From: Will Deacon <will.deacon@arm.com>
To: Arnd Bergmann <arnd@arndb.de>
Cc: "jroedel@suse.de" <jroedel@suse.de>,
"iommu@lists.linux-foundation.org"
<iommu@lists.linux-foundation.org>,
"thierry.reding@gmail.com" <thierry.reding@gmail.com>,
"laurent.pinchart@ideasonboard.com"
<laurent.pinchart@ideasonboard.com>,
"Varun.Sethi@freescale.com" <Varun.Sethi@freescale.com>,
"m.szyprowski@samsung.com" <m.szyprowski@samsung.com>,
"dwmw2@infradead.org" <dwmw2@infradead.org>,
"linux-arm-kernel@lists.infradead.org"
<linux-arm-kernel@lists.infradead.org>,
"hdoyu@nvidia.com" <hdoyu@nvidia.com>
Subject: Re: [RFC PATCH v2 4/7] iommu: provide helper function to configure an IOMMU for an of master
Date: Thu, 4 Sep 2014 12:26:25 +0100 [thread overview]
Message-ID: <20140904112625.GE7156@arm.com> (raw)
In-Reply-To: <5768908.PeRFksrdyQ@wuerfel>
Hi Arnd,
Thanks for the review.
On Tue, Sep 02, 2014 at 08:10:10PM +0100, Arnd Bergmann wrote:
> On Tuesday 02 September 2014 18:56:24 Will Deacon wrote:
> > +struct iommu_dma_mapping *of_iommu_configure(struct device *dev)
> > +{
> > + struct of_phandle_args iommu_spec;
> > + struct iommu_dma_mapping *mapping;
> > + struct bus_type *bus = dev->bus;
> > + const struct iommu_ops *ops = bus->iommu_ops;
>
> I think it would be best to not even introduce the tight coupling
> between bus_type and iommu_ops here, one of the main reasons we
> are doing this is to break that connection.
>
> Better put the iommu_ops into the iommu_data pointer that gets looked
> up per iommu device.
Yes, I'll add that. It's a bit weird, because those same ops will later
be duplicated in iommu_data->domain->ops, but that's an artifact of how
the domain is currently constructed by iommu_domain_alloc.
> > + struct iommu_data *iommu = NULL;
> > + int idx = 0;
> > +
> > + if (!iommu_present(bus) || !ops->of_xlate)
> > + return NULL;
> > +
> > + /*
> > + * We don't currently walk up the tree looking for a parent IOMMU.
> > + * See the `Notes:' section of
> > + * Documentation/devicetree/bindings/iommu/iommu.txt
> > + */
> > + */
> > + while (!of_parse_phandle_with_args(dev->of_node, "iommus",
> > + "#iommu-cells", idx,
> > + &iommu_spec)) {
> > + struct device_node *np = iommu_spec.np;
> > + struct iommu_data *data = of_iommu_get_data(np);
> > +
> > + if (!iommu) {
> > + if (!ops->of_xlate(dev, &iommu_spec))
> > + iommu = data;
>
> I would make the first argument of the of_xlate function the iommu_data,
> so the code can find the right instance.
Oops, that's what I intended. Well spotted.
> Maybe also add an extra argument at the end that can be used by the
> PCI code and potentially other drivers with multiple master IDs
> behind one "iommus" property to pass some value identifying which of
> the masters is meant.
>
> The format of that is unfortunately bus specific and our platform_bus
> really covers a number of different hardware buses (AXI, AHB, OPB, ...)
> but the caller should be able to provide the data in the right form
> that the iommu understands. I would try using a single u64 argument
> as a start, hoping that this covers all the buses we need. At least
> it's enough for PCI (bus/device/function) and for AXI (requester-id?).
Yeah, I think that will work. It's kind of like a device `index' for a
device that sits behind a bridge (trying to avoid yet another ID parameter
:).
>
> > + } else if (iommu != data) {
> > + pr_warn("Rejecting device %s with multiple IOMMU instances\n",
> > + dev_name(dev));
> > + iommu = NULL;
> > + }
> > +
> > + of_node_put(np);
> > +
> > + if (!iommu)
> > + break;
> > +
> > + idx++;
> > + }
> > +
> > + if (!iommu)
> > + return NULL;
> > +
> > + mapping = devm_kzalloc(dev, sizeof(*mapping), GFP_KERNEL);
> > + if (!mapping)
> > + return NULL;
> >
>
> I don't think it's safe to use devm_* functions here: this is during
> device discovery, and this data will be freed if probe() fails or
> the device gets removed from a driver.
