Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp140311ybx; Thu, 31 Oct 2019 17:27:52 -0700 (PDT) X-Google-Smtp-Source: APXvYqzaPFGhqg5ihEgEVhsu6ehzzeaqm7rSuAGYjblH4YXeLvbm//H4EsNQ5E654WU0TTe0ukOK X-Received: by 2002:a50:a227:: with SMTP id 36mr9522538edl.262.1572568072765; Thu, 31 Oct 2019 17:27:52 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1572568072; cv=none; d=google.com; s=arc-20160816; b=FGizPL1EkrygySeORIbOFKv3ivI9/eOjZk605SqLM9BMIcvumJwX5LqODJahfVgMM2 ttBa/BCXRaY+RNcrwBjx14z96UvgPgg8mIRDO5QYdwvRIkRn02CpnV7bR8IJ11PKyHhA GKICrSVNQP8gQb388cUA+4Fap3zTI41Fxq0VLeZlWjstUUZBggNn480oJKvV2ROjJkRJ Ekn1KZWoVIB3UlBmGYmAnHl9ksljhvoZP5un3mM0gVxebe27wMKSDOIgdNDYcAFXLDyq ga/jj721Llx0ieXphXcIlX8hEYKYzotHqj7M1u0IlZbAoy8ZhtiPJ/uU/oE49ib7l58K WCzA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=HGoHxR3NtdOTWlkVc1ys+9ogvs4xOCVkWZMzaTeK/Gs=; b=Zw30MzDZng0LHXScR/c0mKuD6w5nB88yhPWpvkrzQ4OibLWev9Ht/2QuUOJqhT4lY0 KMREibvJX+dfNM5rVY4gzuN4rz6TpyqjsUA7ue7zSBEbajCUvmYSIPR6rdoqHyjmd0oP owbEGg24jrJ/Gp1Gf7/xhIkqiRapWiqzNVLuCDi24srcLcS0FSrMaKr6FyIzr9JVSW/v yZjUKr/Y0tZXs/HctRpiKcoc02kCwk2CIPw4XX4XbSRNh4SF/ctNGSC6rvtMZ+6rEC6e H4TqwLt9IK5YjFHqFiPLUIfUdVm2jhgalAJuELFnNEPgQRLgvBKo0SWnXKnoQQIkOozW ircQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=HQtder84; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y17si4467415ejr.51.2019.10.31.17.27.00; Thu, 31 Oct 2019 17:27:52 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=HQtder84; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727452AbfJaXex (ORCPT + 99 others); Thu, 31 Oct 2019 19:34:53 -0400 Received: from mail-yw1-f67.google.com ([209.85.161.67]:44345 "EHLO mail-yw1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726506AbfJaXex (ORCPT ); Thu, 31 Oct 2019 19:34:53 -0400 Received: by mail-yw1-f67.google.com with SMTP id a83so1420566ywe.11 for ; Thu, 31 Oct 2019 16:34:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=HGoHxR3NtdOTWlkVc1ys+9ogvs4xOCVkWZMzaTeK/Gs=; b=HQtder84SXthDEQwBji6Wsy9VT2+/SRQYc+S+MeUTDlOxw0hFW8bqJ+a+X8snz2dNE 7FIAiW6POXyLpwHx6hjXhQAS+UckZFmPFYlzqq0+qdD+iLJHFo7htSHoGX4OCE6+5r8+ aM09IhSLRdsCEiQvkk4r41k8/aWnIH6pSu5yBWWzBXDio1HAtxI98rlyRCMNF1jBlyBs dc5nblXJB+jTL0NeLiM1MHXqd/P2LhrgetHsgw4y1qKNaOXwlPdB5ULbrhEEaObpp3yl 1hPiQbBuPAQVIVwOYGE6FENyP0Z2lfgGeYHyxVlB5iEfu32Htn6e50xrjPTn/RbmDvvr vYiA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=HGoHxR3NtdOTWlkVc1ys+9ogvs4xOCVkWZMzaTeK/Gs=; b=oTsZZuWvtsuqR7rKlxJq8eTj/EdzzxFrLH8rS3YPZNTD8nsZL/E7ntRVGYuXm/rY3J LBPniL5IbkNNpgiVaya8nu+CSUZPAGGE8C5R8TdGg7gB2e2h/b3+/AEWt56z32IG/045 ZXomP5OUjmI1muDgzLvw/p/6SR6sN+q4ENmAmpI1XyNgO11kugDDwnDXZiW3a5iZ1kMe 0LhlOaCA201KsQldzrUSCGh6GaNleDkiaL5xdITSSTDqCkQxDu/HWvN7V/TxwMRjv3MQ V4mkmysXGJgkTsDhyRGUo8kYNWq411nNumxiOpZnEst7p4GSMKnMsXaNWYvOxOUfF21C 5mCw== X-Gm-Message-State: APjAAAVcU0RjEBGvveVwTQo1ydXmFDuYRT7DpHoID3ohHrFXWur0zOWi 0jDHF0aJ0mhiYgVcVTCUvfiSzsIxGA7vdWGN3e3kVsob X-Received: by 2002:a9d:3a3:: with SMTP id f32mr6914486otf.231.1572564890313; Thu, 31 Oct 2019 16:34:50 -0700 (PDT) MIME-Version: 1.0 References: <20191030145112.19738-1-will@kernel.org> <6e457227-ca06-2998-4ffa-a58ab171ce32@arm.com> <20191030155444.GC19096@willie-the-truck> <20191031193758.GA2607492@lophozonia> In-Reply-To: <20191031193758.GA2607492@lophozonia> From: Saravana Kannan Date: Thu, 31 Oct 2019 16:34:14 -0700 Message-ID: Subject: Re: [PATCH 0/7] iommu: Permit modular builds of ARM SMMU[v3] drivers To: Jean-Philippe Brucker Cc: Will Deacon , LKML , iommu@lists.linux-foundation.org, Bjorn Helgaas , Robin Murphy Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Oct 31, 2019 at 12:38 PM Jean-Philippe Brucker wrote: > > Hi Saravana, Will, > > On Wed, Oct 30, 2019 at 05:57:44PM -0700, Saravana Kannan via iommu wrote: > > > > > Obviously you need to be careful about using IOMMU drivers as modules, > > > > > since late loading of the driver for an IOMMU serving active DMA masters > > > > > is going to end badly in many cases. On Android, we're using device links > > > > > to ensure that the IOMMU probes first. > > > > > > > > Out of curiosity, which device links are those? Clearly not the RPM links > > > > created by the IOMMU drivers themselves... Is this some special Android > > > > magic, or is there actually a chance of replacing all the > > > > of_iommu_configure() machinery with something more generic? > > > > > > I'll admit that I haven't used them personally yet, but I'm referring to > > > this series from Saravana [CC'd]: > > > > > > https://lore.kernel.org/linux-acpi/20190904211126.47518-1-saravanak@google.com/ > > > > > > which is currently sitting in linux-next now that we're upstreaming the > > > "special Android magic" ;) > > Neat, I'm trying to do the same for virtio-iommu. It needs to be modular > because it depends on the virtio transport, which distributions usually > build as a module. So far I've been managing the device links in > virtio-iommu's add_device() and remove_device() callbacks [1]. Since it > relies on the existing probe deferral, I had to make a special case for > virtio-iommu to avoid giving up after initcalls_done [2]. > > Currently buggy, it explodes on the second modprobe. > > [1] http://jpbrucker.net/git/linux/commit/?h=virtio-iommu/module-2019-10-31&id=f72978be18cb52eaa2d46dc762711bacbfab5039 > [2] http://jpbrucker.net/git/linux/commit/?h=virtio-iommu/module-2019-10-31&id=f5fe188bb7fde33422ef08b9aad956dc3c77ec39 > > [...] > > Wrt IOMMUs, the only missing piece in upstream is a trivial change > > that does something like this in drivers/of/property.c > > > > +static struct device_node *parse_iommus(struct device_node *np, > > + const char *prop_name, int index) > > +{ > > + return parse_prop_cells(np, prop_name, index, "iommus", > > + "#iommu-cells"); > > +} > > The 'iommus' property only applies to platform devices, An early version of this patch series was limited to platform device, but that's not true with the version that Will pointed to and was merged into driver-core-next. The iommu parsing and creating device links applies to all devices that use DT. That's why this code is in of/property.c opposed to of/platform.c. > do you have any > plan for PCI? PCI devices generally don't have a DT node. Only their root > bridge has a node, with an 'iommu-map' property instead of 'iommus', so > I don't think add_links() would get called for them. I looked into the iommu-map property and it shouldn't be too hard to add support for it. Looks like we can simply hold off on probing the root bridge device till all the iommus in its iommu-map are probed and we should be fine. > I'm also unsure about distro vendors agreeing to a mandatory kernel > parameter (of_devlink). Do you plan to eventually enable it by default? > > > static const struct supplier_bindings of_supplier_bindings[] = { > > { .parse_prop = parse_clocks, }, > > { .parse_prop = parse_interconnects, }, > > { .parse_prop = parse_regulators, }, > > + { .parse_prop = parse_iommus, }, > > {}, > > }; > > > > I plan to upstream this pretty soon, but I have other patches in > > flight that touch the same file and I'm waiting for those to get > > accepted. I also want to clean up the code a bit to reduce some > > repetition before I add support for more bindings. > > I'm also wondering about ACPI support. I'd love to add ACPI support too, but I have zero knowledge of ACPI. I'd be happy to help anyone who wants to add ACPI support that allows ACPI to add device links. > IOMMU already has a sort of > canonical code path that links endpoints to their IOMMU > (iommu_probe_device()), after the firmware descriptions have been parsed. > So if we created the device links in the iommu core, for example > iommu_bus_notifier(), we would support all firmware interface flavors. > Otherwise we'll have to create those device links in the IORT driver as > well (plus DMAR and IVRS if they want it). IOMMU driver/framework or whoever else can create device links as necessary. That's not mutually exclusive to the firmware adding device links (the device links APIs handle this nicely). While device probe ordering is one benefit of my patch series, that's not all of it though. It also deals with making sure suppliers known when they can clean up the boot state of their device even when the drivers for all their consumers are loaded as modules (so late initcall won't work). I can go into more details on this if needed, but that latter part is not very relevant in this context and you can find most of the details in my patch series/documentation I added. Thanks, Saravana