Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2238786ybl; Thu, 30 Jan 2020 13:52:16 -0800 (PST) X-Google-Smtp-Source: APXvYqyK/uXVNCnTjTvkFJY9KWrZh7EL9d6JJ21l4aPJyO7/aXt54YuTnxphpzuDlbuTw5HxfULu X-Received: by 2002:a05:6808:50:: with SMTP id v16mr4193967oic.133.1580421135959; Thu, 30 Jan 2020 13:52:15 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580421135; cv=none; d=google.com; s=arc-20160816; b=sjFWcgDetjFt4a4Vcmbo7x0qFeFKyx+rJMitfiSPj59tzajXL4grd4p8JIogf8vUZy VY8X3tteVC5YCuYa6/89988rcJAtwMWVBt3J6XktOmzHZdYp6stH79IgVr51LjBr47/2 pAcNCXS0qVYEG7iw6CHKQMYJ+Q18d/KFm0DULGkwf9stW7KkggwG2OE6WmTA60MaODTY UHfVrnirHU2XiN/GjHKMYb/QanU2wkOMUxDH1LyEDfuMI7vv/U4vq/rCN6uooDSIsZbX d2GC1SfyyTjcDJLNCgL9u1Gz6fDuup8IqcIFtBmLTv6qUoJZ4CECZRewRV7b6XL068in wWtg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=8RCvkl8ayizEkjvCU+aDmfK/mvQAExRVxcO9Jh5Um9k=; b=mthYuHheRyc69TlEjIcBjodm09k4nUp3wULsrhMy3771aJJGe2zXnvLvcskF3EgI/w jnKHyLbh8+XqHPxyYsNXQs8bX2wzxrKUsc3f5WlWLKhq3LWbFq46aRKvE6jFMGOl8U6t iceztpUhOGZ5giH3Mu1ezuz50vE5x1VRAACr28R+pnX/i/G4+oIsu5PSL9r5VKf3TVBs JaEmKUfRauiL7Ma/ykG78elM6is2XISj7pmEJO7OOkxFDXJn2+Tc2AlISOgXpETNHLuN 5KRdwPhvDanS5BORYGQ278SbZNdM/UmqUPXkZeFZxLdvIRJT8XPQbvBXhAIWRXFHz4/j XFeA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="X0EtWJq/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q195si710993oic.83.2020.01.30.13.52.02; Thu, 30 Jan 2020 13:52:15 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b="X0EtWJq/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726029AbgA3Vu4 (ORCPT + 99 others); Thu, 30 Jan 2020 16:50:56 -0500 Received: from lelv0143.ext.ti.com ([198.47.23.248]:34074 "EHLO lelv0143.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725835AbgA3Vu4 (ORCPT ); Thu, 30 Jan 2020 16:50:56 -0500 Received: from lelv0265.itg.ti.com ([10.180.67.224]) by lelv0143.ext.ti.com (8.15.2/8.15.2) with ESMTP id 00ULotO3056697; Thu, 30 Jan 2020 15:50:55 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1580421055; bh=8RCvkl8ayizEkjvCU+aDmfK/mvQAExRVxcO9Jh5Um9k=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=X0EtWJq/RJmC1FwmrBUZC73P6kp5hgwf4biW86RDERI+rhD/jbYHI957VSRprTbBa sd14tO6WQzoJkTMnTRsXLN2UyHHNrBY6bUOA2prAkc19LNchiDoRQ5tjDJadOxRx99 tCMIwOOsjQ+Tf5BBatStubCsRKqDPULe3dczhHLI= Received: from DFLE104.ent.ti.com (dfle104.ent.ti.com [10.64.6.25]) by lelv0265.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 00ULotV5002572 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 30 Jan 2020 15:50:55 -0600 Received: from DFLE114.ent.ti.com (10.64.6.35) by DFLE104.ent.ti.com (10.64.6.25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3; Thu, 30 Jan 2020 15:50:55 -0600 Received: from fllv0039.itg.ti.com (10.64.41.19) by DFLE114.ent.ti.com (10.64.6.35) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3 via Frontend Transport; Thu, 30 Jan 2020 15:50:55 -0600 Received: from [10.250.70.160] (ileax41-snat.itg.ti.com [10.172.224.153]) by fllv0039.itg.ti.com (8.15.2/8.15.2) with ESMTP id 00ULor8M100396; Thu, 30 Jan 2020 15:50:54 -0600 Subject: Re: [PATCHv5 06/14] remoteproc/omap: Initialize and assign reserved memory node To: Suman Anna , Tero Kristo , , , CC: , , References: <20200116135332.7819-1-t-kristo@ti.com> <20200116135332.7819-7-t-kristo@ti.com> <249c293c-6a23-165f-1df5-4859ee47658a@ti.com> <37db5d57-b1cd-1cec-2c9b-31c49e3bdc10@ti.com> <2aaa4024-1e2c-5cab-c9f3-3be59c57e9ac@ti.com> <7aed7a9f-3546-f622-37ac-34d33ddb4298@ti.com> <50c69e97-034b-3160-e95e-97aec2e75cc6@ti.com> <127eff13-cc16-2b59-d8ce-06e61bb910bc@ti.com> From: "Andrew F. Davis" Message-ID: <39b3e536-26a9-e7da-a39a-db2853e0fe04@ti.com> Date: Thu, 30 Jan 2020 16:50:52 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <127eff13-cc16-2b59-d8ce-06e61bb910bc@ti.