So I can make this a standard kzalloc, but I have no idea where the
corresponding kfree should live. Is there something equivalent to
of_dma_unconfigure, or is this data that is expected to persist?
Will
WARNING: multiple messages have this Message-ID (diff)
From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: [RFC PATCH v2 4/7] iommu: provide helper function to configure an IOMMU for an of master
Date: Thu, 4 Sep 2014 12:26:25 +0100 [thread overview]
Message-ID: <20140904112625.GE7156@arm.com> (raw)
In-Reply-To: <5768908.PeRFksrdyQ@wuerfel>
Hi Arnd,
Thanks for the review.
On Tue, Sep 02, 2014 at 08:10:10PM +0100, Arnd Bergmann wrote:
> On Tuesday 02 September 2014 18:56:24 Will Deacon wrote:
> > +struct iommu_dma_mapping *of_iommu_configure(struct device *dev)
> > +{
> > + struct of_phandle_args iommu_spec;
> > + struct iommu_dma_mapping *mapping;
> > + struct bus_type *bus = dev->bus;
> > + const struct iommu_ops *ops = bus->iommu_ops;
>
> I think it would be best to not even introduce the tight coupling
> between bus_type and iommu_ops here, one of the main reasons we
> are doing this is to break that connection.
>
> Better put the iommu_ops into the iommu_data pointer that gets looked
> up per iommu device.
Yes, I'll add that. It's a bit weird, because those same ops will later
be duplicated in iommu_data->domain->ops, but that's an artifact of how
the domain is currently constructed by iommu_domain_alloc.
> > + struct iommu_data *iommu = NULL;
> > + int idx = 0;
> > +
> > + if (!iommu_present(bus) || !ops->of_xlate)
> > + return NULL;
> > +
> > + /*
> > + * We don't currently walk up the tree looking for a parent IOMMU.
> > + * See the `Notes:' section of
> > + * Documentation/devicetree/bindings/iommu/iommu.txt
> > + */
> > + */
> > + while (!of_parse_phandle_with_args(dev->of_node, "iommus",
> > + "#iommu-cells", idx,
> > + &iommu_spec)) {
> > + struct device_node *np = iommu_spec.np;
> > + struct iommu_data *data = of_iommu_get_data(np);
> > +
> > + if (!iommu) {
> > + if (!ops->of_xlate(dev, &iommu_spec))
> > + iommu = data;
>
> I would make the first argument of the of_xlate function the iommu_data,
> so the code can find the right instance.
Oops, that's what I intended. Well spotted.
> Maybe also add an extra argument at the end that can be used by the
> PCI code and potentially other drivers with multiple master IDs
> behind one "iommus" property to pass some value identifying which of
> the masters is meant.
>
> The format of that is unfortunately bus specific and our platform_bus
> really covers a number of different hardware buses (AXI, AHB, OPB, ...)
> but the caller should be able to provide the data in the right form
> that the iommu understands. I would try using a single u64 argument
> as a start, hoping that this covers all the buses we need. At least
> it's enough for PCI (bus/device/function) and for AXI (requester-id?).
Yeah, I think that will work. It's kind of like a device `index' for a
device that sits behind a bridge (trying to avoid yet another ID parameter
:).
>
> > + } else if (iommu != data) {
> > + pr_warn("Rejecting device %s with multiple IOMMU instances\n",
> > + dev_name(dev));
> > + iommu = NULL;
> > + }
> > +
> > + of_node_put(np);
> > +
> > + if (!iommu)
> > + break;
> > +
> > + idx++;
> > + }
> > +
> > + if (!iommu)
> > + return NULL;
> > +
> > + mapping = devm_kzalloc(dev, sizeof(*mapping), GFP_KERNEL);
> > + if (!mapping)
> > + return NULL;
> >
>
> I don't think it's safe to use devm_* functions here: this is during
> device discovery, and this data will be freed if probe() fails or
> the device gets removed from a driver.
So I can make this a standard kzalloc, but I have no idea where the
corresponding kfree should live. Is there something equivalent to
of_dma_unconfigure, or is this data that is expected to persist?
