Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp134952pxb; Tue, 2 Feb 2021 00:58:44 -0800 (PST) X-Google-Smtp-Source: ABdhPJwL2JfQ7WECxAvv/0qO3oEOjf0sbcqtWy2CzgD7avsOFabFFYjh6L1pumTc/EomDCK8e3bu X-Received: by 2002:a05:6402:c9c:: with SMTP id cm28mr23205346edb.281.1612256323937; Tue, 02 Feb 2021 00:58:43 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612256323; cv=none; d=google.com; s=arc-20160816; b=FvSpDMst07XtcX1vM7ohWpiTGdCfe1ylDPptzIG2opUd++3Kiwz0W0gKzEwP5oSF9c N7sUDSbMlytVIRZbVaAwqPBfWxCGkQ3LqSu080c+p41LGD1nn13KJMtdlq1M9+Lys29G ceWoGSzcAHyAMiYTjDIsLtF7dkn2AeTzZJhL7jGock3bF9AL7msaghb8gU4evLWvOrL5 MEWfDHX+Zcgk+y2qNRptYLCSWoHTL/6B6qfNq9mGuxtP+/lt+xEKFUL8PhyGTOouW1wq xjHpJQ0Vj2VBWAm4XFrtMiZQxA49jpsTxsw62Ql9GaquoKJZC6mppXbB2v303VoFZgHr dKoQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject:dkim-signature; bh=9uvc32id+Y3rGDjxBbMHT+s5N4kVEvv+kcqNmXeamo4=; b=G0cffgkE/+el0MDeE7wVqh3IWp+bW9FyIuosCttSsJtHKdv7q7KmaR713gJLR803ha CkgBn0YI5/ckqGuA5nJOATiLfAjZXaaMW696QaHAvnzaz4b1hzyaVo71PGCuzC2Lgz+9 W3/o29ojaw7XBLGhi/kgtgvZ+QLTOeTFLP7kNmjlGpjJu7OkjESafv+WZqnEckY+Te74 +vdWHXoUZT9/8/eZ5RBOrE4YmjcsIWwOmaIf163ZqR9AqQhBJxwW3Y6iXO2Ec54j2yoN gnJtb4fCybXMmDRMFYuvN3drLnLPzpsvXI6/szo7j+TpxyQ/JZZgQC5jg9vQOqjM9xbS DLpA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=8ezaUq3l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id rk25si5723827ejb.552.2021.02.02.00.58.18; Tue, 02 Feb 2021 00:58:43 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@foss.st.com header.s=selector1 header.b=8ezaUq3l; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=foss.st.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232464AbhBBIzG (ORCPT + 99 others); Tue, 2 Feb 2021 03:55:06 -0500 Received: from mx08-00178001.pphosted.com ([91.207.212.93]:55004 "EHLO mx07-00178001.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S229462AbhBBIzD (ORCPT ); Tue, 2 Feb 2021 03:55:03 -0500 Received: from pps.filterd (m0046661.ppops.net [127.0.0.1]) by mx07-00178001.pphosted.com (8.16.0.43/8.16.0.43) with SMTP id 1128qnpX027670; Tue, 2 Feb 2021 09:54:15 +0100 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=foss.st.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=selector1; bh=9uvc32id+Y3rGDjxBbMHT+s5N4kVEvv+kcqNmXeamo4=; b=8ezaUq3lNwECqAy2/DnGXcM0APSz1yqcak45/LPTDVwC/onlggcDPjEiCvtcOjCDLsAy sBkt9yE4O4sx8JBIgPMME/VRQNMWDTVHjSxJbNTQGeLhfcjW1foTSTuwtwcHWyOnWTTg fWAOkzqXoxoJ0mt20GngcKh3vpX2fs67rwLrgi9zZfrOEIucZvCGCUPzx8QUm2BR2GHF 2vIT5oPYyQQVCLIl169ufVPBS0P41pl7Q8XlEKjWVY9CNWycdOYDKZtywE9pTNjaQra9 JkHLV3H/EtYzllEzY1enL92v8IJHjiYahvurl8ur6iGftJx9oXSVi3WR8f5fESaRHmJx gQ== Received: from beta.dmz-eu.st.com (beta.dmz-eu.st.com [164.129.1.35]) by mx07-00178001.pphosted.com with ESMTP id 36e7x0rcd7-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Tue, 02 Feb 2021 09:54:15 +0100 Received: from euls16034.sgp.st.com (euls16034.sgp.st.com [10.75.44.20]) by beta.dmz-eu.st.com (STMicroelectronics) with ESMTP id AC27010002A; Tue, 2 Feb 2021 09:54:14 +0100 (CET) Received: from Webmail-eu.st.com (sfhdag2node3.st.com [10.75.127.6]) by euls16034.sgp.st.com (STMicroelectronics) with ESMTP id 93854211F33; Tue, 2 Feb 2021 09:54:14 +0100 (CET) Received: from lmecxl0889.lme.st.com (10.75.127.45) by SFHDAG2NODE3.st.com (10.75.127.6) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Tue, 2 Feb 2021 09:54:13 +0100 Subject: Re: [PATCH v4 00/17] remoteproc: Add support for detaching a rproc To: Mathieu Poirier , Arnaud POULIQUEN CC: "ohad@wizery.com" , "bjorn.andersson@linaro.org" , "robh+dt@kernel.org" , "linux-remoteproc@vger.kernel.org" , "devicetree@vger.kernel.org" , "linux-kernel@vger.kernel.org" References: <20201218173228.2277032-1-mathieu.poirier@linaro.org> <64b559dc-9e89-c351-ddee-f9cebd155ed7@st.com> <20210202004956.GD1319650@xps15> From: Arnaud POULIQUEN Message-ID: <200a464a-f6dd-480c-d7cd-d8165828fabc@foss.st.com> Date: