Received: by 2002:ac0:a5a7:0:0:0:0:0 with SMTP id m36-v6csp437533imm; Thu, 12 Jul 2018 23:32:21 -0700 (PDT) X-Google-Smtp-Source: AAOMgpfwka3l+hWogyOSh2nslo7M92l0H/TrpL4fa0tymWExreVcCY0pbgem8pBWWmeUNx7OskTo X-Received: by 2002:a17:902:b586:: with SMTP id a6-v6mr5086174pls.174.1531463541432; Thu, 12 Jul 2018 23:32:21 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1531463541; cv=none; d=google.com; s=arc-20160816; b=pEdIomXxHzSvPBkH2GJnvjcW0cHSYQOqgq245ECcW8g/HuRdp7M1qCp0kUof5vdInO L2LCJFgIfrdLKiw9JCWNynPzPO0+uo6HjMwnbUGFAdCIAp3+wpFJV2tBy9girQNw2MYD kxZyHOjHTmxMlHaC/XshW74Z3eDiPcARU+UsOMN5YO/R/dsKRrlvStE/NkSPgRlUnth1 qbzuTSruvd5ktkSCtxM9YOVjptp7RE1JqnyWuC8dBL0s2stcamrFT+FMT2wOysWToMKV 3Pm4WdiG3fyDbSQRCWnrlEdIS8DeCDVtoqh361PTdKvcZ8zK+3Y9TOF0xbpVNQoCR1ua 8/jQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:subject:date:references:in-reply-to :content-transfer-encoding:mime-version:cc:to:from:message-id :dkim-signature:dkim-signature:arc-authentication-results; bh=N7v/yOCQTV4AhtQmPj8jZl0f9B+WsZEynpcAqPTwZs4=; b=hQFVipanqNX35lul/u8B27S1q2SGqZ2zLuXr1e3qUXXFeN7kKP5jMIMx+VV17pAih/ SREOU/Dwj85C2l2p+vsouxoh0aIBH/ORPlD5rwA85bcV2zV0WSMXTjsDPxjjmlQjN5Vp TWaWwXCsfmgqgsp8aO3FimbKO3aQX8juGTZ8mVS+SEqQ849EnsBgx2eNCGR+a/iDybqS Yq7WzHDU80q985h6I7mVgG8Fnc8QMaBd7vuC81sc4bgiFoHL05J2IeyTMPJh56Oz/SMm bUoovLCOa3OlSjfnmXpx2gDxYfpwpIdKt8K4El8eO/fGKaBw/AAn8LaAAbYMoOMG6TQj YIxA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@aj.id.au header.s=fm3 header.b=AwZXBVgl; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=CvoQztjB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id 199-v6si25983021pfv.114.2018.07.12.23.32.06; Thu, 12 Jul 2018 23:32:21 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@aj.id.au header.s=fm3 header.b=AwZXBVgl; dkim=pass header.i=@messagingengine.com header.s=fm3 header.b=CvoQztjB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727306AbeGMGol (ORCPT + 99 others); Fri, 13 Jul 2018 02:44:41 -0400 Received: from out5-smtp.messagingengine.com ([66.111.4.29]:34853 "EHLO out5-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726035AbeGMGok (ORCPT ); Fri, 13 Jul 2018 02:44:40 -0400 Received: from compute4.internal (compute4.nyi.internal [10.202.2.44]) by mailout.nyi.internal (Postfix) with ESMTP id 9B2D821AF5; Fri, 13 Jul 2018 02:31:30 -0400 (EDT) Received: from web4 ([10.202.2.214]) by compute4.internal (MEProxy); Fri, 13 Jul 2018 02:31:30 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=aj.id.au; h=cc :content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-sender :x-me-sender:x-sasl-enc; s=fm3; bh=N7v/yOCQTV4AhtQmPj8jZl0f9B+Ws ZEynpcAqPTwZs4=; b=AwZXBVglEMqTevCtW6w8lkmRJyaDkX8D7mHO4GhxvzWba YQ5AVGfSvBU7KZpUov5h80hNjiXM/D09QZ13HxKAzmGF/sflJ1aoHvkQv2gZ93BL 7Yd+Mw2ZNn0zYy/ZdiRSS4P/+0Do2nSkORSQT/7MQISQiDxe8/CTg4NFXr5rkbC9 OSxejbjbWQgAX1gnTvpI0jZD46c0Ey+dQpqwI3kw1CUzEOqhWltOEiL6dowVVvw6 jxbOGRxTMle/Pl8GkbrdlnNseQNPQee3E0loWypR/1ZrpplfWnBfOF6FrGjwkl+i nE0bzBLTX6GgScn2Bf8cCg0McvaYsuWxdg4XWZv/Q== DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=cc:content-transfer-encoding:content-type :date:from:in-reply-to:message-id:mime-version:references :subject:to:x-me-sender:x-me-sender:x-sasl-enc; s=fm3; bh=N7v/yO CQTV4AhtQmPj8jZl0f9B+WsZEynpcAqPTwZs4=; b=CvoQztjBZl2yq8xqZtXl35 NsJZCNQET7JxNtqBxa69JPCQX0grMzNxmn9hMaLe8cBEhz/kM+uK68p5QMAc15L1 dsd+XkURcEVXSbXfloJKBcCrEHSNvjgCF98FJ0f0yqFDRyNdLzymIyjE5TGN8XKX iNaD7+c4wER/Ob6z2uC+vHIKtIdYqpNIKEiqR8kHXvI0X+AWLXYKqsg4efPaQ/vF X36kAGjoFUGmeD244EY8w+iF0a3ft07A0FgvSoOMaIkVyvUM0tw0zc2CvZjb1267 H0mS5Sv64CetOXnKSar9O1mmOZ8KQjn6jtsYIYT3vfmxXyinH8/orlAGPns+tAXg == X-ME-Proxy: X-ME-Sender: Received: by mailuser.nyi.internal (Postfix, from userid 99) id 6F326BA4CF; Fri, 13 Jul 2018 02:31:29 -0400 (EDT) Message-Id: <1531463489.747186.1439263128.075AECE1@webmail.messagingengine.com> From: Andrew Jeffery To: Benjamin Herrenschmidt , Rob Herring Cc: Mark Rutland , devicetree@vger.kernel.org, "Greg Kroah-Hartman" , Eugene.Cho@dell.com, a.amelkin@yadro.com, linux-kernel@vger.kernel.org, Joel Stanley , stewart@linux.ibm.com, OpenBMC Maillist , "moderated list:ARM/FREESCALE IMX / MXC ARM ARCHITECTURE" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Type: text/plain; charset="utf-8" X-Mailer: MessagingEngine.com Webmail Interface - ajax-957169fa In-Reply-To: References: <20180711053122.30773-1-andrew@aj.id.au> <20180711053122.30773-2-andrew@aj.id.au> <20180711200450.GB17291@rob-hp-laptop> <1531356830.3551458.1437853280.551CA8C5@webmail.messagingengine.com> Date: Fri, 13 Jul 2018 16:01:29 +0930 Subject: Re: [RFC PATCH v2 1/4] dt-bindings: misc: Add bindings for misc. BMC control