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/20 4:39 PM, Suman Anna wrote: > On 1/30/20 3:19 PM, Andrew F. Davis wrote: >> On 1/30/20 3:39 PM, Suman Anna wrote: >>> On 1/30/20 2:22 PM, Andrew F. Davis wrote: >>>> On 1/30/20 2:55 PM, Suman Anna wrote: >>>>> On 1/30/20 1:42 PM, Tero Kristo wrote: >>>>>> On 30/01/2020 21:20, Andrew F. Davis wrote: >>>>>>> On 1/30/20 2:18 PM, Tero Kristo wrote: >>>>>>>> On 30/01/2020 20:11, Andrew F. Davis wrote: >>>>>>>>> On 1/16/20 8:53 AM, Tero Kristo wrote: >>>>>>>>>> From: Suman Anna >>>>>>>>>> >>>>>>>>>> The reserved memory nodes are not assigned to platform devices by >>>>>>>>>> default in the driver core to avoid the lookup for every platform >>>>>>>>>> device and incur a penalty as the real users are expected to be >>>>>>>>>> only a few devices. >>>>>>>>>> >>>>>>>>>> OMAP remoteproc devices fall into the above category and the OMAP >>>>>>>>>> remoteproc driver _requires_ specific CMA pools to be assigned >>>>>>>>>> for each device at the moment to align on the location of the >>>>>>>>>> vrings and vring buffers in the RTOS-side firmware images. So, >>>>>>>>> >>>>>>>>> >>>>>>>>> Same comment as before, this is a firmware issue for only some >>>>>>>>> firmwares >>>>>>>>> that do not handle being assigned vring locations correctly and instead >>>>>>>>> hard-code them. >>>>> >>>>> As for this statement, this can do with some updating. Post 4.20, >>>>> because of the lazy allocation scheme used for carveouts including the >>>>> vrings, the resource tables now have to use FW_RSC_ADDR_ANY and will >>>>> have to wait for the vdev synchronization to happen. >>>>> >>>>>>>> >>>>>>>> I believe we discussed this topic in length in previous version but >>>>>>>> there was no conclusion on it. >>>>>>>> >>>>>>>> The commit desc might be a bit misleading, we are not actually forced to >>>>>>>> use specific CMA buffers, as we use IOMMU to map these to device >>>>>>>> addresses. For example IPU1/IPU2 use internally exact same memory >>>>>>>> addresses, iommu is used to map these to specific CMA buffer. >>>>>>>> >>>>>>>> CMA buffers are mostly used so that we get aligned large chunk of memory >>>>>>>> which can be mapped properly with the limited IOMMU OMAP family of chips >>>>>>>> have. Not sure if there is any sane way to get this done in any other >>>>>>>> manner. >>>>>>>> >>>>>>> >>>>>>> >>>>>>> Why not use the default CMA area? >>>>>> >>>>>> I think using default CMA area getting the actual memory block is not >>>>>> guaranteed and might fail. There are other users for the memory, and it >>>>>> might get fragmented at the very late phase we are grabbing the memory >>>>>> (omap remoteproc driver probe time.) Some chunks we need are pretty large. >>>>>> >>>>>> I believe I could experiment with this a bit though and see, or Suman >>>>>> could maybe provide feedback why this was designed initially like this >>>>>> and why this would not be a good idea. >>>>> >>>>> I have given some explanation on this on v4 as well, but if it is not >>>>> clear, there are restrictions with using default CMA. Default CMA has >>>>> switched to be assigned from the top of the memory (higher addresses, >>>>> since 3.18 IIRC), and the MMUs on IPUs and DSPs can only address >>>>> 32-bits. So, we cannot blindly use the default CMA pool, and this will >>>>> definitely not work on boards > 2 GB RAM. And, if you want to add in any >>>>> firewall capability, then specific physical addresses becomes mandatory. >>>>> >>>> >>>> >>>> If you need 32bit range allocations then >>>> dma_set_mask(dev, DMA_BIT_MASK(32)); >>>> >>>> I'm not saying don't have support for carveouts, just make them >>>> optional, keystone_remoteproc.c does this: >>>> >>>> if (of_reserved_mem_device_init(dev)) >>>> dev_warn(dev, "device does not have specific CMA pool\n"); >>>> >>>> There doesn't even needs to be a warning but that is up to you. >>> >>> It is not exactly an apples to apples comparison. K2s do not have MMUs, >>> and most of our firmware images on K2 are actually running out of the >>> DSP internal