Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2302285ybl; Thu, 30 Jan 2020 15:07:04 -0800 (PST) X-Google-Smtp-Source: APXvYqzqn4vF7azzqDmJHlXc9hvI1hLgpIG74k457cFUNYjEhRAskfaQbdN8kxKDT+CeCz50O303 X-Received: by 2002:aca:cc07:: with SMTP id c7mr4385868oig.165.1580425624146; Thu, 30 Jan 2020 15:07:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1580425624; cv=none; d=google.com; s=arc-20160816; b=sctERBuk24pAngnqZ3PiMMCH/oejb15ZWOs6Qrj41VF93NNjW/k1iGt9Fz2fdWLSJU K4Jjxzo5PDcrsK+l+YljNCVzcGlKJn/OcGptnNIudwdfsxSJfU53HBzp7cr914lZyGUs a6nm5ZNyqfk06LLiUepGwD99yYSsBMornTyB+saWCEAhHK4yMmPixDnXBkYEFRlVcpU1 v7jCto0NXagSQvLqVfKQASzRPrPAwOucZsYLZ8Y1CHI0fX2/Srrs43sEr69oxMSLScdB CmWT0PdAhpTyJ5jLX8dHPlWprQD5nyFNsWbH3jnnD4WsxXH8aAC9RM5nDFHHSi2dvQ7g khrw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature; bh=U2mGBMnKhzM79yhhvv3PubaRm5qfZ0ZzRhb5W4wVtyU=; b=vu+u+k2LrPxyt3sFSdlFBGSInFmNKpVn5F8O6yIMKprzaU6ivltKpZWMBfa9aKCy4e xJfG4e9ioviO8wSwiOJYpxWp7giP8O755Mk55ys5niXVRothev9km/Iq0r3D1N74BJRP aTMbhmEmdhhS+gcvHrFDEPew+LDXjYgMUnqmkQP82EsjrbvtAP6pmygxGkNP59iTN9dE o1ZuEz388dAqo80ZM1H2XyIOWQbFTZir2dePjnX+NV8XICr8qR1p+Kz/Wwsq3LseP29G d3TocfS04jXskEbJ/MDivftz/GIT5C24EdpU8XKRWDEo8HH9kkVu6uF5rvSy2hZry9U1 gSWg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=kvkrCDdp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id t16si3931509oth.38.2020.01.30.15.06.51; Thu, 30 Jan 2020 15:07:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@ti.com header.s=ti-com-17Q1 header.b=kvkrCDdp; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=NONE dis=NONE) header.from=ti.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727664AbgA3XE5 (ORCPT + 99 others); Thu, 30 Jan 2020 18:04:57 -0500 Received: from fllv0016.ext.ti.com ([198.47.19.142]:39470 "EHLO fllv0016.ext.ti.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726294AbgA3XE4 (ORCPT ); Thu, 30 Jan 2020 18:04:56 -0500 Received: from lelv0266.itg.ti.com ([10.180.67.225]) by fllv0016.ext.ti.com (8.15.2/8.15.2) with ESMTP id 00UN4sk3040121; Thu, 30 Jan 2020 17:04:54 -0600 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ti.com; s=ti-com-17Q1; t=1580425494; bh=U2mGBMnKhzM79yhhvv3PubaRm5qfZ0ZzRhb5W4wVtyU=; h=Subject:To:CC:References:From:Date:In-Reply-To; b=kvkrCDdpBcGQqkftU2sD8PIuCtMts4lwbfSYlfy61MiDjvI/TSM9gu5TOsW4gVWhP DOIIR49y+5C1r/jUe7aCdnrU1BeEKM2un0dzpPAmplh5cSFUdEuyc2rDTolovfsHkd Bg2wtG8pOikPF6V/lU3cAVxWXvixx5rMOcKPP2G4= Received: from DLEE115.ent.ti.com (dlee115.ent.ti.com [157.170.170.26]) by lelv0266.itg.ti.com (8.15.2/8.15.2) with ESMTPS id 00UN4s0h075223 (version=TLSv1.2 cipher=AES256-GCM-SHA384 bits=256 verify=FAIL); Thu, 30 Jan 2020 17:04:54 -0600 Received: from DLEE109.ent.ti.com (157.170.170.41) by DLEE115.ent.ti.com (157.170.170.26) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3; Thu, 30 Jan 2020 17:04:54 -0600 Received: from lelv0327.itg.ti.com (10.180.67.183) by DLEE109.ent.ti.com (157.170.170.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1847.3 via Frontend Transport; Thu, 30 Jan 2020 17:04:54 -0600 Received: from [10.250.70.160] (ileax41-snat.itg.ti.com [10.172.224.153]) by lelv0327.itg.ti.com (8.15.2/8.15.2) with ESMTP id 00UN4rB3062947; Thu, 30 Jan 2020 17:04:53 -0600 Subject: Re: [PATCHv5 06/14] remoteproc/omap: Initialize and assign reserved memory node To: Suman Anna , Tero Kristo , , , CC: , , References: <20200116135332.7819-1-t-kristo@ti.com> <20200116135332.7819-7-t-kristo@ti.com> <249c293c-6a23-165f-1df5-4859ee47658a@ti.com> <37db5d57-b1cd-1cec-2c9b-31c49e3bdc10@ti.com> <2aaa4024-1e2c-5cab-c9f3-3be59c57e9ac@ti.com> <7aed7a9f-3546-f622-37ac-34d33ddb4298@ti.com> <50c69e97-034b-3160-e95e-97aec2e75cc6@ti.com> <127eff13-cc16-2b59-d8ce-06e61bb910bc@ti.com> <39b3e536-26a9-e7da-a39a-db2853e0fe04@ti.com> <279b6f35-a316-94dd-af62-2891815cf453@ti.com> From: "Andrew F. Davis" Message-ID: <2d7eeb94-ecb8-1e88-412b-215125c594fc@ti.com> Date: Thu, 30 Jan 2020 18:04:53 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.4.1 MIME-Version: 1.0 In-Reply-To: <279b6f35-a316-94dd-af62-2891815cf453@ti.com> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 8bit X-EXCLAIMER-MD-CONFIG: e1e8a2fd-e40a-4ac6-ac9b-f7e9cc9ee180 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 1/30/20 5:06 PM, Suman Anna wrote: > On 1/30/20 3:57 PM, Suman Anna wrote: >> On 1/30/20 3:50 PM, Andrew F. Davis wrote: >>> On 1/30/20 4:39 PM, Suman Anna wrote: >>>> On 1/30/20 3:19 PM, Andrew F. Davis wrote: >>>>> On 1/30/20 3:39 PM, Suman Anna wrote: >>>>>> On 1/30/20 2:22 PM, Andrew F. Davis wrote: >>>>>>> On 1/30/20 2:55 PM, Suman Anna wrote: >>>>>>>> On 1/30/20 1:42 PM, Tero Kristo wrote: >>>>>>>>> On 30/01/2020 21:20, Andrew F. Davis wrote: >>>>>>>>>> On 1/30/20 2:18 PM, Tero Kristo wrote: >>>>>>>>>>> On 30/01/2020 20:11, Andrew F. Davis wrote: >>>>>>>>>>>> On 1/16/20 8:53 AM, Tero Kristo wrote: >>>>>>>>>>>>> From: Suman Anna >>>>>>>>>>>>> >>>>>>>>>>>>> The reserved memory nodes are not assigned to platform devices by >>>>>>>>>>>>> default in the driver core to avoid the lookup for every platform >>>>>>>>>>>>> device and incur a penalty as the real users are expected to be >>>>>>>>>>>>> only a few devices. >>>>>>>>>>>>> >>>>>>>>>>>>> OMAP remoteproc devices fall into the above category and the OMAP >>>>>>>>>>>>> remoteproc driver _requires_ specific CMA pools to be assigned >>>>>>>>>>>>> for each device at the moment to align on the location of the >>>>>>>>>>>>> vrings and vring buffers in the RTOS-side firmware images. So, >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> Same comment as before, this is a firmware issue for only some >>>>>>>>>>>> firmwares >>>>>>>>>>>> that do not handle being assigned vring locations correctly and instead >>>>>>>>>>>> hard-code them. >>>>>>>> >>>>>>>> As for this statement, this can do with some updating. Post 4.20, >>>>>>>> because of the lazy allocation scheme used for carveouts including the >>>>>>>> vrings, the resource tables now have to use FW_RSC_ADDR_ANY and will >>>>>>>> have to wait for the vdev synchronization to happen. >>>>>>>> >>>>>>>>>>> >>>>>>>>>>> I believe we discussed this topic in length in previous version but >>>>>>>>>>> there was no conclusion on it. >>>>>>>>>>> >>>>>>>>>>> The commit desc might be a bit misleading, we are not actually forced to >>>>>>>>>>> use specific CMA buffers, as we use IOMMU to map these to device >>>>>>>>>>> addresses. For example IPU1/IPU2 use internally exact same memory >>>>>>>>>>> addresses, iommu is used to map these to specific CMA buffer. >>>>>>>>>>> >>>>>>>>>>> CMA buffers are mostly used so that we get aligned large chunk of memory >>>>>>>>>>> which can be mapped properly with the limited IOMMU OMAP family of chips >>>>>>>>>>> have. Not sure if there is any sane way to get this done in any other >>>>>>>>>>> manner. >>>>>>>>>>> >>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Why not use the default CMA area? >>>>>>>>> >>>>>>>>> I think using default CMA area getting the actual memory block is not >>>>>>>>> guaranteed and might fail. There are other users for the memory, and it >>>>>>>>> might get fragmented at the very late phase we are grabbing the memory >>>>>>>>> (omap remoteproc driver probe time.) Some chunks we need are pretty large. >>>>>>>>> >>>>>>>>> I believe I could experiment with this a bit though and see, or Suman >>>>>>>>> could maybe provide feedback why this was designed initially like this >>>>>>>>> and why this would not be a good idea. >>>>>>>> >>>>>>>> I have given some explanation