Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp2778115rdg; Mon, 16 Oct 2023 14:55:44 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFTxvHUnYyPcaUNt51B56iTOfYTG6up6wfT5CTd2Tz9kHkoAQDrEtERzHToiFf6FZJxpZ9u X-Received: by 2002:a17:903:24c:b0:1c3:64f9:45ad with SMTP id j12-20020a170903024c00b001c364f945admr703884plh.48.1697493344488; Mon, 16 Oct 2023 14:55:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1697493344; cv=none; d=google.com; s=arc-20160816; b=fEzGbhCwPYPkUnzp1Me8zJjH+uwo5JRSe+4WO1iseBN3qmT5XKbO7/ywtwmbpYxuH5 NYE/shbbNi9/eD47ltyCxiGMgR4rKzBzcPrfm4wnhHT72h7zJiUQ3tV6rAuKj5Ris0aQ EVR9FhbIL+SvLtybpFuGWQ1IY8xvJsUrPC/NAuj7kreFwen6sbyMg+0rbyzhN9eYGSAq Nluf9X5QRR5ad1H7y6ST/L883Djlkiyn+tdH4itSclTV72pkqqPULTPwwJ0+Mkx8ofnT lLvuV6OaPlpcfTBdVCXwvuvPZB6QqphGkCsYtSnQbPV2LVMBvzjRpVbCivQq+HHo+1AP PASQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=tc/P1acb3I8J14trQrv7akNjvswnVV/SQ5E3mgTEuIc=; fh=eFQSo389d88d5NMyY50mLU5coUUXcvDfhLCbvv1Vdz8=; b=EUxEnSG12tvl8Etr4xmzqFScVlqKhcgn0+2A/YsM4PPlMkjLlso8c8kgLBFK/tI4+4 /Ohd3Mf6j6cGlFn5wwG8n8S6HTG5rcaNI8XLaWo3N3ajhjpIlS5fnFnjBZLYsFLWJhj+ Z2nkhUyNmWdo871YmOgIbXI4GIC7cYpjSg8HlFPOjk3l2Bc4ZpwF/9Vp0tAxaR/2kbc8 5QVu3MsYJ9ZEfuZu+uu0eLKZ3hjVmHl+h0tb0xQY6N0W6K0t/YmjzsW/KgqIlzv+NX/r 2cMcp3gz9wccXBy0z7xUSbZGhzdzEuObemOL9n4HcJfhv3YEeGg5N5Y79r1faFf/b2er Zfkg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=JZ7Z4BVj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Return-Path: Received: from pete.vger.email (pete.vger.email. [2620:137:e000::3:6]) by mx.google.com with ESMTPS id e1-20020a170902d38100b001c62ca6d540si222790pld.77.2023.10.16.14.55.44 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 16 Oct 2023 14:55:44 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) client-ip=2620:137:e000::3:6; Authentication-Results: mx.google.com; dkim=pass header.i=@chromium.org header.s=google header.b=JZ7Z4BVj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:6 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=chromium.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id 7B00E809ACAC; Mon, 16 Oct 2023 14:55:35 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234201AbjJPVzU (ORCPT + 99 others); Mon, 16 Oct 2023 17:55:20 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:44210 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S234137AbjJPVzR (ORCPT ); Mon, 16 Oct 2023 17:55:17 -0400 Received: from mail-lj1-x230.google.com (mail-lj1-x230.google.com [IPv6:2a00:1450:4864:20::230]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 98EEFA1 for ; Mon, 16 Oct 2023 14:55:14 -0700 (PDT) Received: by mail-lj1-x230.google.com with SMTP id 38308e7fff4ca-2c5071165d5so33592981fa.0 for ; Mon, 16 Oct 2023 14:55:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chromium.org; s=google; t=1697493313; x=1698098113; darn=vger.kernel.org; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=tc/P1acb3I8J14trQrv7akNjvswnVV/SQ5E3mgTEuIc=; b=JZ7Z4BVjr7hoUb2aCGraNwtXyZ8bOVkceOswKRP1KKwJ26FA4axsNw9UxyHAYgEUf5 c3/YGmaUY4e57aqz9+iz4Y2O4nc8+haVhBJbf+SDhhVEEeKHxi5wZn7vD/l97ur9/Gry AiasncMSXHO7LQFg2Q2H5pFnO+/73g96ml3vw= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1697493313; x=1698098113; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=tc/P1acb3I8J14trQrv7akNjvswnVV/SQ5E3mgTEuIc=; b=RsoYyEj+a3Ho3WZSOWx3NZzg/neubijdX8mM8spgrkG/ylBwzlxm/1EunI7gAEDMEa KMSgeFztxrAQSfiej22x4llu8Bf/N4ikKMSxBEqbGeP+25GZ2dRpZB7ALFaHJJemDxUR qUIyz6bEJWjHhSIIFtZIHfof/pcpohp64hVyth7u5lZzrvXMtJhQ+nPZd18Rs5ynzneI eqZrl8DQ2DaIC0gZ9h8vG1gtF0+z0VwUYLikSQlW0RDiNM/d8cn2TqY4k09R8cyAd6Fx dj3CKR4+pBjfdhAsDOP8LjWvq9oezJSsvO1ybKRvSObKTwtKR8Gudk4NeyokTsPmkbzI sA5w== X-Gm-Message-State: AOJu0Yy+E2Lsf/KriRA8jtbPBEfESl1Ypi3rOHqT4RnPuMimMlw1PdTa pwstm0p/e6oqmbdMrGpuf+RwZZP68qh4YyGqoVbjGyfkUTdmvmgZO/8= X-Received: by 2002:a2e:b0ed:0:b0:2b9:ecab:d924 with SMTP id h13-20020a2eb0ed000000b002b9ecabd924mr334866ljl.18.1697493312677; Mon, 16 Oct 2023 14:55:12 -0700 (PDT) MIME-Version: 1.0 References: <20230926194242.2732127-1-sjg@chromium.org> <20230926194242.2732127-2-sjg@chromium.org> In-Reply-To: From: Simon Glass Date: Mon, 16 Oct 2023 15:54:56 -0600 Message-ID: Subject: Re: [PATCH v7 2/2] schemas: Add some common