From: "Sricharan" <sricharan@codeaurora.org>
To: "'Robin Murphy'" <robin.murphy@arm.com>, <will.deacon@arm.com>,
<joro@8bytes.org>, <lorenzo.pieralisi@arm.com>,
<iommu@lists.linux-foundation.org>,
<linux-arm-kernel@lists.infradead.org>,
<linux-arm-msm@vger.kernel.org>, <m.szyprowski@samsung.com>,
<bhelgaas@google.com>, <linux-pci@vger.kernel.org>,
<linux-acpi@vger.kernel.org>, <tn@semihalf.com>,
<hanjun.guo@linaro.org>, <okaya@codeaurora.org>
Subject: RE: [PATCH V8 08/11] drivers: acpi: Handle IOMMU lookup failure with deferred probing or error
Date: Sun, 5 Feb 2017 12:21:11 +0530 [thread overview]
Message-ID: <000c01d27f7c$43593e00$ca0bba00$@codeaurora.org> (raw)
In-Reply-To: <3d32202c-4127-e808-414b-6067178f150d@arm.com>
Hi Robin,
>>
>>> -----Original Message-----
>>> From: linux-arm-kernel [mailto:linux-arm-kernel-bounces@lists.infradead.org] On Behalf Of Sricharan R
>>> Sent: Friday, February 03, 2017 9:19 PM
>>> To: robin.murphy@arm.com; will.deacon@arm.com; joro@8bytes.org; lorenzo.pieralisi@arm.com; iommu@lists.linux-
>foundation.org;
>>> linux-arm-kernel@lists.infradead.org; linux-arm-msm@vger.kernel.org; m.szyprowski@samsung.com; bhelgaas@google.com;
>linux-
>>> pci@vger.kernel.org; linux-acpi@vger.kernel.org; tn@semihalf.com; hanjun.guo@linaro.org; okaya@codeaurora.org
>>> Cc: sricharan@codeaurora.org
>>> Subject: [PATCH V8 08/11] drivers: acpi: Handle IOMMU lookup failure with deferred probing or error
>>>
>>> This is an equivalent to the DT's handling of the iommu master's probe
>>> with deferred probing when the corrsponding iommu is not probed yet.
>>> The lack of a registered IOMMU can be caused by the lack of a driver for
>>> the IOMMU, the IOMMU device probe not having been performed yet, having
>>> been deferred, or having failed.
>>>
>>> The first case occurs when the firmware describes the bus master and
>>> IOMMU topology correctly but no device driver exists for the IOMMU yet
>>> or the device driver has not been compiled in. Return NULL, the caller
>>> will configure the device without an IOMMU.
>>>
>>> The second and third cases are handled by deferring the probe of the bus
>>> master device which will eventually get reprobed after the IOMMU.
>>>
>>> The last case is currently handled by deferring the probe of the bus
>>> master device as well. A mechanism to either configure the bus master
>>> device without an IOMMU or to fail the bus master device probe depending
>>> on whether the IOMMU is optional or mandatory would be a good
>>> enhancement.
>>>
>>> Tested-by: Hanjun Guo <hanjun.guo@linaro.org>
>>> Acked-by: Lorenzo Pieralisi <lorenzo.pieralisi@arm.com>
>>> Signed-off-by: Sricharan R <sricharan@codeaurora.org>
>>> ---
>>> drivers/acpi/arm64/iort.c | 25 ++++++++++++++++++++++++-
>>> drivers/acpi/scan.c | 7 +++++--
>>> drivers/base/dma-mapping.c | 2 +-
>>> include/acpi/acpi_bus.h | 2 +-
>>> include/linux/acpi.h | 7 +++++--
>>> 5 files changed, 36 insertions(+), 7 deletions(-)
>>>
>>> diff --git a/drivers/acpi/arm64/iort.c b/drivers/acpi/arm64/iort.c
>>> index bf0ed09..d01bae8 100644
>>> --- a/drivers/acpi/arm64/iort.c
>>> +++ b/drivers/acpi/arm64/iort.c
>>> @@ -550,8 +550,17 @@ static const struct iommu_ops *iort_iommu_xlate(struct device *dev,
>>> return NULL;
>>>
>>> ops = iommu_get_instance(iort_fwnode);
>>> + /*
>>> + * If the ops look-up fails, this means that either
>>> + * the SMMU drivers have not been probed yet or that
>>> + * the SMMU drivers are not built in the kernel;
>>> + * Depending on whether the SMMU drivers are built-in
>>> + * in the kernel or not, defer the IOMMU configuration
>>> + * or just abort it.
>>> + */
>>> if (!ops)
>>> - return NULL;
>>> + return iort_iommu_driver_enabled(node->type) ?
