Received: by 2002:a25:31c3:0:0:0:0:0 with SMTP id x186csp529303ybx; Wed, 6 Nov 2019 22:16:31 -0800 (PST) X-Google-Smtp-Source: APXvYqxd71Wg84MAn6SjzEMtng98SXK4hHm3azcNWpgu+0Cz53u4DDKG19yuT3Uj8gmPjqt80QsL X-Received: by 2002:a50:da4b:: with SMTP id a11mr1717328edk.17.1573107391053; Wed, 06 Nov 2019 22:16:31 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1573107391; cv=none; d=google.com; s=arc-20160816; b=0Go+BAKFOjK7x+dj1AstFRI8C/LmXUMlLbOgeUtHhmG2iByl0Ilb5X7bpo1LtqPUkx 7KiBNm96c3kpw/APRSyTUjQS6xAGv6O/ufRXAFHt3RSpnmj0OgdtgWxNpTJufNisYaa4 QFG0NkVvDarriT820c+JPVoY2DQDL2xtFit/qvHSPF2DlsYXnQtQV9LP0hOsCmoaOjwr i8XjqBlV74sFQd2+S4hPKwkkquCh48ZJUopNFx2AHKnXUMUlOkKwrO5vBzMFX9xz4CDS AASlAbPSLxqYkQgd2vYoFWsKIjQRN65nn3Hd9zTNSRvF8IEcjzHCcqF3aOn4ngoO06BH 487A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=wxgrq9s3ghC5A6WC6p6clH9tBiJhkp6+TNKHK4QLLHY=; b=GFUn0xsbDpk3MZ1kTucbN/YmHk5KK7tT6BppDJj611xWlH0dwIJthaYWDFplOXgsV0 pHxMZkvn7g9UMpsAHOVXEoC7X01EJGlp0+FMMuWIwbJzjtElDDYn/Id0etcAgQuCspno 7SuJr3jmLkgdBzmuiApEIyFeaRlcTLVM/zN1BeZ3pMgVfhhN6Oa/lNoN8HOG+rr9nXlW O0gEwAN5cE0Iamjb5rELsOJA4ziXIAaQdsn3Mb05kjmwSfGqkeeNPf9wThEOuuR745yh tCQQ0Ma4Ldo3/N97MIzkz81zCk/UL4uiIdbNOyJTlmoSHU9mSfBx8AAaN5+D+KKKIRNU AxAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=e+dBQ6C4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id k10si644950edx.350.2019.11.06.22.16.07; Wed, 06 Nov 2019 22:16:31 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=e+dBQ6C4; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726910AbfKGGMd (ORCPT + 99 others); Thu, 7 Nov 2019 01:12:33 -0500 Received: from mail-ot1-f67.google.com ([209.85.210.67]:44699 "EHLO mail-ot1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725763AbfKGGMd (ORCPT ); Thu, 7 Nov 2019 01:12:33 -0500 Received: by mail-ot1-f67.google.com with SMTP id c19so1005181otr.11 for ; Wed, 06 Nov 2019 22:12:32 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wxgrq9s3ghC5A6WC6p6clH9tBiJhkp6+TNKHK4QLLHY=; b=e+dBQ6C4ix+BTTNhqo+tLHnyci+m1UPStSy7INaJroD2T55ii/Uzk1drz9MtYdqH+Z TN8JnIG2q9xtt+HnvQWf6/Itxfl7WVpgnKJ5qEWppqgeWzMPQpB99llfUEUdN7dM2sCc 0UHm8YFIIp+BpVIrty6HYJHhisRCmnRXMkqTvYi4+48X6UIDvSBmS+ZieSxCa4xxEPRZ J7DQoyFDIsfKURj8V9vXWjYFTBWZwq2M06OhbeSu8q46U6/2LnXOk8yZtFg9srRxg6wm aTjIuX+yZGTBGU8/U/dgVAPP64p1DagRdBmKmuf0OKdQ8X7mml0eEFVwJ6HbflQsHzeD RGHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wxgrq9s3ghC5A6WC6p6clH9tBiJhkp6+TNKHK4QLLHY=; b=dEix4t87c1wh+UAtAepHHFFMzEaFLoUcmqtc16m0h+Y2VNF/hmX9NgMt5SOxykTgaP 0dcSsHdeBJHRsUamcu7fAPl5woriaEBQou1J5iD5ArIcz160w2ildb8tm9huOs5YpnmY CddBIZMzEtIac4TG4Zi79pRmfJ0Yu6dRFQUW4QDfKL6t92ySLrDSJ+T3YTs4fKltkRH3 Y0Bb9e0GBIZIlzr5YVu18RXGHvW+Wv1AkveSIqLQ1/td8A5JL0qlM/UAfdt4iYyGatTV szxbbXdltIEzdwd7MqYFCNhXMhbTdZEqqQG1sp0dOtg8pIxyQ50vdJTS71aRjYP7YU6v zvbw== X-Gm-Message-State: APjAAAXwYpP5ic0QJzt6PpJs21eOAKeQXIHajRt3eyhyQaaFIHvhq93N SiD+vFeHNC110jmnVG2dNgoO8PUmgz3m25AuaHTJgg== X-Received: by 2002:a05:6830:1d71:: with SMTP id l17mr1410310oti.236.1573107151683; Wed, 06 Nov 2019 22:12:31 -0800 (PST) MIME-Version: 1.0 References: <20191030145112.19738-1-will@kernel.org> <6e457227-ca06-2998-4ffa-a58ab171ce32@arm.com> <20191030155444.GC19096@willie-the-truck> <20191031193758.GA2607492@lophozonia> <6994ae35-2b89-2feb-2bcb-cffc5a01963c@huawei.com> <47418554-e7a7-f9f3-8852-60cecef3d5c7@huawei.com> <7e2429ed-6b25-a452-5e4d-51a5195b872f@arm.com> In-Reply-To: <7e2429ed-6b25-a452-5e4d-51a5195b872f@arm.com> From: Saravana Kannan Date: Wed, 6 Nov 2019 22:11:55 -0800 Message-ID: Subject: Re: [PATCH 0/7] iommu: Permit modular builds of ARM SMMU[v3] drivers To: Robin Murphy Cc: John Garry , Jean-Philippe Brucker , Bjorn Helgaas , "iommu@lists.linux-foundation.org" , Will Deacon , LKML Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Nov 4, 2019 at 5:29 AM Robin Murphy