reserved-memory usages To: Rob Herring Cc: Ard Biesheuvel , devicetree@vger.kernel.org, Mark Rutland , Lean Sheng Tan , lkml , Dhaval Sharma , Maximilian Brune , Yunhui Cui , Guo Dong , Tom Rini , ron minnich , Gua Guo , Chiu Chasel , linux-acpi@vger.kernel.org, U-Boot Mailing List Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Mon, 16 Oct 2023 14:55:35 -0700 (PDT) Hi Rob, On Mon, 16 Oct 2023 at 10:50, Rob Herring wrote: > > On Fri, Oct 13, 2023 at 4:09=E2=80=AFPM Simon Glass wr= ote: > > > > Hi Rob, > > > > On Fri, 13 Oct 2023 at 13:42, Rob Herring wrote: > > > > > > On Fri, Oct 6, 2023 at 7:03=E2=80=AFPM Simon Glass = wrote: > > > > > > > > Hi Ard, > > > > > > > > On Fri, 6 Oct 2023 at 17:00, Ard Biesheuvel wrote= : > > > > > > > > > > On Fri, 6 Oct 2023 at 20:17, Simon Glass wrote= : > > > > > > > > > > > > Hi Ard, > > > > > > > > > > > > On Fri, 6 Oct 2023 at 11:33, Ard Biesheuvel w= rote: > > > > > > > > > > > > > > On Mon, 2 Oct 2023 at 19:54, Simon Glass w= rote: > > > > > > > > > > > > > > > > Hi Rob, > > > > > > > > > > > > > > > > On Tue, 26 Sept 2023 at 13:42, Simon Glass wrote: > > > > > > > > > > > > > > > > > > It is common to split firmware into 'Platform Init', whic= h does the > > > > > > > > > initial hardware setup and a "Payload" which selects the = OS to be booted. > > > > > > > > > Thus an handover interface is required between these two = pieces. > > > > > > > > > > > > > > > > > > Where UEFI boot-time services are not available, but UEFI= firmware is > > > > > > > > > present on either side of this interface, information abo= ut memory usage > > > > > > > > > and attributes must be presented to the "Payload" in some= form. > > > > > > > > > > > > > > > > > > This aims to provide an small schema addition for the mem= ory mapping > > > > > > > > > needed to keep these two pieces working together well. > > > > > > > > > > > > > > > > > > Signed-off-by: Simon Glass > > > > > > > > > --- > > > > > > > > > > > > > > > > > > Changes in v7: > > > > > > > > > - Rename acpi-reclaim to acpi > > > > > > > > > - Drop individual mention of when memory can be reclaimed > > > > > > > > > - Rewrite the item descriptions > > > > > > > > > - Add back the UEFI text (with trepidation) > > > > > > > > > > > > > > > > I am again checking on this series. Can it be applied, plea= se? > > > > > > > > > > > > > > > > > > > > > > Apologies for the delay in response. I have been away. > > > > > > > > > > > > OK, I hope you had a nice trip. > > > > > > > > > > > > > > > > Thanks, it was wonderful! > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Changes in v6: > > > > > > > > > - Drop mention of UEFI > > > > > > > > > - Use compatible strings instead of node names > > > > > > > > > > > > > > > > > > Changes in v5: > > > > > > > > > - Drop the memory-map node (should have done that in v4) > > > > > > > > > - Tidy up schema a bit > > > > > > > > > > > > > > > > > > Changes in v4: > > > > > > > > > - Make use of the reserved-memory node instead of creatin= g a new one > > > > > > > > > > > > > > > > > > Changes in v3: > > > > > > > > > - Reword commit message again > > > > > > > > > - cc a lot more people, from the FFI patch > > > > > > > > > - Split out the attributes into the /memory nodes > > > > > > > > > > > > > > > > > > Changes in v2: > > > > > > > > > - Reword commit message > > > > > > > > > > > > > > > > > > .../reserved-memory/common-reserved.yaml | 71 +++++= ++++++++++++++ > > > > > > > > > 1 file changed, 71 insertions(+) > > > > > > > > > create mode 100644 dtschema/schemas/reserved-memory/comm= on-reserved.yaml > > > > > > > > > > > > > > > > > > diff --git a/dtschema/schemas/reserved-memory/common-rese= rved.yaml b/dtschema/schemas/reserved-memory/common-reserved.yaml > > > > > > > > > new file mode 100644 > > > > > > > > > index 0000000..f7fbdfd > > > > > > > > > --- /dev/null > > > > > > > > > +++ b/dtschema/schemas/reserved-memory/common-reserved.ya= ml > > > > > > > > > @@ -0,0 +1,71 @@ > > > > > > > > > +# SPDX-License-Identifier: GPL-2.0-only OR BSD-2-Clause > > > > > > > > > +%YAML 1.2 > > > > > > > > > +--- > > > > > > > > > +$id: http://devicetree.org/schemas/reserved-memory/commo= n-reserved.yaml# > > > > > > > > > +$schema: