Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2229986ybl; Thu, 30 Jan 2020 13:41:05 -0800 (PST) X-Google-Smtp-Source: APXvYqw5d+PqfNuiD1GV5Z6vHm5ztDEzqJYowQz6fB6wolusGPKqr/Z8gRCvC58Ud4mrA60nrWQH X-Received: by 2002:a05:6808:8d5:: with SMTP id k21mr4340129oij.121.1580420465513; Thu, 30 Jan 2020 13:41:05 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580420465; cv=none; d=google.com; s=arc-20160816; b=BwN6/YywN1vZd5e/2tJt//L3MR16zk259pTFB1GzZbFZjC+MWyFOwRhKCEYyBMLG54 NJuEKRU7Wd20CjE2GBfi192oVhb0IibFiY5j5ZIxzN1t5EGacnCXOcnxgSntSDDrf444 fWV5M80NtFd/4vSQCN9obNJJ2UtOhUGEdP0cxHO5AixSDev8HHoh2b2F0WjzRjBMzKnt bfinlhERd8fUTBV6mktmEvaZdrMYnLluX66mngqaTgN8e0foqTqsvzWqLqWXHfCCb9eS u+oIYevYAGdXaZYZllTyYsykEmP0AKn+LivOqYJp7TlE8MfW3NzKOJED59aschjmJZx2 kVOg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=aJ3ZguedFS3i4oCeunqS4OYssPg7WiQoFCGiSW8PwMg=; b=brLw/oqNOZt3UmPAxKAx+5KbEtJX2lBwaC7glx6x/CwqAy3TggeIi6SdojRo/SVeT2 6WDoyGxB70Qrs/eq8KD/20pZoQcfRWKnZksF+7G+Kd7WmrKKmasxa81nPbb+nkyKgub0 yXgxXwqF7klZ6SmkZzTZ32IFo8UDm5fVlP1G5STr5tZ8c0le9dminK4RPjmwlv+xd2sO EIJa7bhl32sh0NUHJzq3Lq8O4MzgNIjCLz69/+1eZKvOfgnH3rPStRsLTIASBYU2RknY CeUbEV9ITUs31mLbAcDOUpVDkwNDthd2PEaopjvlkGL35Huk+HSqUgNCD7jSehiY9TDM uZgg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="voe/sK1K"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w15si3690734otm.263.2020.01.30.13.40.53; Thu, 30 Jan 2020 13:41:05 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="voe/sK1K"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727482AbgA3Vj4 (ORCPT + 99 others); Thu, 30 Jan 2020 16:39:56 -0500 Received: from lelv0142.ext.ti.com ([198.47.23.249]:43488 "EHLO lelv0142.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727161AbgA3Vj4 (ORCPT ); Thu, 30 Jan 2020 16:39:56 -0500 Received: from fllv0034.itg.ti.com ([10.64.40.246]) by lelv0142.ext.ti.com (8.15.2/8.15.2) with ESMTP id 00ULdssc056430; Thu, 30 Jan 2020 15:39:54 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1580420394; bh=aJ3ZguedFS3i4oCeunqS4OYssPg7WiQoFCGiSW8PwMg=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=voe/sK1KvnekhJGAqFsCBOoJHGbtj9Ab76Vt/DgyftS/q3QDHwpVwFoQPF0HzlljF tUQeEje6h/yVMzr9savMN0MzcDBP2ZtHcS06l7xH3sG2pAHsdjbJPi7gWFgSOWpV6x M5UgPDnVVlrli15ILPjyIc+SWJjVxtMSmr9utynY= Received: from DFLE108.ent.ti.com (dfle108.ent.ti.com [10.64.6.29]) by fllv0034.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 00ULdsEw023565 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 30 Jan 2020 15:39:54 -0600 Received: from DFLE101.ent.ti.com (10.64.6.22) by DFLE108.ent.ti.com (10.64.6.29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3; Thu, 30 Jan 2020 15:39:54 -0600 Received: from lelv0327.itg.ti.com (10.180.67.183) by DFLE101.ent.ti.com (10.64.6.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3 via Frontend Transport; Thu, 30 Jan 2020 15:39:54 -0600 Received: from [128.247.58.153] (ileax41-snat.itg.ti.com [10.172.224.153]) by lelv0327.itg.ti.com (8.15.2/8.15.2) with ESMTP id 00ULdsK2043307; Thu, 30 Jan 2020 15:39:54 -0600 Subject: Re: [PATCHv5 06/14] remoteproc/omap: Initialize and assign reserved memory node To: "Andrew F. Davis" , Tero Kristo , , , CC: , , References: <20200116135332.7819-1-t-kristo@ti.com> <20200116135332.7819-7-t-kristo@ti.com> <249c293c-6a23-165f-1df5-4859ee47658a@ti.com> <37db5d57-b1cd-1cec-2c9b-31c49e3bdc10@ti.com> <2aaa4024-1e2c-5cab-c9f3-3be59c57e9ac@ti.com> <7aed7a9f-3546-f622-37ac-34d33ddb4298@ti.com> <50c69e97-034b-3160-e95e-97aec2e75cc6@ti.com> From: Suman Anna Message-ID: <127eff13-cc16-2b59-d8ce-06e61bb910bc@ti.com> Date: Thu, 30 Jan 2020 15:39:54 -0600 