On Fri, Jan 10, 2020 at 08:56:39PM -0800, Saravana Kannan wrote: > Hi Thierry, > > I happened upon this thread while looking into another thread [1]. > > > From: Thierry Reding <treding@xxxxxxxxxx> > > > > On some platforms, the firmware will setup hardware to read from a given > > region of memory. One such example is a display controller that is > > scanning out a splash screen from physical memory. > > > > During Linux' boot process, the ARM SMMU will configure all contexts to > > fault by default. This means that memory accesses that happen by an SMMU > > master before its driver has had a chance to properly set up the IOMMU > > will cause a fault. This is especially annoying for something like the > > display controller scanning out a splash screen because the faults will > > result in the display controller getting bogus data (all-ones on Tegra) > > and since it repeatedly scans that framebuffer, it will keep triggering > > such faults and spam the boot log with them. > > While I'm not an expert on IOMMUs, I have a decent high level > understanding of the problem you are trying to solve. > > > In order to work around such problems, scan the device tree for IOMMU > > masters and set up a special identity domain that will map 1:1 all of > > the reserved regions associated with them. This happens before the SMMU > > is enabled, so that the mappings are already set up before translations > > begin. > > I'm not sure if this RFC will solve the splash screen issue across SoCs > ([1] seems to have a different issue and might not have memory-regions). Looking at the proposed patches, they look like they're solving a different, although related, problem. In your case you seem to have a bootloader that already sets up the SMMU to translate for a given master. The case that I'm trying to solve here is where the bootloader has not yet setup the SMMU but has instead pointed some device to read memory from a physical address. So what this patch is trying to solve is to create the mappings that a given device needs in order to transparently keep scanning out from an address region that it's using, even when the kernel enables address translation. In the case where you're trying to inherit the bootloader configuration of the SMMU, how do you solve the problem of passing the page tables to the kernel? You must have some way of reserving that memory in order to prevent the kernel from reusing it. > > One thing that was pointed out earlier, and which I don't have a good > > idea on how to solve it, is that the early identity domain is not > > discarded. The assumption is that the standard direct mappings code of > > the IOMMU framework will replace the early identity domain once devices > > are properly attached to domains, but we don't have a good point in time > > when it would be safe to remove the early identity domain. > > You are in luck! I added sync_state() driver callbacks [2] exactly for > cases like this. Heck, I even listed IOMMUs as an example use case. :) > sync_state() works even with modules if one enables of_devlink [3] kernel > parameter (which already supports iommus DT bindings). I'd be happy to > answer any question you have on sync_state() and of_devlink. I wasn't aware of of_devlink, but I like it! It does have the drawback that you need to reimplement a lot of the (phandle, specifier) parsing code, but I don't think anybody was ever able to solve anyway. Looking at struct supplier_bindings, I think it might be possible to share the property parsing code with the subsystems, though. But I digress... Regarding sync_state(), I'm not sure it would be useful in my case. One of the drivers I'm dealing with, for example, is a composite driver that is created by tying together multiple devices. In that setup, all of the devices will have to be probed before the component device is initialized. It's only at that point where the SMMU mapping is established, so releasing the mapping in ->sync_state() would be too early. One other thing I'm curious about with sync_state() is how do you handle the case where a consumer requires, say, a given regulator to supply a certain voltage. What if that voltage is different from what's currently configured? According to the documentation, ->sync_state() is the point at which the provider driver will match the configuration to consumer requests. How do you communicate to the consumer that they aren't yet getting the configuration that they're asking for? I suppose the example might be somewhat contrived. Presumably any devices sharing a regulator would have to be compatible in terms of their input voltages, so maybe this can't ever happen? One case that I could imagine might happen, though, is if a device is probed and the driver wants to enable the regulator. But if the regulator is disabled on boot, isn't the regulator then going to be kept powered off until ->sync_state()? If so, will the regulator_enable() call still succeed? If yes, doesn't that mean that the consumer device may malfunction because it's not actually powered on after the driver has requested so? > > One option that I can think of would be to create an early identity > > domain for each master and inherit it when that master is attached to > > the domain later on, but that seems rather complicated from an book- > > keeping point of view and tricky because we need to be careful not to > > map regions twice, etc. > > > > Any good ideas on how to solve this? It'd also be interesting to see if > > there's a more generic way of doing this. I know that something like > > this isn't necessary on earlier Tegra SoCs with the custom Tegra SMMU > > because translations are only enabled when the devices are attached to a > > domain. > > Good foresight. As [1] shows, identity mapping doesn't solve it in a > generic way. I think your [1] is a special case of identity mappings where the mappings are already active. If you pass the information about the mappings via memory-region properties, then you should be able to reconstruct the identity mapping in the kernel before switching the SMMU over to the new mapping for a seamless transition. > How about actually reading the current settings/mappings and just > inheriting that instead of always doing a 1:1 identity mapping? And then > those "inherited" mappings can be dropped when you get a sync_state(). > What's wrong with that option? Reading the current mappings should also work. You still need to ensure that the in-memory page tables for the mappings are properly protected so that nobody can overwrite them. In that case, however, you may also want to pass those page tables into the kernel so that the mappings can be extended, otherwise you'll be stuck with an IOMMU domain that you can't modify. I can see some potential pitfalls with that. What, for example, if the bootloader has chosen to use a different page table format than what the kernel wants to use? In order to inherit the mappings, you'd have to do some fairly complication conversions in order for this to work. One major downside with inheriting the mappings from the bootloader is that you assume that the bootloader has already set up any mappings. None of the setups that I'm working on does that. So even if you can solve mapping inheritance in a generic way, it doesn't mean that it can be used on all platforms. You'll always have the case where you need to create the mappings from scratch to 1:1 map the physical addresses that hardware might be accessing. Thierry > > Cheers, > Saravana > > [1] https://lore.kernel.org/linux-arm-msm/20200108091641.GA15147@willie-the-truck/ > [2] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/driver-api/driver-model/driver.rst#n172 > [3] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/Documentation/admin-guide/kernel-parameters.txt#n3239
Attachment:
signature.asc
Description: PGP signature