http://devicetree.org/meta-schemas/core.yaml# > > > > > > > > > + > > > > > > > > > +title: Common memory reservations > > > > > > > > > + > > > > > > > > > +description: | > > > > > > > > > + Specifies that the reserved memory region can be used = for the purpose > > > > > > > > > + indicated by its compatible string. > > > > > > > > > + > > > > > > > > > + Clients may reuse this reserved memory if they underst= and what it is for, > > > > > > > > > + subject to the notes below. > > > > > > > > > + > > > > > > > > > +maintainers: > > > > > > > > > + - Simon Glass > > > > > > > > > + > > > > > > > > > +allOf: > > > > > > > > > + - $ref: reserved-memory.yaml > > > > > > > > > + > > > > > > > > > +properties: > > > > > > > > > + compatible: > > > > > > > > > + description: | > > > > > > > > > + This describes some common memory reservations, wi= th the compatible > > > > > > > > > + string indicating what it is used for: > > > > > > > > > + > > > > > > > > > + acpi: Advanced Configuration and Power Interfac= e (ACPI) tables > > > > > > > > > + acpi-nvs: ACPI Non-Volatile-Sleeping Memory (NV= S). This is reserved by > > > > > > > > > + the firmware for its use and is required to b= e saved and restored > > > > > > > > > + across an NVS sleep > > > > > > > > > + boot-code: Contains code used for booting which= is not needed by the OS > > > > > > > > > + boot-code: Contains data used for booting which= is not needed by the OS > > > > > > > > > + runtime-code: Contains code used for interactin= g with the system when > > > > > > > > > + running the OS > > > > > > > > > + runtime-data: Contains data used for interactin= g with the system when > > > > > > > > > + running the OS > > > > > > > > > + > > > > > > > > > + enum: > > > > > > > > > + - acpi > > > > > > > > > + - acpi-nvs > > > > > > > > > + - boot-code > > > > > > > > > + - boot-data > > > > > > > > > + - runtime-code > > > > > > > > > + - runtime-data > > > > > > > > > + > > > > > > > > > > > > > > As I mentioned a few times already, I don't think these compa= tibles > > > > > > > should be introduced here. > > > > > > > > > > > > > > A reserved region has a specific purpose, and the compatible = should be > > > > > > > more descriptive than the enum above. If the consumer does no= t > > > > > > > understand this purpose, it should simply treat the memory as= reserved > > > > > > > and not touch it. Alternatively, these regions can be referen= ced from > > > > > > > other DT nodes using phandles if needed. > > > > > > > > > > > > We still need some description of what these regions are used f= or, so > > > > > > that the payload can use the correct regions. I do not have any= other > > > > > > solution to this problem. We are in v7 at present. At least exp= lain > > > > > > where you want the compatible strings to be introduced. > > > > > > > > > > > > > > > > My point is really that by themselves, these regions are not usab= le by > > > > > either a payload or an OS that consumes this information. Unless = there > > > > > is some other information being provided (via DT I imagine) that > > > > > describes how these things are supposed to be used, they are noth= ing > > > > > more than memory reservations that should be honored, and providi= ng > > > > > this arbitrary set of labels is unnecessary. > > > > > > > > > > > What sort of extra detail are you looking for? Please be specif= ic and > > > > > > preferably add some suggestions so I can close this out ASAP. > > > > > > > > > > > > > > > > A payload or OS can do nothing with a memory reservation called > > > > > 'runtime-code' it it doesn't know what is inside. > > > > > > Agreed. The question is WHAT runtime-code? The compatible needs to an= swer that. > > > > > > For example, we have 'ramoops' as a compatible in reserved memory. > > > That tells us *exactly* what's there. We know how to parse it. If we > > > know ramoops is not supported, then we know we can toss it out and > > > reclaim the memory. > > > > So if we said: > > > > compatible =3D "runtime-code-efi" > > > > would that be OK? We seem to be in catch 22 here, because if I don't > > mention EFI unhappy, but if I do, Ard is