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.6.1 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/20 3:19 PM, Andrew F. Davis wrote: > On 1/30/20 3:39 PM, Suman Anna wrote: >> On 1/30/20 2:22 PM, Andrew F. Davis wrote: >>> On 1/30/20 2:55 PM, Suman Anna wrote: >>>> On 1/30/20 1:42 PM, Tero Kristo wrote: >>>>> On 30/01/2020 21:20, Andrew F. Davis wrote: >>>>>> On 1/30/20 2:18 PM, Tero Kristo wrote: >>>>>>> On 30/01/2020 20:11, Andrew F. Davis wrote: >>>>>>>> On 1/16/20 8:53 AM, Tero Kristo wrote: >>>>>>>>> From: Suman Anna >>>>>>>>> >>>>>>>>> The reserved memory nodes are not assigned to platform devices by >>>>>>>>> default in the driver core to avoid the lookup for every platform >>>>>>>>> device and incur a penalty as the real users are expected to be >>>>>>>>> only a few devices. >>>>>>>>> >>>>>>>>> OMAP remoteproc devices fall into the above category and the OMAP >>>>>>>>> remoteproc driver _requires_ specific CMA pools to be assigned >>>>>>>>> for each device at the moment to align on the location of the >>>>>>>>> vrings and vring buffers in the RTOS-side firmware images. So, >>>>>>>> >>>>>>>> >>>>>>>> Same comment as before, this is a firmware issue for only some >>>>>>>> firmwares >>>>>>>> that do not handle being assigned vring locations correctly and instead >>>>>>>> hard-code them. >>>> >>>> As for this statement, this can do with some updating. Post 4.20, >>>> because of the lazy allocation scheme used for carveouts including the >>>> vrings, the resource tables now have to use FW_RSC_ADDR_ANY and will >>>> have to wait for the vdev synchronization to happen. >>>> >>>>>>> >>>>>>> I believe we discussed this topic in length in previous version but >>>>>>> there was no conclusion on it. >>>>>>> >>>>>>> The commit desc might be a bit misleading, we are not actually forced to >>>>>>> use specific CMA buffers, as we use IOMMU to map these to device >>>>>>> addresses. For example IPU1/IPU2 use internally exact same memory >>>>>>> addresses, iommu is used to map these to specific CMA buffer. >>>>>>> >>>>>>> CMA buffers are mostly used so that we get aligned large chunk of memory >>>>>>> which can be mapped properly with the limited IOMMU OMAP family of chips >>>>>>> have. Not sure if there is any sane way to get this done in any other >>>>>>> manner. >>>>>>> >>>>>> >>>>>> >>>>>> Why not use the default CMA area? >>>>> >>>>> I think using default CMA area getting the actual memory block is not >>>>> guaranteed and might fail. There are other users for the memory, and it >>>>> might get fragmented at the very late phase we are grabbing the memory >>>>> (omap remoteproc driver probe time.) Some chunks we need are pretty large. >>>>> >>>>> I believe I could experiment with this a bit though and see, or Suman >>>>> could maybe provide feedback why this was designed initially like this >>>>> and why this would not be a good idea. >>>> >>>> I have given some explanation on this on v4 as well, but if it is not >>>> clear, there are restrictions with using default CMA. Default CMA has >>>> switched to be assigned from the top of the memory (higher addresses, >>>> since 3.18 IIRC), and the MMUs on IPUs and DSPs can only address >>>> 32-bits. So, we cannot blindly use the default CMA pool, and this will >>>> definitely not work on boards > 2 GB RAM. And, if you want to add in any >>>> firewall capability, then specific physical addresses becomes mandatory. >>>> >>> >>> >>> If you need 32bit range allocations then >>> dma_set_mask(dev, DMA_BIT_MASK(32)); >>> >>> I'm not saying don't have support for carveouts, just make them >>> optional, keystone_remoteproc.c does this: >>> >>> if (of_reserved_mem_device_init(dev)) >>> dev_warn(dev, "device does not have specific CMA pool\n"); >>> >>> There doesn't even needs to be a warning but that is up to you. >> >> It is not exactly an apples to apples comparison. K2s do not have MMUs, >> and most of our firmware images on K2 are actually running out of the >> DSP internal memory. >> > > > So again we circle back to it being a firmware issue, if K2 can get away > without needing carveouts and it doesn't even have an MMU then certainly > OMAP/DRA7x class devices can handle it even better given they *do* have > an IOMMU. Unless someone is hard-coding the IOMMU configuration.. In > which case we are still just hacking around the problem here with > mandatory specific address memory carveouts. Optional carveouts on OMAP remoteprocs can be an enhancement in the future, but at the moment, we won't be able to run use-cases without this. And I have already given some of the reasons for the same here and on v4. regards Suman > > Andrew > > >> regards >> Suman >> >>> >>> Andrew >>> >>> >>>> regards >>>> Suman >>>> >>>>> >>>>> -Tero >>>>> >>>>>> >>>>>> Andrew >>>>>> >>>>>> >>>>>>> -Tero >>>>>>> >>>>>>>> >>>>>>>> This is not a requirement of the remote processor itself and so it >>>>>>>> should not fail to probe if a specific memory carveout isn't given. >>>>>>>> >>>>>>>> >>>>>>>>> use the of_reserved_mem_device_init/release() API appropriately >>>>>>>>> to assign the corresponding reserved memory region to the OMAP >>>>>>>>> remoteproc device. Note that only one region per device is >>>>>>>>> allowed by the framework. >>>>>>>>> >>>>>>>>> Signed-off-by: Suman Anna >>>>>>>>> Signed-off-by: Tero Kristo >>>>>>>>> Reviewed-by: Bjorn Andersson >>>>>>>>> --- >>>>>>>>> v5: no changes >>>>>>>>> >>>>>>>>>    drivers/remoteproc/omap_remoteproc.c | 12 +++++++++++- >>>>>>>>>    1 file changed, 11 insertions(+), 1 deletion(-) >>>>>>>>> >>>>>>>>> diff --git a/drivers/remoteproc/omap_remoteproc.c >>>>>>>>> b/drivers/remoteproc/omap_remoteproc.c >>>>>>>>> index 0846839b2c97..194303b860b2 100644 >>>>>>>>> --- a/drivers/remoteproc/omap_remoteproc.c >>>>>>>>> +++ b/drivers/remoteproc/omap_remoteproc.c >>>>>>>>> @@ -17,6 +17,7 @@ >>>>>>>>>    #include >>>>>>>>>    #include >>>>>>>>>    #include >>>>>>>>> +#include >>>>>>>>>    #include >>>>>>>>>    #include >>>>>>>>>    #include >>>>>>>>> @@ -480,14 +481,22 @@ static int omap_rproc_probe(struct >>>>>>>>> platform_device *pdev) >>>>>>>>>        if (ret) >>>>>>>>>            goto free_rproc; >>>>>>>>>    +    ret = of_reserved_mem_device_init(&pdev->dev); >>>>>>>>> +    if (ret) { >>>>>>>>> +        dev_err(&pdev->dev, "device does not have specific CMA >>>>>>>>> pool\n"); >>>>>>>>> +        goto free_rproc; >>>>>>>>> +    } >>>>>>>>> + >>>>>>>>>        platform_set_drvdata(pdev, rproc); >>>>>>>>>          ret = rproc_add(rproc); >>>>>>>>>        if (ret) >>>>>>>>> -        goto free_rproc; >>>>>>>>> +        goto release_mem; >>>>>>>>>          return 0; >>>>>>>>>    +release_mem: >>>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>>    free_rproc: >>>>>>>>>        rproc_free(rproc); >>>>>>>>>        return ret; >>>>>>>>> @@ -499,6 +508,7 @@ static int omap_rproc_remove(struct >>>>>>>>> platform_device *pdev) >>>>>>>>>          rproc_del(rproc); >>>>>>>>>        rproc_free(rproc); >>>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>>          return 0; >>>>>>>>>    } >>>>>>>>> >>>>>>> >>>>>>> --  >>>>> >>>>> -- >>>>> Texas Instruments Finland Oy, Porkkalankatu 22, 00180 Helsinki. >>>>> Y-tunnus/Business ID: 0615521-4. Kotipaikka/Domicile: Helsinki >>>> >>