on this on v4 as well, but if it is not >>>>>>>> clear, there are restrictions with using default CMA. Default CMA has >>>>>>>> switched to be assigned from the top of the memory (higher addresses, >>>>>>>> since 3.18 IIRC), and the MMUs on IPUs and DSPs can only address >>>>>>>> 32-bits. So, we cannot blindly use the default CMA pool, and this will >>>>>>>> definitely not work on boards > 2 GB RAM. And, if you want to add in any >>>>>>>> firewall capability, then specific physical addresses becomes mandatory. >>>>>>>> >>>>>>> >>>>>>> >>>>>>> If you need 32bit range allocations then >>>>>>> dma_set_mask(dev, DMA_BIT_MASK(32)); >>>>>>> >>>>>>> I'm not saying don't have support for carveouts, just make them >>>>>>> optional, keystone_remoteproc.c does this: >>>>>>> >>>>>>> if (of_reserved_mem_device_init(dev)) >>>>>>> dev_warn(dev, "device does not have specific CMA pool\n"); >>>>>>> >>>>>>> There doesn't even needs to be a warning but that is up to you. >>>>>> >>>>>> It is not exactly an apples to apples comparison. K2s do not have MMUs, >>>>>> and most of our firmware images on K2 are actually running out of the >>>>>> DSP internal memory. >>>>>> >>>>> >>>>> >>>>> So again we circle back to it being a firmware issue, if K2 can get away >>>>> without needing carveouts and it doesn't even have an MMU then certainly >>>>> OMAP/DRA7x class devices can handle it even better given they *do* have >>>>> an IOMMU. Unless someone is hard-coding the IOMMU configuration.. In >>>>> which case we are still just hacking around the problem here with >>>>> mandatory specific address memory carveouts. >>>> >>>> Optional carveouts on OMAP remoteprocs can be an enhancement in the >>>> future, but at the moment, we won't be able to run use-cases without >>>> this. And I have already given some of the reasons for the same here and >>>> on v4. >>>> >>> >>> >>> No reason to be dismissive, my questions are valid. >>> >>> What "use-cases" are we talking about, I have firmware that doesn't need >>> specific carved-out addresses. >> >> I think you are well aware of all the usecases we provide with the TI >> SDKs with IPUs and DSPs. And what is the firmware that you have and what >> do you use it for? >> Yes I know exactly the pieces of TI firmware we are talking about and why it they still need carveouts. That's not the point, our firmware may have issues and hard-coding, but we need to allow for correctly built firmware that doesn't need carveouts also. This driver should not fail if a carveout is not provided. The remoteproc can run fine without a carveout, only some firmwares cannot, so it should be optional and not forced in DT on everyone using our DSP/IPU. >> If you have misbehaving firmware that >>> needs statically carved out memory addresses then you can have carveouts >>> if you want, but it should be optional. >> If I don't want to pollute my >>> system's memory space with a bunch of carveout holes then I shouldn't >>> have to just because your specific firmware needs them. >> >> Further follow-up series like early-boot and late-attach will mandate >> fixed carveouts actually. You cannot just run out of any random memory. > Those are different, the location of the loaded firmware in memory will need to be carved out if it is in use by a remote core before Linux boots. This carveout is for Linux to allocate from to load the Vrings and other memory it may need. When late-attach shows up then we can think about how to handle those. > Also, these are CMA pools ("reusable"), so they are not actual carveout > holes ("no-map"). This is the preferred method in remoteproc mode so > that the memory is available for kernel when remoteprocs are not in use. > Customers can always choose to make these