unhappy. > > Better yes, because then it is for something specific. However, AIUI, > that's setup for the OS and defining that region is already defined by > the EFI memory map. That's Ard's issue. If there's a need outside of > the EFI to OS handoff, There is a need. Here is part of the commit message again. If there is something else you need to know, please ask. >>>> It is common to split firmware into 'Platform Init', which does the initial hardware setup and a "Payload" which selects the OS to be booted. Thus an handover interface is required between these two pieces. Where UEFI boot-time services are not available, but UEFI firmware is present on either side of this interface, information about memory usage and attributes must be presented to the "Payload" in some form. <<< > then you need to define what that usecase looks > like. Describe the problem rather than present your solution. > > If this is all specific to EDK2 then it should say that rather than > 'efi'. I imagine Ard would be happier with something tied to EDK2 than > *all* UEFI. Though maybe the problem could be any implementation? IDK. > Maybe it's TF-A that needs to define where the EFI runtime services > region is and that needs to be passed all the way thru to the EFI > implementation? So again, define the problem. It is not specific to EDK2. Imagine this boot sequence: - Platform Init (U-Boot) starts up - U-Boot uses its platform knowledge to sets some ACPI tables and put various things in memory - U-Boot sets up some runtime code and data for the OS - U-Boot jumps to the Tianocore payload ** - Payload (Tianocore) wants to know where the ACPI tables are, for example - Tianocore needs to provide boot services to the OS, so needs to know the memory map, etc. ** At this point we want to use DT to pass the required information. Of course, Platform Init could be coreboot or Tianocore or some strange private binary. Payload could be U-Boot or something else. That is the point of this effort, to build interoperability. > > > What about the boottime code....you want to know which project it is fr= om? > > I think it is the same. > > > > > + - acpi > > + - acpi-nvs > > > > Those two should be enough info, right? > > I think so. NVS is not a term I've heard in relation to ACPI, but that > may just be my limited ACPI knowledge. Perhaps it is only an Intel thing. It stands for Non-Volatile-Sleeping Memory and it has various platform settings in a binary format that is normally SoC-specific. > > > + - boot-code > > + - boot-data > > > > For these, they don't pertain to the OS, so perhaps they are OK? > > Hard to tell that just from the name... 'boot' could be any component > involved in booting including the OS. suggested that 'boot' should mean booting the OS. If the OS does lots of fixup stuff at the start of it, I don't know what that is called. So if boot-code is no good, what do you suggest? Alternatively I could remove these for now, if it will help make progress. > > > In > > any case, using a generic term like this makes some sense to me. We > > can always add a new compatible like "efi-boottime-services" later. It > > may be that the boottime services would be handled by the payload, so > > not needed in all cases. > > Why later? You have a specific use in mind and I imagine Ard has > thoughts on that. Because we don't need it right away, and just want to make some progress. Perhaps the problem here is that Linux has tied itself up in knots with its EFI stuff and DT fixups and what-not. But this is not that. It is a simple handoff between two pieces of firmware, Platform Init and Payload. It has nothing to do with the OS. With Tianocore they are typically combined, but with this usage they are split, and we can swap out one project for another on either side of the DT interface. I do have views on the 'EFI' opt-out with reserved-memory, if you are interested, but that relates to the OS. If you are wanting to place some constraints on /reserved-memory and /memory we could do that e.g. that the DT and the map returned by EFI boot services must be consistent. But as it is, the nodes are ignored by the OS when booting with EFI, aren't they? Regards, Simon