memory. >>> >> >> >> So again we circle back to it being a firmware issue, if K2 can get away >> without needing carveouts and it doesn't even have an MMU then certainly >> OMAP/DRA7x class devices can handle it even better given they *do* have >> an IOMMU. Unless someone is hard-coding the IOMMU configuration.. In >> which case we are still just hacking around the problem here with >> mandatory specific address memory carveouts. > > Optional carveouts on OMAP remoteprocs can be an enhancement in the > future, but at the moment, we won't be able to run use-cases without > this. And I have already given some of the reasons for the same here and > on v4. > No reason to be dismissive, my questions are valid. What "use-cases" are we talking about, I have firmware that doesn't need specific carved-out addresses. If you have misbehaving firmware that needs statically carved out memory addresses then you can have carveouts if you want, but it should be optional. If I don't want to pollute my system's memory space with a bunch of carveout holes then I shouldn't have to just because your specific firmware needs them. Andrew > regards > Suman > >> >> Andrew >> >> >>> regards >>> Suman >>> >>>> >>>> Andrew >>>> >>>> >>>>> regards >>>>> Suman >>>>> >>>>>> >>>>>> -Tero >>>>>> >>>>>>> >>>>>>> Andrew >>>>>>> >>>>>>> >>>>>>>> -Tero >>>>>>>> >>>>>>>>> >>>>>>>>> This is not a requirement of the remote processor itself and so it >>>>>>>>> should not fail to probe if a specific memory carveout isn't given. >>>>>>>>> >>>>>>>>> >>>>>>>>>> use the of_reserved_mem_device_init/release() API appropriately >>>>>>>>>> to assign the corresponding reserved memory region to the OMAP >>>>>>>>>> remoteproc device. Note that only one region per device is >>>>>>>>>> allowed by the framework. >>>>>>>>>> >>>>>>>>>> Signed-off-by: Suman Anna >>>>>>>>>> Signed-off-by: Tero Kristo >>>>>>>>>> Reviewed-by: Bjorn Andersson >>>>>>>>>> --- >>>>>>>>>> v5: no changes >>>>>>>>>> >>>>>>>>>>    drivers/remoteproc/omap_remoteproc.c | 12 +++++++++++- >>>>>>>>>>    1 file changed, 11 insertions(+), 1 deletion(-) >>>>>>>>>> >>>>>>>>>> diff --git a/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>> b/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>> index 0846839b2c97..194303b860b2 100644 >>>>>>>>>> --- a/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>> +++ b/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>> @@ -17,6 +17,7 @@ >>>>>>>>>>    #include >>>>>>>>>>    #include >>>>>>>>>>    #include >>>>>>>>>> +#include >>>>>>>>>>    #include >>>>>>>>>>    #include >>>>>>>>>>    #include >>>>>>>>>> @@ -480,14 +481,22 @@ static int omap_rproc_probe(struct >>>>>>>>>> platform_device *pdev) >>>>>>>>>>        if (ret) >>>>>>>>>>            goto free_rproc; >>>>>>>>>>    +    ret = of_reserved_mem_device_init(&pdev->dev); >>>>>>>>>> +    if (ret) { >>>>>>>>>> +        dev_err(&pdev->dev, "device does not have specific CMA >>>>>>>>>> pool\n"); >>>>>>>>>> +        goto free_rproc; >>>>>>>>>> +    } >>>>>>>>>> + >>>>>>>>>>        platform_set_drvdata(pdev, rproc); >>>>>>>>>>          ret = rproc_add(rproc); >>>>>>>>>>        if (ret) >>>>>>>>>> -        goto free_rproc; >>>>>>>>>> +        goto release_mem; >>>>>>>>>>          return 0; >>>>>>>>>>    +release_mem: >>>>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>>>    free_rproc: >>>>>>>>>>        rproc_free(rproc); >>>>>>>>>>        return ret; >>>>>>>>>> @@ -499,6 +508,7 @@ static int omap_rproc_remove(struct >>>>>>>>>> platform_device *pdev) >>>>>>>>>>          rproc_del(rproc); >>>>>>>>>>        rproc_free(rproc); >>>>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>>>          return 0; >>>>>>>>>>    } >>>>>>>>>> >>>>>>>> >>>>>>>> --  >>>>>> >>>>>> -- >>>>>> Texas Instruments Finland Oy, Porkkalankatu 22, 00180 Helsinki. >>>>>> Y-tunnus/Business ID: 0615521-4. Kotipaikka/Domicile: Helsinki >>>>> >>> >