Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2211270ybl; Thu, 30 Jan 2020 13:20:18 -0800 (PST) X-Google-Smtp-Source: APXvYqwv6taUGwb/Ya5ZQyFb16Hp5PvN5Myh92oaqfP/ZgKfzS3ijX6z9LYA2Du0wdD+3ikeXdVO X-Received: by 2002:aca:5746:: with SMTP id l67mr4382359oib.60.1580419217986; Thu, 30 Jan 2020 13:20:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580419217; cv=none; d=google.com; s=arc-20160816; b=pjYAoPkVliW4rdFngYdpkdrzodBz2gl1zZ3gf3d4+2VhiGhEFgvSYkwSvPLF5dl8Mr y4xf5pExo1IKuLH3Mex6pe3flPaZpyY5rUAjEyKGvxfzJHBacHtF2eqO+fLdkbIdlikm 7bp5rhf70+ghVYS2fZ2rNyvmTKnsIMXkkkWd2uVrhhm1fkRG4dvhl3hdY5/hWiwZ/N01 k4oU5LwNsYNcsfIrkba8WVLRInIMsbBpaqSM+Gl0xbS9xN8YJcoodsOh6QovTOS5Vbpy EHR3N4tOVXeBBcKgAqtdjp0LhTN5ohoyTeSpQml4YK8jWoyei/OAlPphSA0SY2ZkLnH8 5/CQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=WJcjecLBPhfv7j+LHNZqkBE7evYHbN76BlAAHet5Nzo=; b=v8jj/1Lg3URLrHkpWl+CyzZk0Lb5WLXsS5nqE+FvGkWHCUwPBPqWiLez8rySoAB8BK o6jDnzAgKpZcm0kJH0eCeYUchxiGiy2UowBiK3tAi0OlGn3H6WsdhOxUmF3jJmJnSrQe 75YEfSFAd6HVnfPiSsnPE1S6IHT2852z/ZIys5atltno+JBiyudTsfPg1uf8Eh5epoul eUNvnd9clHhaLxzBeOIuKHXxjn3jTOgMds1HXG7qFcqgWHwTt5zABPTmGDOJQgg6F7b0 Et2Hpokv7HwYri2CWSnlB6pm3CjPBlLwNTpGCR55FRzgOBnX9c+/AUhNMO5R+eGm2ngQ Z0aw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=W8PhmgzB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r22si3333936oic.93.2020.01.30.13.20.04; Thu, 30 Jan 2020 13:20:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=W8PhmgzB; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727498AbgA3VTK (ORCPT + 99 others); Thu, 30 Jan 2020 16:19:10 -0500 Received: from lelv0143.ext.ti.com ([198.47.23.248]:58414 "EHLO lelv0143.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727191AbgA3VTJ (ORCPT ); Thu, 30 Jan 2020 16:19:09 -0500 Received: from fllv0034.itg.ti.com ([10.64.40.246]) by lelv0143.ext.ti.com (8.15.2/8.15.2) with ESMTP id 00ULJ7As048516; Thu, 30 Jan 2020 15:19:07 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1580419147; bh=WJcjecLBPhfv7j+LHNZqkBE7evYHbN76BlAAHet5Nzo=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=W8PhmgzBpvbaqU3iXFD5/9F6pob5wOwa8SnHUy+Zg4w3NKCla//Jnweo3Eoxgf5pH ZLfzhok4bMKIsmdgIi5ZyfRTIrgqWwcRMaSJzf+MMFhEjFV1TnMzjrOx/j+P83Wdye Tn/JoW9IBpC7nSu/138M3bctMT4eqMNt6toPyAmU= Received: from DFLE104.ent.ti.com (dfle104.ent.ti.com [10.64.6.25]) by fllv0034.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 00ULJ7vk124673 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 30 Jan 2020 15:19:07 -0600 Received: from DFLE106.ent.ti.com (10.64.6.27) by DFLE104.ent.ti.com (10.64.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3; Thu, 30 Jan 2020 15:19:07 -0600 Received: from fllv0040.itg.ti.com (10.64.41.20) by DFLE106.ent.ti.com (10.64.6.27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3 via Frontend Transport; Thu, 30 Jan 2020 15:19:07 -0600 Received: from [10.250.70.160] (ileax41-snat.itg.ti.com [10.172.224.153]) by fllv0040.itg.ti.com (8.15.2/8.15.2) with ESMTP id 00ULJ56u112194; Thu, 30 Jan 2020 15:19:06 -0600 Subject: Re: [PATCHv5 06/14] remoteproc/omap: Initialize and assign reserved memory node To: Suman Anna , Tero Kristo , , , CC: , , References: <20200116135332.7819-1-t-kristo@ti.com> <20200116135332.7819-7-t-kristo@ti.com> <249c293c-6a23-165f-1df5-4859ee47658a@ti.com> <37db5d57-b1cd-1cec-2c9b-31c49e3bdc10@ti.com> <2aaa4024-1e2c-5cab-c9f3-3be59c57e9ac@ti.com> <7aed7a9f-3546-f622-37ac-34d33ddb4298@ti.com> <50c69e97-034b-3160-e95e-97aec2e75cc6@ti.com> From: "Andrew F. Davis" Message-ID: Date: Thu, 30 Jan 2020 16:19:05 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <50c69e97-034b-3160-e95e-97aec2e75cc6@ti.