wrote: > > On 04/11/2019 12:16, John Garry wrote: > > On 01/11/2019 21:13, Saravana Kannan wrote: > >> On Fri, Nov 1, 2019 at 3:28 AM John Garry wrote: > >>> > >>> On 31/10/2019 23:34, Saravana Kannan via iommu wrote: > >>>> I looked into the iommu-map property and it shouldn't be too hard to > >>>> add support for it. Looks like we can simply hold off on probing the > >>>> root bridge device till all the iommus in its iommu-map are probed and > >>>> we should be fine. > >>>> > >>>>> I'm also unsure about distro vendors agreeing to a mandatory kernel > >>>>> parameter (of_devlink). Do you plan to eventually enable it by > >>>>> default? > >>>>> > >>>>>> static const struct supplier_bindings of_supplier_bindings[] = { > >>>>>> { .parse_prop = parse_clocks, }, > >>>>>> { .parse_prop = parse_interconnects, }, > >>>>>> { .parse_prop = parse_regulators, }, > >>>>>> + { .parse_prop = parse_iommus, }, > >>>>>> {}, > >>>>>> }; > >>>>>> > >>>>>> I plan to upstream this pretty soon, but I have other patches in > >>>>>> flight that touch the same file and I'm waiting for those to get > >>>>>> accepted. I also want to clean up the code a bit to reduce some > >>>>>> repetition before I add support for more bindings. > >>>>> I'm also wondering about ACPI support. > >>>> I'd love to add ACPI support too, but I have zero knowledge of ACPI. > >>>> I'd be happy to help anyone who wants to add ACPI support that allows > >>>> ACPI to add device links. > >>> > >>> If possible to add, that may be useful for remedying this: > >>> > >>> https://lore.kernel.org/linux-iommu/9625faf4-48ef-2dd3-d82f-931d9cf26976@huawei.com/ > >>> > >> > >> I'm happy that this change might fix that problem, but isn't the > >> problem reported in that thread more to do with child devices getting > >> added before the parent probes successfully? That doesn't make sense > >> to me. > > > > So the pcieport device and then the child device are added in the PCI > > scan, but only some time later do the device drivers probe for these > > devices; so it's not that the that pcieport driver creates the child > > device. > > > > The problem then occurs in that the ordering the of device driver probe > > is such that we have this: pcieport probe + defer (as no IOMMU group > > registered), SMMU probe (registers the IOMMU group), child device probe, > > pcieport really probe. > > > > Can't the piceport driver not add its child devices before it > >> probes successfully? Or more specifically, who adds the child devices > >> of the pcieport before the pcieport itself probes? > > > > The devices are actually added in order pcieport, child device, but not > > really probed in that same order, as above. > > Right, in short the fundamental problem is that of_iommu_configure() now > does the wrong thing. Deferring probe of the entire host bridge/root > complex based on "iommu-map" would indeed happen to solve the problem by > brute force, I think, but could lead to a dependency cycle for PCI-based > IOMMUs as Jean points out. Sorry for the late reply. Got caught up on other work. I didn't think the SMMU itself was PCI based in the example Jean gave. I thought it just happened to be the case where the SMMU probes after the pcieport but before the other children. If the SMMU itself is a child of the pcieport, how can it be required for the parent to function? How will suspend/resume even work?! I feel like I'm missing some context wrt to PCI that everyone else seems to know (which isn't surprising). > I hope to have time this week to work a bit > more on pulling of_iommu_configure() apart to fix it properly, after > which of_devlink *should* only have to worry about the child devices > themselves... Worry about child devices in what sense? From a non-iommu perspective? -Saravana