carveouts so that they do not > run into memory allocation issues when changing firmwares and under > stress conditions. These will have to be carveouts for early-boot usecases. > Even "reusable" carveouts can only be used by re-locateable memory (caches and such) so still not a good thing to have your memory space full of them. > Customers can always choose to make these carveouts That is exactly what I am saying, they can choose, but it should be optional, the current binding and driver make them mandatory or the driver will not probe. Andrew > regards > Suman > >> >> regards >> Suman >> >>> >>> Andrew >>> >>> >>>> regards >>>> Suman >>>> >>>>> >>>>> Andrew >>>>> >>>>> >>>>>> regards >>>>>> Suman >>>>>> >>>>>>> >>>>>>> Andrew >>>>>>> >>>>>>> >>>>>>>> regards >>>>>>>> Suman >>>>>>>> >>>>>>>>> >>>>>>>>> -Tero >>>>>>>>> >>>>>>>>>> >>>>>>>>>> Andrew >>>>>>>>>> >>>>>>>>>> >>>>>>>>>>> -Tero >>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> This is not a requirement of the remote processor itself and so it >>>>>>>>>>>> should not fail to probe if a specific memory carveout isn't given. >>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>>> use the of_reserved_mem_device_init/release() API appropriately >>>>>>>>>>>>> to assign the corresponding reserved memory region to the OMAP >>>>>>>>>>>>> remoteproc device. Note that only one region per device is >>>>>>>>>>>>> allowed by the framework. >>>>>>>>>>>>> >>>>>>>>>>>>> Signed-off-by: Suman Anna >>>>>>>>>>>>> Signed-off-by: Tero Kristo >>>>>>>>>>>>> Reviewed-by: Bjorn Andersson >>>>>>>>>>>>> --- >>>>>>>>>>>>> v5: no changes >>>>>>>>>>>>> >>>>>>>>>>>>>    drivers/remoteproc/omap_remoteproc.c | 12 +++++++++++- >>>>>>>>>>>>>    1 file changed, 11 insertions(+), 1 deletion(-) >>>>>>>>>>>>> >>>>>>>>>>>>> diff --git a/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>>>>> b/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>>>>> index 0846839b2c97..194303b860b2 100644 >>>>>>>>>>>>> --- a/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>>>>> +++ b/drivers/remoteproc/omap_remoteproc.c >>>>>>>>>>>>> @@ -17,6 +17,7 @@ >>>>>>>>>>>>>    #include >>>>>>>>>>>>>    #include >>>>>>>>>>>>>    #include >>>>>>>>>>>>> +#include >>>>>>>>>>>>>    #include >>>>>>>>>>>>>    #include >>>>>>>>>>>>>    #include >>>>>>>>>>>>> @@ -480,14 +481,22 @@ static int omap_rproc_probe(struct >>>>>>>>>>>>> platform_device *pdev) >>>>>>>>>>>>>        if (ret) >>>>>>>>>>>>>            goto free_rproc; >>>>>>>>>>>>>    +    ret = of_reserved_mem_device_init(&pdev->dev); >>>>>>>>>>>>> +    if (ret) { >>>>>>>>>>>>> +        dev_err(&pdev->dev, "device does not have specific CMA >>>>>>>>>>>>> pool\n"); >>>>>>>>>>>>> +        goto free_rproc; >>>>>>>>>>>>> +    } >>>>>>>>>>>>> + >>>>>>>>>>>>>        platform_set_drvdata(pdev, rproc); >>>>>>>>>>>>>          ret = rproc_add(rproc); >>>>>>>>>>>>>        if (ret) >>>>>>>>>>>>> -        goto free_rproc; >>>>>>>>>>>>> +        goto release_mem; >>>>>>>>>>>>>          return 0; >>>>>>>>>>>>>    +release_mem: >>>>>>>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>>>>>>    free_rproc: >>>>>>>>>>>>>        rproc_free(rproc); >>>>>>>>>>>>>        return ret; >>>>>>>>>>>>> @@ -499,6 +508,7 @@ static int omap_rproc_remove(struct >>>>>>>>>>>>> platform_device *pdev) >>>>>>>>>>>>>          rproc_del(rproc); >>>>>>>>>>>>>        rproc_free(rproc); >>>>>>>>>>>>> +    of_reserved_mem_device_release(&pdev->dev); >>>>>>>>>>>>>          return 0; >>>>>>>>>>>>>    } >>>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> --  >>>>>>>>> >>>>>>>>> -- >>>>>>>>> Texas Instruments Finland Oy, Porkkalankatu 22, 00180 Helsinki. >>>>>>>>> Y-tunnus/Business ID: 0615521-4. Kotipaikka/Domicile: Helsinki >>>>>>>> >>>>>> >>>> >> >