>>> + ERR_PTR(-EPROBE_DEFER) : NULL;
>>>
>>> ret = arm_smmu_iort_xlate(dev, streamid, iort_fwnode, ops);
>>> }
>>> @@ -625,12 +634,26 @@ const struct iommu_ops *iort_iommu_configure(struct device *dev)
>>>
>>> while (parent) {
>>> ops = iort_iommu_xlate(dev, parent, streamid);
>>> + if (IS_ERR_OR_NULL(ops))
>>> + return ops;
>>>
>>> parent = iort_node_get_id(node, &streamid,
>>> IORT_IOMMU_TYPE, i++);
>>> }
>>> }
>>>
>>> + /*
>>> + * If we have reason to believe the IOMMU driver missed the initial
>>> + * add_device callback for dev, replay it to get things in order.
>>> + */
>>> + if (!IS_ERR_OR_NULL(ops) && ops->add_device &&
>>> + dev->bus && !dev->iommu_group) {
>>> + int err = ops->add_device(dev);
>>> +
>>> + if (err)
>>> + ops = ERR_PTR(err);
>>> + }
>>> +
>>
>> On the last post we discussed that the above replay hunk can be made
>> common. In trying to do that, i ended up with a patch like below. But not
>> sure if that should be a part of this series though. I tested with OF devices
>> and would have to be tested with ACPI devices once. Nothing changes
>> functionally because of this ideally. Should be split in two patches though.
>>
>> Regards,
>> Sricharan
>>
>> From aafbf2c97375a086327504f2367eaf9197c719b1 Mon Sep 17 00:00:00 2001
>> From: Sricharan R <sricharan@codeaurora.org>
>> Date: Fri, 3 Feb 2017 15:24:47 +0530
>> Subject: [PATCH] drivers: iommu: Add iommu_add_device api
>>
>> The code to call IOMMU driver's add_device is same
>> for both OF and ACPI cases. So add an api which can
>> be shared across both the places.
>>
>> Also, now with probe-deferral the iommu master devices gets
>> added to the respective iommus during probe time instead
>> of device creation time. The xlate callbacks of iommu
>> drivers are also called only at probe time. As a result
>> the add_iommu_group which gets called when the iommu is
>> registered to add all devices created before the iommu
>> becomes dummy. Similar the BUS_NOTIFY_ADD_DEVICE notification
>> also is not needed. So just cleanup those code.
>>
>> Signed-off-by: Sricharan R <sricharan@codeaurora.org>
>> ---
>> drivers/acpi/arm64/iort.c | 12 +-------
>> drivers/iommu/iommu.c | 70 ++++++++++++-----------------------------------
>> drivers/iommu/of_iommu.c | 11 +-------
>> include/linux/iommu.h | 8 ++++++
>> 4 files changed, 27 insertions(+), 74 deletions(-)
>>
>> diff --git a/drivers/acpi/arm64/iort.c b/drivers/acpi/arm64/iort.c
>> index ac45623..ab2a554 100644
>> --- a/drivers/acpi/arm64/iort.c
>> +++ b/drivers/acpi/arm64/iort.c
>> @@ -642,17 +642,7 @@ const struct iommu_ops *iort_iommu_configure(struct device *dev)
>> }
>> }
>>
>> - /*
>> - * If we have reason to believe the IOMMU driver missed the initial
>> - * add_device callback for dev, replay it to get things in order.
>> - */
>> - if (!IS_ERR_OR_NULL(ops) && ops->add_device &&
>> - dev->bus && !dev->iommu_group) {
>> - int err = ops->add_device(dev);
>> -
>> - if (err)
>> - ops = ERR_PTR(err);
>> - }
>> + ops = iommu_add_device(dev, ops);
>>
>> return ops;
>> }
>> diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c
>> index b752c3d..750552d 100644
>> --- a/drivers/iommu/iommu.c
>> +++ b/drivers/iommu/iommu.c
>> @@ -1015,41 +1015,6 @@ struct iommu_domain *iommu_group_default_domain(struct iommu_group *group)
>> return group->default_domain;
>> }
>>
>> -static int add_iommu_group(struct device *dev, void *data)
>> -{
>> - struct iommu_callback_data *cb = data;
>> - const struct iommu_ops *ops = cb->ops;
>> - int ret;
>> -
>> - if (!ops->add_device)
>> - return 0;
>> -
>> - WARN_ON(dev->iommu_group);
>> -
>> - ret = ops->add_device(dev);
>> -
>> - /*
>> - * We ignore -ENODEV errors for now, as they just mean that the
>> - * device is not translated by an IOMMU. We still care about
>> - * other errors and fail to initialize when they happen.
>> - */
>> - if (ret == -ENODEV)
>> - ret = 0;
>> -
>> - return ret;
>> -}
>> -
>> -static int remove_iommu_group(struct device *dev, void *data)
>> -{
>> - struct iommu_callback_data *cb = data;
>> - const struct iommu_ops *ops = cb->ops;
>> -
>> - if (ops->remove_device && dev->iommu_group)
>> - ops->remove_device(dev);
>> -
>> - return 0;
>> -}
>> -
>> static int iommu_bus_notifier(struct notifier_block *nb,
>> unsigned long action, void *data)
>> {
>> @@ -1059,13 +1024,10 @@ static int iommu_bus_notifier(struct notifier_block *nb,
>> unsigned long group_action = 0;
>>
>> /*
>> - * ADD/DEL call into iommu driver ops if provided, which may
>> + * DEL call into iommu driver ops if provided, which may
>> * result in ADD/DEL notifiers to group->notifier
>> */
>> - if (action == BUS_NOTIFY_ADD_DEVICE) {
>> - if (ops->add_device)
>> - return ops->add_device(dev);
>
>I'm pretty sure this completely breaks x86 and anyone else...