fields Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Rob, Ben, I've replied to you both inline below, hopefully it's clear enough from the context. On Fri, 13 Jul 2018, at 10:25, Benjamin Herrenschmidt wrote: > On Thu, 2018-07-12 at 09:11 -0600, Rob Herring wrote: > > On Wed, Jul 11, 2018 at 6:54 PM Andrew Jeffery wrote: > > > > > > Hi Rob, > > > > > > Thanks for the response. > > > > > > On Thu, 12 Jul 2018, at 05:34, Rob Herring wrote: > > > > On Wed, Jul 11, 2018 at 03:01:19PM +0930, Andrew Jeffery wrote: > > > > > Baseboard Management Controllers (BMCs) are embedded SoCs that exist to > > > > > provide remote management of (primarily) server platforms. BMCs are > > > > > often tightly coupled to the platform in terms of behaviour and provide > > > > > many hardware features integral to booting and running the host system. > > > > > > > > > > Some of these hardware features are simple, for example scratch > > > > > registers provided by the BMC that are exposed to both the host and the > > > > > BMC. In other cases there's a single bit switch to enable or disable > > > > > some of the provided functionality. > > > > > > > > > > The documentation defines bindings for fields in registers that do not > > > > > integrate well into other driver models yet must be described to allow > > > > > the BMC kernel to assume control of these features. > > > > > > > > So we'll get a new binding when that happens? That will break > > > > compatibility. > > > > > > Can you please expand on this? I'm not following. > > > > If we have a subsystem in the future, then there would likely be an > > associated binding which would be different. So if you update the DT, > > then old kernels won't work with it. > > What kind of "subsystem" ? There is almost no way there could be one > for that sort of BMC tunables. We've look at several BMC chips out > there and requirements from several vendors, BIOS and system > manufacturers and it's all over the place. Right - This is the fundamental principle backing these patches: There will never be a coherent subsystem catering to any of what we want to describe with these bindings. > > > > I feel like this is an argument of tradition. Maybe people have > > > been dissuaded from doing so when they don't have a reasonable use- > > > case? I'm not saying that what I'm proposing is unquestionably > > > reasonable, but I don't want to dismiss it out of hand. > > ... > > > > It comes up with system controller type blocks too that just have a > > bunch of random registers. This matches the situation at hand. > > Those change in every SoC and not in any > > controlled or ordered way that would make describing the individual > > sub-functions in DT worthwhile. "Not worthwhile" is what I'm pushing back against for our use cases. I think they are narrow and limited enough to make it worthwhile. Obviously we want to avoid describing these things *badly* - you mentioned the clock bindings - so I'm happy to hash out what the right representation should be. But I struggle to think the solution is not describing some of our hardware features at all. > > So what's the alternative ? Because without something like what we > propose, what's going to happen is /dev/mem ... that's what people do > today. Yep. And I've outlined in the cover letter what I think are the advantages of what I'm proposing over /dev/mem. It's not an incredible gain, but has several of nice-to-have properties. > > > > > A node per register bit doesn't scale. > > > > > > It isn't meant to scale in terms of a single system. Using it > > > extensively is very likely wrong. Separately, register-bit-led does > > > pretty much the same thing. Doesn't the scale argument apply there? > > > Who is to stop me from attaching an insane number of LEDs to a > > > system? > > > > Review. > > > > If you look, register-bit-led is rarely used outside of some ARM, Ltd. > > boards. It's simply quite rare to have MMIO register bits that have a > > fixed function of LED control. > > Well, same here, we hope to review what goes upstream to make it > reasonable. Otherwise it doens't matter. If a random vendor, let's say > IBM, chose to chip a system where they put an insane amount of cruft in > there, it will only affect those systems's BMC and the userspace stack > on it. > > Thankfully that stack is OpenBMC and IBM is aiming at having their > device-tree's upstream, thus reviewed, thus it won't happen. > > *Anything* can be abused. The point here is that we have a number, > thankfully rather small, maybe a dozen or two, of tunables that are > quite specific to a combination (system vendor, bmc vendor, system > model) which control a few