Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp3875209ybx; Mon, 4 Nov 2019 04:19:50 -0800 (PST) X-Google-Smtp-Source: APXvYqxpJ9mjmumT5XZYw78ah9g7sKz6tfFfhG8c93ECVgskWR6a1xWpswnwK91ccxQlX26zg1fm X-Received: by 2002:a05:6402:1156:: with SMTP id g22mr29410479edw.233.1572869990241; Mon, 04 Nov 2019 04:19:50 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1572869990; cv=none; d=google.com; s=arc-20160816; b=pCdxfN/I8FOSrvqrKBbeMefubPlo/WHp+2Ttor17a8dPTBVSUBMg+23dSryXU4NyLD FpAkfa+IYseDxY3LOCfUjqL8iYwcCyZtq/89pITe9BC7jNAFSbsWoR/NLMaehLKgRulK M4HMt5QBE+tu69CBiV/Q79DrDNLzmVygi9enVdb7BCmWdQL7F+OKQek0WNIFMAsJqBNL wgWVRMY9COXBH3MqvkeGkFJzFwRY/5cweRZ06NGFFVia4H/3YpbrpTu6Krz3atdpP040 PgfBlifYjTxML2dFq/3aIgp0uUI37ljXLX5TC7upxg6gvM0brc5xhhQxhAH49WscTAia 9K+w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject; bh=02EUAQNjx17jA1KBO3iwg/m5X/1UhurAMLT/6fy7JM8=; b=Mt05wInsX8SxdVZk3qrbBQm6FxghKNLxXmPyBVUvBASovfLfnImm7h4+Xb1u+qpb03 VONYmfka4d4x6C+DgkiSNYjsIxgm3AxFfxra9SQ35Fxzz2PMtaxAt2ocsShI+rvILL2K UVIsK3Wa0h4a6thk/YpKezYN9zp1qGf77IqPHqChAKN6bBNOjxeeJkOVARlkAzb/9ADP exMcCWlPxFv15bNkWJ+Nbxv/m7h0LDtRKFsJ1XWJXoYeYVh1TXrmGrIYMKd+LPk2K3oP kI3sPEBFsER7PZ/WgL7BhWQBjpo5Al+NH5KKGQ/4I+Zhb9rwVBhgPOueJbySEdojTsOC G8aw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q4si7694908edc.403.2019.11.04.04.19.26; Mon, 04 Nov 2019 04:19:50 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728872AbfKDMQH (ORCPT + 99 others); Mon, 4 Nov 2019 07:16:07 -0500 Received: from lhrrgout.huawei.com ([185.176.76.210]:2068 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1728504AbfKDMQH (ORCPT ); Mon, 4 Nov 2019 07:16:07 -0500 Received: from lhreml705-cah.china.huawei.com (unknown [172.18.7.107]) by Forcepoint Email with ESMTP id 49350A5C4F3C939F79D7; Mon, 4 Nov 2019 12:16:06 +0000 (GMT) Received: from lhreml724-chm.china.huawei.com (10.201.108.75) by lhreml705-cah.china.huawei.com (10.201.108.46) with Microsoft SMTP Server (TLS) id 14.3.408.0; Mon, 4 Nov 2019 12:16:05 +0000 Received: from [127.0.0.1] (10.202.226.46) by lhreml724-chm.china.huawei.com (10.201.108.75) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1713.5; Mon, 4 Nov 2019 12:16:05 +0000 Subject: Re: [PATCH 0/7] iommu: Permit modular builds of ARM SMMU[v3] drivers To: Saravana Kannan CC: Jean-Philippe Brucker , Bjorn Helgaas , Robin Murphy , "iommu@lists.linux-foundation.org" , "Will Deacon" , LKML References: <20191030145112.19738-1-will@kernel.org> <6e457227-ca06-2998-4ffa-a58ab171ce32@arm.com> <20191030155444.GC19096@willie-the-truck> <20191031193758.GA2607492@lophozonia> <6994ae35-2b89-2feb-2bcb-cffc5a01963c@huawei.com> From: John Garry Message-ID: <47418554-e7a7-f9f3-8852-60cecef3d5c7@huawei.com> Date: Mon, 4 Nov 2019 12:16:03 +0000 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.1.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.202.226.46] X-ClientProxiedBy: lhreml703-chm.china.huawei.com (10.201.108.52) To lhreml724-chm.china.huawei.com (10.201.108.75) X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 01/11/2019 21:13, Saravana Kannan wrote: > On Fri, Nov 1, 2019 at 3:28 AM John Garry wrote: >> >> On 31/10/2019 23:34, Saravana Kannan via iommu wrote: >>> I looked into the iommu-map property and it shouldn't be too hard to >>> add support for it. Looks like we can simply hold off on probing the >>> root bridge device till all the iommus in its iommu-map are probed and >>> we should be fine. >>> >>>> I'm also unsure about distro vendors agreeing to a mandatory kernel >>>> parameter (of_devlink). Do you plan to eventually enable it by default? >>>> >>>>> static const struct supplier_bindings of_supplier_bindings[] = { >>>>> { .parse_prop = parse_clocks, }, >>>>> { .parse_prop = parse_interconnects, }, >>>>> { .parse_prop = parse_regulators, }, >>>>> + { .parse_prop = parse_iommus, }, >>>>> {}, >>>>> }; >>>>> >>>>> I plan to upstream this pretty soon, but I have other patches in >>>>> flight that touch the same file and I'm waiting for those to get >>>>> accepted. I also want to clean up the code a bit to reduce some >>>>> repetition before I add support for more bindings. >>>> I'm also wondering about ACPI support. >>> I'd love to add ACPI support too, but I have zero knowledge of ACPI. >>> I'd be happy to help anyone who wants to add ACPI support that allows >>> ACPI to add device links. >> >> If possible to add, that may be useful for remedying this: >> >> https://lore.kernel.org/linux-iommu/9625faf4-48ef-2dd3-d82f-931d9cf26976@huawei.com/ > > I'm happy that this change might fix that problem, but isn't the > problem reported in that thread more to do with child devices getting > added before the parent probes successfully? That doesn't make sense > to me. So the pcieport device and then the child device are added in the PCI scan, but only some time later do the device drivers probe for these devices; so it's not that the that pcieport driver creates the child device. The problem then occurs in that the ordering the of device driver probe is such that we have this: pcieport probe + defer (as no IOMMU group registered), SMMU probe (registers the IOMMU group), child device probe, pcieport really probe. Can't the piceport driver not add its child devices before it > probes successfully? Or more specifically, who adds the child devices > of the pcieport before the pcieport itself probes? The devices are actually added in order pcieport, child device, but not really probed in that same order, as above. I'll add you to that thread if you want to discuss further. Thanks, John