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/20 3:39 PM, Suman Anna wrote: > On 1/30/20 2:22 PM, Andrew F. Davis wrote: >> On 1/30/20 2:55 PM, Suman Anna wrote: >>> On 1/30/20 1:42 PM, Tero Kristo wrote: >>>> On 30/01/2020 21:20, Andrew F. Davis wrote: >>>>> On 1/30/20 2:18 PM, Tero Kristo wrote: >>>>>> On 30/01/2020 20:11, Andrew F. Davis wrote: >>>>>>> On 1/16/20 8:53 AM, Tero Kristo wrote: >>>>>>>> From: Suman Anna >>>>>>>> >>>>>>>> The reserved memory nodes are not assigned to platform devices by >>>>>>>> default in the driver core to avoid the lookup for every platform >>>>>>>> device and incur a penalty as the real users are expected to be >>>>>>>> only a few devices. >>>>>>>> >>>>>>>> OMAP remoteproc devices fall into the above category and the OMAP >>>>>>>> remoteproc driver _requires_ specific CMA pools to be assigned >>>>>>>> for each device at the moment to align on the location of the >>>>>>>> vrings and vring buffers in the RTOS-side firmware images. So, >>>>>>> >>>>>>> >>>>>>> Same comment as before, this is a firmware issue for only some >>>>>>> firmwares >>>>>>> that do not handle being assigned vring locations correctly and instead >>>>>>> hard-code them. >>> >>> As for this statement, this can do with some updating. Post 4.20, >>> because of the lazy allocation scheme used for carveouts including the >>> vrings, the resource tables now have to use FW_RSC_ADDR_ANY and will >>> have to wait for the vdev synchronization to happen. >>> >>>>>> >>>>>> I believe we discussed this topic in length in previous version but >>>>>> there was no conclusion on it. >>>>>> >>>>>> The commit desc might be a bit misleading, we are not actually forced to >>>>>> use specific CMA buffers, as we use IOMMU to map these to device >>>>>> addresses. For example IPU1/IPU2 use internally exact same memory >>>>>> addresses, iommu is used to map these to specific CMA buffer. >>>>>> >>>>>> CMA buffers are mostly used so that we get aligned large chunk of memory >>>>>> which can be mapped properly with the limited IOMMU OMAP family of chips >>>>>> have. Not sure if there is any sane way to get this done in any other >>>>>> manner. >>>>>> >>>>> >>>>> >>>>> Why not use the default CMA area? >>>> >>>> I think using default CMA area getting the actual memory block is not >>>> guaranteed and might fail. There are other users for the memory, and it >>>> might get fragmented at the very late phase we are grabbing the memory >>>> (omap remoteproc driver probe time.) Some chunks we need are pretty large. >>>> >>>> I believe I could experiment with this a bit though and see, or Suman >>>> could maybe provide feedback why this was designed initially like this >>>> and why this would not be a good idea. >>> >>> I have given some explanation on this on v4 as well, but if it is not >>> clear, there are restrictions with using default CMA. Default CMA has >>> switched to be assigned from the top of the memory (higher addresses, >>> since 3.18 IIRC), and the MMUs on IPUs and DSPs can only address >>> 32-bits. So, we cannot blindly use the default CMA pool, and this will >>> definitely not work on boards > 2 GB RAM. And, if you want to add in any >>> firewall capability, then specific physical addresses becomes mandatory. >>> >> >> >> If you need 