already kind of handle this - while any of the shared reset control handles is kept around, any exclusive request for the same reset control will fail with -EBUSY (and the other way around). But that requires all drivers to request the reset control during probe and release it during remove. > However, ehci_platform_probe() cannot get its (optional) resets anymore. > Probably the reset controller framework needs to be taught to look for > shared resets in the parent node, too? Hm, a generic framework shouldn't do such a thing, the parent node could be covered by a completely different binding. > > My suggestion would be to relax the language in the reset.txt DT > > bindings doc. > > Which is fine to keep the status quo with the hardware designers, but makes > it less likely for non-whitelisted generic reset controller support to > become acceptable for the vfio people... I still may be missing context, but I fail to see how pwm@0 { resets = <&shared_reset_control>; }; pwm@1 { resets = <&shared_reset_control>; }; -> pwms { resets = <&shared_reset_control>; pwm@0 { }; pwm@1 { }; }; makes any difference here, unless pwms gets bound to an actual driver that is used for vfio? regards Philipp