Tue, 2 Feb 2021 09:54:13 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:68.0) Gecko/20100101 Thunderbird/68.10.0 MIME-Version: 1.0 In-Reply-To: <20210202004956.GD1319650@xps15> Content-Type: text/plain; charset="utf-8" Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.75.127.45] X-ClientProxiedBy: SFHDAG1NODE1.st.com (10.75.127.1) To SFHDAG2NODE3.st.com (10.75.127.6) X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.369,18.0.737 definitions=2021-02-02_04:2021-01-29,2021-02-02 signatures=0 Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2/2/21 1:49 AM, Mathieu Poirier wrote: > On Wed, Jan 27, 2021 at 10:21:24AM +0100, Arnaud POULIQUEN wrote: >> Hi Mathieu >> >> On 12/18/20 6:32 PM, Mathieu Poirier wrote: >>> Following the work done here [1], this set provides support for the >>> remoteproc core to release resources associated with a remote processor >>> without having to switch it off. That way a platform driver can be removed >>> or the application processor power cycled while the remote processor is >>> still operating. >>> >>> Of special interest in this series are patches 5 and 6 where getting the >>> address of the resource table installed by an eternal entity if moved to >>> the core. This is to support scenarios where a remote process has been >>> booted by the core but is being detached. To re-attach the remote >>> processor, the address of the resource table needs to be known at a later >>> time than the platform driver's probe() function. >>> >>> Applies cleanly on v5.10 >>> >>> Thanks, >>> Mathieu >>> >>> [1]. https://lkml.org/lkml/2020/7/14/1600 >>> >>> ---- >>> New for v4: >>> - Made binding description OS agnostic (Rob) >>> - Added functionality to set the external resource table in the core >>> - Fixed a crash when detaching (Arnaud) >>> - Fixed error code propagation in rproc_cdev_relase() and rproc_del() (Arnaud) >>> - Added RB tags >> >> >> I tested you series, attach and detach is working well. >> >> Then I faced issue when tried to re-attach after a detach. >> > > Right, in this case don't expect the re-attach to work properly because function > stm32_rproc_detach() does not exist. As such the M4 doesn't put itself back > in "wait-for-attach" mode as it does when booted by the boot loader. If I > remember correctly we talked about that during an earlier conversation and we > agreed FW support would be needed to properly test the re-attach. Yes you are right the remote firmware needs to be inform about the detach, and this is the purpose of the detach ops. But also some actions are missing on local side as some resources have also to be reinitialized as described in my previous mail. For instance the resource table is handled by the remoteproc framework. The remote firmware should only have a read access to this table. > >> But I don't know if this feature has to be supported in this step. >> >> The 2 issues I found are: >> >> 1) memory carveouts are released on detach so need to be reinitialized. >> The use of prepare/unprepare for the attach and detach would solve the issue but >> probably need to add parameter to differentiate a start/stop from a attach/detach. >> >> 2) The vrings in the loaded resource table (so no cached) has to be properly >> reinitialized. In rproc_free_vring the vring da is set to 0 that is then >> considered as a fixed address. >> >> Here is a fix which works on the stm32 platform >> >> @@ -425,7 +425,7 @@ void rproc_free_vring(struct rproc_vring *rvring) >> */ >> if (rproc->table_ptr) { >> rsc = (void *)rproc->table_ptr + rvring->rvdev->rsc_offset; >> - rsc->vring[idx].da = 0; >> + rsc->vring[idx].da = FW_RSC_ADDR_ANY; >> rsc->vring[idx].notifyid = -1; >> } >> } > > In light of the above let me know if these two issues are still relevant. If > so I'll investigate further. To highlight the issue just test attach/detach/attch