Will
next prev parent reply other threads:[~2014-09-04 11:26 UTC|newest]
Thread overview: 48+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-09-02 17:56 [RFC PATCH v2 0/7] Introduce automatic DMA configuration for IOMMU masters Will Deacon
2014-09-02 17:56 ` Will Deacon
[not found] ` <1409680587-29818-1-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2014-09-02 17:56 ` [RFC PATCH v2 1/7] iommu: provide early initialisation hook for IOMMU drivers Will Deacon
2014-09-02 17:56 ` Will Deacon
[not found] ` <1409680587-29818-2-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2014-09-10 11:29 ` Marek Szyprowski
2014-09-10 11:29 ` Marek Szyprowski
2014-09-02 17:56 ` [RFC PATCH v2 2/7] dma-mapping: replace set_arch_dma_coherent_ops with arch_setup_dma_ops Will Deacon
2014-09-02 17:56 ` Will Deacon
2014-09-05 15:37 ` Grygorii Strashko
2014-09-05 15:37 ` Grygorii Strashko
[not found] ` <5409D8C5.9010804-l0cyMroinI0@public.gmane.org>
2014-09-08 10:31 ` Will Deacon
2014-09-08 10:31 ` Will Deacon
[not found] ` <20140908103129.GC26030-5wv7dgnIgG8@public.gmane.org>
2014-09-09 14:15 ` Grygorii Strashko
2014-09-09 14:15 ` Grygorii Strashko
2014-09-02 17:56 ` [RFC PATCH v2 3/7] iommu: add new iommu_ops callback for adding an OF device Will Deacon
2014-09-02 17:56 ` Will Deacon
[not found] ` <1409680587-29818-4-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2014-09-10 11:16 ` Marek Szyprowski
2014-09-10 11:16 ` Marek Szyprowski
[not found] ` <541032F6.1090809-Sze3O3UU22JBDgjK7y7TUQ@public.gmane.org>
2014-09-10 11:22 ` Will Deacon
2014-09-10 11:22 ` Will Deacon
[not found] ` <20140910112213.GH28488-5wv7dgnIgG8@public.gmane.org>
2014-09-10 11:33 ` Will Deacon
2014-09-10 11:33 ` Will Deacon
2014-09-02 17:56 ` [RFC PATCH v2 4/7] iommu: provide helper function to configure an IOMMU for an of master Will Deacon
2014-09-02 17:56 ` Will Deacon
[not found] ` <1409680587-29818-5-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2014-09-02 19:10 ` Arnd Bergmann
2014-09-02 19:10 ` Arnd Bergmann
2014-09-04 11:26 ` Will Deacon [this message]
2014-09-04 11:26 ` Will Deacon
2014-09-04 11:59 ` Arnd Bergmann
2014-09-04 11:59 ` Arnd Bergmann
2014-09-04 12:28 ` Will Deacon
2014-09-04 12:28 ` Will Deacon
2014-09-10 13:01 ` Laurent Pinchart
2014-09-10 13:01 ` Laurent Pinchart
2014-09-10 13:06 ` Will Deacon
2014-09-10 13:06 ` Will Deacon
2014-09-02 17:56 ` [RFC PATCH v2 5/7] dma-mapping: detect and configure IOMMU in of_dma_configure Will Deacon
2014-09-02 17:56 ` Will Deacon
2014-09-02 17:56 ` [RFC PATCH v2 6/7] arm: call iommu_init before of_platform_populate Will Deacon
2014-09-02 17:56 ` Will Deacon
[not found] ` <1409680587-29818-7-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2014-09-02 18:13 ` Arnd Bergmann
2014-09-02 18:13 ` Arnd Bergmann
2014-09-02 17:56 ` [RFC PATCH v2 7/7] arm: dma-mapping: plumb our iommu mapping ops into arch_setup_dma_ops Will Deacon
2014-09-02 17:56 ` Will Deacon
[not found] ` <1409680587-29818-8-git-send-email-will.deacon-5wv7dgnIgG8@public.gmane.org>
2014-09-02 18:14 ` Arnd Bergmann
2014-09-02 18:14 ` Arnd Bergmann
2014-09-02 19:11 ` [RFC PATCH v2 0/7] Introduce automatic DMA configuration for IOMMU masters Arnd Bergmann
2014-09-02 19:11 ` Arnd Bergmann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20140904112625.GE7156@arm.com \
--to=will.deacon@arm.com \
--cc=Varun.Sethi@freescale.com \
--cc=arnd@arndb.de \
--cc=dwmw2@infradead.org \
--cc=hdoyu@nvidia.com \
--cc=iommu@lists.linux-foundation.org \
--cc=jroedel@suse.de \
--cc=laurent.pinchart@ideasonboard.com \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=m.szyprowski@samsung.com \
--cc=thierry.reding@gmail.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.