32bit range allocations then >> dma_set_mask(dev, DMA_BIT_MASK(32)); >> >> I'm not saying don't have support for carveouts, just make them >> optional, keystone_remoteproc.c does this: >> >> if (of_reserved_mem_device_init(dev)) >> dev_warn(dev, "device does not have specific CMA pool\n"); >> >> There doesn't even needs to be a warning but that is up to you. > > It is not exactly an apples to apples comparison. K2s do not have MMUs, > and most of our firmware images on K2 are actually running out of the > DSP internal memory. > So again we circle back to it being a firmware issue, if K2 can get away without needing carveouts and it doesn't even have an MMU then certainly OMAP/DRA7x class devices can handle it even better given they *do* have an IOMMU. Unless someone is hard-coding the IOMMU configuration.. In which case we are still just hacking around the problem here with mandatory specific address memory carveouts. Andrew > regards > Suman > >> >> Andrew >> >> >>> regards >>> Suman >>> >>>> >>>> -Tero >>>> >>>>> >>>>> Andrew >>>>> >>>>> >>>>>> -Tero >>>>>> >>>>>>> >>>>>>> This is not a requirement of the remote processor itself and so it >>>>>>> should not fail to probe if a specific memory carveout isn't given. >>>>>>> >>>>>>> >>>>>>>> use the of_reserved_mem_device_init/release() API appropriately >>>>>>>> to assign the corresponding reserved memory region to the OMAP >>>>>>>> remoteproc device. Note that only one region per device is >>>>>>>> allowed by the framework. >>>>>>>> >>>>>>>> Signed-off-by: Suman Anna >>>>>>>> Signed-off-by: Tero Kristo >>>>>>>> Reviewed-by: Bjorn Andersson >>>>>>>> --- >>>>>>>> v5: no changes >>>>>>>> >>>>>>>>    drivers/remoteproc/omap_remoteproc.c | 12 +++++++++++- >>>>>>>>    1 file changed, 11 insertions(+), 1 deletion(-) >>>>>>>> >>>>>>>> diff --git a/drivers/remoteproc/omap_remoteproc.c >>>>>>>> b/drivers/remoteproc/omap_remoteproc.c >>>>>>>> index 0846839b2c97..194303b860b2 100644 >>>>>>>> --- a/drivers/remoteproc/omap_remoteproc.c >>>>>>>> +++ b/drivers/remoteproc/omap_remoteproc.c >>>>>>>> @@ -17,6 +17,7 @@ >>>>>>>>    #include >>>>>>>>    #include >>>>>>>>    #include >>>>>>>> +#include >>>>>>>>    #include >>>>>>>>    #include >>>>>>>>    #include >>>>>>>> @@ -480,14 +481,22 @@ static int omap_rproc_probe(struct >>>>>>>> platform_device *pdev) >>>>>>>>        if (ret) >>>>>>>>            goto free_rproc; >>>>>>>>    +    ret = of_reserved_mem_device_init(&pdev->dev); >>>>>>>> +    if (ret) { >>>>>>>> +        dev_err(&pdev->dev, "device does not have specific CMA >>>>>>>> pool\n"); >>>>>>>> +        goto free_rproc; >>>>>>>> +    } >>>>>>>> + >>>>>>>>        platform_set_drvdata(pdev, rproc); >>>>>>>>          ret = rproc_add(rproc); >>>>>>>>        if (ret) >>>>>>>> -        goto free_rproc; >>>>>>>> +        goto release_mem; >>>>>>>>          return 0; >>>>>>>>    +release_mem: >>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>    free_rproc: >>>>>>>>        rproc_free(rproc); >>>>>>>>        return ret; >>>>>>>> @@ -499,6 +508,7 @@ static int omap_rproc_remove(struct >>>>>>>> platform_device *pdev) >>>>>>>>          rproc_del(rproc); >>>>>>>>        rproc_free(rproc); >>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>          return 0; >>>>>>>>    } >>>>>>>> >>>>>> >>>>>> --  >>>> >>>> -- >>>> Texas Instruments Finland Oy, Porkkalankatu 22, 00180 Helsinki. >>>> Y-tunnus/Business ID: 0615521-4. Kotipaikka/Domicile: Helsinki >>> >