with a firmware that implements a RPMsg communication. On the second attach the virtio framework is not properly restarted. Then please find at the end of the mail 3 patches for test I added on top of your series,that allow me to reattach. Of course the RPMsg channels are not re-created as i don't implement the remote FW part, but the Linux virtio and RPmsg frameworks are restarted. - [PATCH 1/3] remoteproc: stm32: add capability to detach from the remoteproc => Add a dummy function in stm32_rproc for test. - [PATCH 2/3] remoteproc: Add prepare/unprepare for attach detach => Add prepare/unprepare on attach/detach + implement attach in stm32mp1 to reinitialize the memory region that as been cleaned on detach. - [PATCH 3/3] remoteproc: virtio: set to vring address to FW_RSC_ADDR_ANY on free => Reinitialize the vring addresses on detach. For this one a better implementation would be to use a cached resource table to fully reinitialize it on re-attach. Thanks, Arnaud > > Thanks, > Mathieu > >> >> Here, perhaps a better alternative would be to make a cached copy on attach >> before updating it. On the next attach, the cached copy would be copied as it is >> done in rproc_start. >> >> Thanks, >> Arnaud >> >> >>> >>> Mathieu Poirier (17): >>> dt-bindings: remoteproc: Add bindind to support autonomous processors >>> remoteproc: Re-check state in rproc_shutdown() >>> remoteproc: Remove useless check in rproc_del() >>> remoteproc: Rename function rproc_actuate() >>> remoteproc: Add new get_loaded_rsc_table() remoteproc operation >>> remoteproc: stm32: Move resource table setup to rproc_ops >>> remoteproc: Add new RPROC_ATTACHED state >>> remoteproc: Properly represent the attached state >>> remoteproc: Properly deal with a kernel panic when attached >>> remoteproc: Add new detach() remoteproc operation >>> remoteproc: Introduce function __rproc_detach() >>> remoteproc: Introduce function rproc_detach() >>> remoteproc: Add return value to function rproc_shutdown() >>> remoteproc: Properly deal with a stop request when attached >>> remoteproc: Properly deal with a start request when attached >>> remoteproc: Properly deal with detach request >>> remoteproc: Refactor rproc delete and cdev release path >>> >>> .../bindings/remoteproc/remoteproc-core.yaml | 27 +++ >>> drivers/remoteproc/remoteproc_cdev.c | 32 ++- >>> drivers/remoteproc/remoteproc_core.c | 211 +++++++++++++++--- >>> drivers/remoteproc/remoteproc_internal.h | 8 + >>> drivers/remoteproc/remoteproc_sysfs.c | 20 +- >>> drivers/remoteproc/stm32_rproc.c | 147 ++++++------ >>> include/linux/remoteproc.h | 24 +- >>> 7 files changed, 344 insertions(+), 125 deletions(-) >>> create mode 100644 Documentation/devicetree/bindings/remoteproc/remoteproc-core.yaml >>> Subject: [PATCH 1/3] remoteproc: stm32: add capability to detach from the remoteproc Add a dummy function to allow to detach. No specific action is needed Signed-off-by: Arnaud Pouliquen --- drivers/remoteproc/stm32_rproc.c | 7 +++++++ 1 file changed, 7 insertions(+) diff --git a/drivers/remoteproc/stm32_rproc.c b/drivers/remoteproc/stm32_rproc.c index 2c949725b91e..b325d28f627c 100644 --- a/drivers/remoteproc/stm32_rproc.c +++ b/drivers/remoteproc/stm32_rproc.c @@ -590,6 +590,12 @@ static int stm32_rproc_attach(struct rproc *rproc) return reset_control_assert(ddata->hold_boot); } +static int stm32_rproc_detach(struct rproc *rproc) +{ + /* Nothing to do but ops mandatory to support the detach feature */ + return 0; +} + static int stm32_rproc_stop(struct rproc *rproc) { struct stm32_rproc *ddata = rproc->priv; @@ -712,6 +718,7 @@ static struct rproc_ops st_rproc_ops = { .start = stm32_rproc_start, .stop = stm32_rproc_stop, .attach = stm32_rproc_attach, + .detach = stm32_rproc_detach, .kick = stm32_rproc_kick, .load = rproc_elf_load_segments, .parse_fw = stm32_rproc_parse_fw, -- 2.17.1 ------------------------------------------------------------------------ Subject: [PATCH 2/3] remoteproc: Add prepare/unprepare for attach detach Some actions such as memory resources reallocation are needed when try to reattach. Use the prepare ops for these actions. Signed-off-by: Arnaud Pouliquen --- drivers/remoteproc/remoteproc_core.c | 14 ++++++++++++++ drivers/remoteproc/stm32_rproc.c | 14 +++++++------- 2 files changed, 21 insertions(+), 7 deletions(-) diff --git a/drivers/remoteproc/remoteproc_core.c b/drivers/remoteproc/remoteproc_core.c index f1f51ad1a1d6..f177561b8863 100644 --- a/drivers/remoteproc/remoteproc_core.c +++ b/drivers/remoteproc/remoteproc_core.c @@ -1557,6 +1557,13 @@ static int rproc_attach(struct rproc *rproc) return ret; } + /* Prepare rproc for firmware loading if needed */ + ret = rproc_prepare_device(rproc); + if (ret) { + dev_err(dev, "can't prepare rproc %s: %d\n", rproc->name, ret); + goto disable_iommu; + } + ret = rproc_get_loaded_rsc_table(rproc); if (ret) { dev_err(dev, "can't load resource table: %d\n", ret); @@ -1990,6 +1997,13 @@ int rproc_detach(struct rproc *rproc) /* clean up all acquired resources */ rproc_resource_cleanup(rproc); + /* Release HW resources if needed */ + ret = rproc_unprepare_device(rproc); + if (ret) { + atomic_inc(&rproc->power); + goto out; + } + rproc_disable_iommu(rproc); /* diff --git a/drivers/remoteproc/stm32_rproc.c b/drivers/remoteproc/stm32_rproc.c index b325d28f627c..bf50d79b1f09 100644 --- a/drivers/remoteproc/stm32_rproc.c +++ b/drivers/remoteproc/stm32_rproc.c @@ -413,9 +413,6 @@ static int stm32_rproc_parse_fw(struct rproc *rproc, const struct firmware *fw) struct stm32_rproc *ddata = rproc->priv; int ret; - ret = stm32_rproc_parse_memory_regions(rproc); - if (ret) - return ret; if (ddata->trproc) ret = rproc_tee_get_rsc_table(ddata->trproc); @@ -580,6 +577,12 @@ static int stm32_rproc_start(struct rproc *rproc) return reset_control_assert(ddata->hold_boot); } +static int stm32_rproc_prepare(struct rproc *rproc) +{ + dev_err(&rproc->dev, "%s: %d\n", __func__, __LINE__); + + return stm32_rproc_parse_memory_regions(rproc); +} static int stm32_rproc_attach(struct rproc *rproc) { @@ -717,6 +720,7 @@ static int stm32_rproc_get_loaded_rsc_table(struct rproc *rproc) static struct rproc_ops st_rproc_ops = { .start = stm32_rproc_start, .stop = stm32_rproc_stop, + .prepare = stm32_rproc_prepare, .attach = stm32_rproc_attach, .detach = stm32_rproc_detach, .kick = stm32_rproc_kick, @@ -921,10 +925,6 @@ static int stm32_rproc_probe(struct platform_device *pdev) if (state == M4_STATE_CRUN) { rproc->state = RPROC_DETACHED; - - ret = stm32_rproc_parse_memory_regions(rproc); - if (ret) - goto free_resources; } rproc->has_iommu = false; -- 2.17.1 ------------------------------------------------------------------------ Subject: [PATCH 3/3] remoteproc: virtio: set to vring address to FW_RSC_ADDR_ANY on free The resource table vring structure is cleaned on free. But value is set to 0. This value is considered as a valid address. Set the value to FW_RSC_ADDR_ANY instead. This is needed to allow to reattach to an autonomous firmware. An alternative would be to save the resource table before updating it. On free the value would be reset to initial value. Signed-off-by: Arnaud Pouliquen --- drivers/remoteproc/remoteproc_core.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/drivers/remoteproc/remoteproc_core.c b/drivers/remoteproc/remoteproc_core.c index f177561b8863..5b5de4db3981 100644 --- a/drivers/remoteproc/remoteproc_core.c +++ b/drivers/remoteproc/remoteproc_core.c @@ -425,7 +425,7 @@ void rproc_free_vring(struct rproc_vring *rvring) */ if (rproc->table_ptr) { rsc = (void *)rproc->table_ptr + rvring->rvdev->rsc_offset; - rsc->vring[idx].da = 0; + rsc->vring[idx].da = FW_RSC_ADDR_ANY; rsc->vring[idx].notifyid = -1; } } -- 2.17.1