HW features that essentially do *NOT* fit in > a subsystem. Exactly. I tried to head off the abuse vector by requiring that uses be listed in the bindings document, and thus enforce some level of review. It might not be the most effective approach at the end of the day, but at least it is something. > > For everything that does, we have created proper drivers (and are doing > more). > > > > > Obviously if there are lots of systems using it sparingly and > > > legitimately then maybe there's a scale issue, but isn't that just > > > a reality of different hardware designs? Whoever is implementing > > > support for the system is going to have to describe the hardware > > > one way or another. > > > > > > > > > > > Maybe this should be modelled using GPIO binding? There's a line there > > > > too as whether the signals are "general purpose" or not. > > > > > > I don't think so, mainly because some of the things it is intended to be used for are not GPIOs. For instance, take the DAC mux I've described in the patch. It doesn't directly influence anything external to the SoC (i.e. it's certainly not a traditional GPIO in any sense). However, it does *indirectly* influence the SoC's behaviour by muxing the DAC internally between: > > > > > > 0. VGA device exposed on the host PCIe bus > > > 1. The "Graphics CRT" controller > > > 2. VGA port A > > > 3. VGA port B > > > > And this mux control is fixed in the SoC design? > > This specific family of SoC (Aspeed) support those 4 configurations. > How they need to be configured at runtime depends on the combination of > system vendor and system model, along with in some cases the need to > switch it at runtime. > > This is just one example. Another one is the handful of scratch > registers that need to be populated with the "right" values for the > host system BIOS, VGA BIOS and VGA driver. (The host bits access them > via LPC IO space). > > The host system BIOS will read some basic config info there before its > IPMI stack is up (and some BIOSes already rely on that). The VGA BIOS > will get some strapping info and panel info. The VGA driver (which is > already upstream, has been for a long time) will look for other things > in some of these guys, such as connector configuration. > > Andrew, if it helps, we could put together a list of what we typically > need on an OpenPower system today. That would give people like Rob a > better idea of what this is all about. It's primarily what I've outlined at the bottom of the bindings document, though the use cases aren't provided there as they are a bit out-of-scope. So the SuperIO and VGA scratch registers, plus the DAC mux. A bunch of tunable things. OpenPOWER platforms make use of the SuperIO scratch registers to convey configuration information from the BMC to the host. Information provided includes low-level control of the host firmware initialisation process, UART and logging configuration, and the strategy for handling errors (crash vs log). This is all an "arbitrary" contract between the BMC userspace and the host firmware, i.e. different platforms/firmware could lay out the same information in different ways or communicate entirely different information altogether. The BMC kernel shouldn't care about any of it, other than provide sensible access to the hardware. Again on OpenPOWER systems using the ASPEED BMC SoCs running OpenBMC, the BMC uses the VGA scratch registers to sense initialisation of the host graphics driver in the host's boot process. When the BMC userspace detects the host VGA driver is up we switch the DAC mux from the BMC CRT device to the host VGA device so that the host is now driving the VGA output. Non-OpenPOWER OpenBMC configurations may do something entirely different, or not do anything at all with the hardware, so as above, it's not really the job of the BMC kernel to be involved in any of this, other than to provide sensible access to userspace. There are a number of other switches that control the availability of ASPEED BMC hardware features to the host system that also don't fit any particular subsystem and so will use these bindings, but our (OpenPOWER/OpenBMC) current uses are what's described above. Dell also suggested they had some use-cases that aligned with the intent of the bindings, but I don't know what they had in mind. Eugene (on Cc) can elaborate. > > > > > > > Maybe this could be modelled by pinmux, but then we still need some > > > way to expose the mux functions to userspace for selection > > > (userspace needs to transition arbitrarily between at least options > > > 0 and 1 at runtime), at which point we haven't achieved much beyond > > > adding a whole heap of infrastructure in the chain. > > > > > > Given 0 and 1, maybe exposing attributes in relevant drivers would > > > be reasonable, except 0 isn't exposed on the SoC's internal bus so > > > there is no driver on the BMC-side to do so. Taking into account 2 > > > and 3 are also purely hardware paths further dashes the idea, as > > > the configuration doesn't really "belong" to the Graphics CRT > > > device more than it belongs anywhere else, except for the fact that > > > there isn't anywhere else to expose it. > > > > > > Further, the BMC's kernel can't make the decision as to when to > > > switch the mux as it knows nothing of the host's state. The BMC > > > userspace is controlling the host's boot state and so *does* know > > > when to flip the switch. Finally, the mux is in separate IP to the > > > CRT or VGA blocks: It lives in the System Control Unit. > > > > > > My current point of view is the DAC mux field is effectively its > > > own device, and we need to control it from userspace, so we need > > > some way to describe it (i.e. not ignore it) in order for its > > > capability to be exposed. > > > > > > I'm fully aware what I'm proposing isn't awesome as it's not > > > providing any real abstraction, but the problem(s) at hand also > > > seem to defy abstraction, and in order to avoid a plethora of > > > bespoke bindings I thought it was reasonable to define something > > > generic. > > > > > > All-in-all I appreciate the suggestion, but assuming you agree with > > > my reasoning above do you have thoughts on other alternatives? > > > > Seems the controls are more fixed than I first thought. All the data > > you have here could simply be within a driver. Rob: A driver for what though? One unique to this particular mux? That feels overly specific when we can generalise the concept to cover a wider range of use-cases. > > Help me understand what > > functions are fixed (in the SoC) and which ones vary by board. Only > > what's changing per board really needs to go into DT. I think this last sentence identifies a difference in our starting points, so I'd like to explore that. Blocks of functionality might move around inside the SoC as well, so don't we need a way to describe those functions appropriately? And from there describe how the SoC integrates the functions, and then describe how a board integrates the SoC? This all composes, and the problem at the end of the day comes down to what we want to view as a point of abstraction, right? It seems ideal to me that the metadata about hardware features resides in the description of the relevant system (DT, for a function, a SoC or a board), otherwise don't we wind up with crazy, unfocused, monolithic drivers for things like system controllers? (There's MFD/syscon, but having used it previously I'm still grappling with the benefit over some of the weirdness it injects into devicetree - maybe I did it wrong.) Or alternatively, a generic driver that's choc full of platform-specific data covering the platforms that require it? The driver that implements the behaviour of the bindings described here turns out quite focused (even if the first attempt was a bit of a basket case, hopefully the second is better (sorry Greg)). > > Most of these things is specific to a given board or may even need to > be changed at runtime. *snip*... > > Talking of which: Andrew, did you put "default values" in your binding > ? That would be a nice way to deal with system specific immutables, so > that userspace doesn't even have to care. Yes, I described a `default-value`property for RW fields, and `default-set` and `default-clear`properties for write-1-set/write-1-clear fields for exactly this purpose. > > So to clarify once and for all, *anything* that fits in a subsystem, > we're putting in one. All the random board control is all GPIOs and > that's fine as well. For some things that require a bit of fiddly usage > like the "MBOX" logic between BIOS and BMC we are also doing a > dedicated driver. (As an aside, the "MBOX" functionality is slightly different from the scratch registers in that it has configurable interrupts each way (BMC-to-Host and Host-to-BMC) - as such it can be used to implement a dynamic protocol and so deserves its own driver. This is in contrast to the dumb scratch registers we're describing with these bindings which have no such interrupts.) > > But there's a few stragglers here, and they tend to be so > board/system/BIOS specific that it's not sustainable to create/change > random drivers all the time just for exposing those few tunables. > Yes, this is my feeling too. Cheers, Andrew