>
ha, i just missed thinking about non-arm, for this super cleanup :)
>Anyway, I'd be inclined to leave this alone for now - it's essentially
>just a workaround to mesh the per-instance probing behaviour with the
>per-bus ops model, so it's bound to be a bit ugly. Moving the IOMMU core
>code over to a per-instance model will inevitably subsume the underlying
>problem, and I think a bit of duplication is probably the lesser of two
>evils in the meantime. On which note, I need to have a good look at
>Joerg's shiny new series :)
>
Agree, better way for this cleanup is with the per-instance model and let
the series go otherwise.
Regards,
Sricharan
_______________________________________________
linux-arm-kernel mailing list
linux-arm-kernel@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/linux-arm-kernel
next prev parent reply other threads:[~2017-02-05 6:51 UTC|newest]
Thread overview: 40+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-03 15:48 [PATCH V8 00/11] IOMMU probe deferral support Sricharan R
2017-02-03 15:48 ` [PATCH V8 01/11] iommu/of: Refactor of_iommu_configure() for error handling Sricharan R
2017-03-08 18:58 ` Jean-Philippe Brucker
2017-03-08 19:28 ` Robin Murphy
2017-03-09 9:52 ` sricharan
2017-03-09 11:21 ` Robin Murphy
2017-02-03 15:48 ` [PATCH V8 02/11] iommu/of: Prepare for deferred IOMMU configuration Sricharan R
2017-02-03 15:48 ` [PATCH V8 03/11] of: dma: Move range size workaround to of_dma_get_range() Sricharan R
2017-02-03 15:48 ` [PATCH V8 04/11] of: dma: Make of_dma_deconfigure() public Sricharan R
2017-02-03 15:48 ` [PATCH V8 05/11] ACPI/IORT: Add function to check SMMUs drivers presence Sricharan R
2017-02-03 15:48 ` [PATCH V8 06/11] of/acpi: Configure dma operations at probe time for platform/amba/pci bus devices Sricharan R
2017-02-03 15:48 ` [PATCH V8 07/11] iommu: of: Handle IOMMU lookup failure with deferred probing or error Sricharan R
2017-05-02 18:35 ` Geert Uytterhoeven
2017-05-03 9:54 ` Robin Murphy
2017-05-03 10:24 ` Sricharan R
2017-05-03 11:13 ` Sricharan R
2017-05-05 13:23 ` Geert Uytterhoeven
2017-05-17 9:22 ` Magnus Damm
2017-05-17 10:28 ` Sricharan R
2017-05-15 14:22 ` Will Deacon
2017-05-16 2:26 ` sricharan
2017-05-15 20:37 ` Laurent Pinchart
2017-05-15 21:34 ` Laurent Pinchart
2017-05-16 2:23 ` sricharan
2017-05-16 7:17 ` Laurent Pinchart
2017-05-16 9:47 ` Sakari Ailus
2017-05-16 13:40 ` sricharan
2017-05-16 14:06 ` Laurent Pinchart
2017-05-16 14:04 ` Robin Murphy
2017-05-16 14:10 ` Laurent Pinchart
2017-05-16 14:29 ` sricharan
2017-05-16 14:46 ` Laurent Pinchart
2017-05-16 14:52 ` Robin Murphy
2017-02-03 15:48 ` [PATCH V8 08/11] drivers: acpi: " Sricharan R
2017-02-03 16:15 ` Sricharan
2017-02-03 17:39 ` Robin Murphy
2017-02-05 6:51 ` Sricharan [this message]
2017-02-03 15:48 ` [PATCH V8 09/11] arm64: dma-mapping: Remove the notifier trick to handle early setting of dma_ops Sricharan R
2017-02-03 15:48 ` [PATCH V8 10/11] iommu/arm-smmu: Clean up early-probing workarounds Sricharan R
2017-02-03 15:48 ` [PATCH V8 11/11] ACPI/IORT: Remove linker section for IORT entries probing Sricharan R
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to='000c01d27f7c$43593e00$ca0bba00$@codeaurora.org' \
--to=sricharan@codeaurora.org \
--cc=bhelgaas@google.com \
--cc=hanjun.guo@linaro.org \
--cc=iommu@lists.linux-foundation.org \
--cc=joro@8bytes.org \
--cc=linux-acpi@vger.kernel.org \
--cc=linux-arm-kernel@lists.infradead.org \
--cc=linux-arm-msm@vger.kernel.org \
--cc=linux-pci@vger.kernel.org \
--cc=lorenzo.pieralisi@arm.com \
--cc=m.szyprowski@samsung.com \
--cc=okaya@codeaurora.org \
--cc=robin.murphy@arm.com \
--cc=tn@semihalf.com \
--cc=will.deacon@arm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).