Re: [PATCH 06/11] firmware: qcom-shm-bridge: new driver
From: Bartosz Golaszewski
Date: Wed Aug 30 2023 - 15:05:49 EST
On Tue, 29 Aug 2023 at 18:47, Krzysztof Kozlowski
<krzysztof.kozlowski@xxxxxxxxxx> wrote:
>
> On 29/08/2023 15:24, Bartosz Golaszewski wrote:
> >>> +phys_addr_t qcom_shm_bridge_to_phys_addr(void *vaddr)
> >>> +{
> >>> + struct qcom_shm_bridge_chunk *chunk;
> >>> + struct qcom_shm_bridge_pool *pool;
> >>> +
> >>> + guard(spinlock_irqsave)(&qcom_shm_bridge_chunks_lock);
> >>> +
> >>> + chunk = radix_tree_lookup(&qcom_shm_bridge_chunks,
> >>> + (unsigned long)vaddr);
> >>> + if (!chunk)
> >>> + return 0;
> >>> +
> >>> + pool = chunk->parent;
> >>> +
> >>> + guard(spinlock_irqsave)(&pool->lock);
> >>
> >> Why both locks are spinlocks? The locks are used quite a lot.
> >
> > I'm not sure what to answer. The first one protects the global chunk
> > mapping stored in the radix tree. The second one protects a single
> > memory pool from concurrent access. Both can be modified from any
> > context, hence spinlocks.
>
> Not much PREEMPT friendly, although indeed protected code is small. At
> least here, I did not check other places.
>
> >
> >>
> >>> +
> >>> + return gen_pool_virt_to_phys(pool->genpool, (unsigned long)vaddr);
> >>> +}
> >>> +EXPORT_SYMBOL_GPL(qcom_shm_bridge_to_phys_addr);
> >>> +
> >>> +static int qcom_shm_bridge_probe(struct platform_device *pdev)
> >>> +{
> >>> + struct qcom_shm_bridge_pool *default_pool;
> >>> + struct device *dev = &pdev->dev;
> >>> + int ret;
> >>> +
> >>> + /*
> >>> + * We need to wait for the SCM device to be created and bound to the
> >>> + * SCM driver.
> >>> + */
> >>> + if (!qcom_scm_is_available())
> >>> + return -EPROBE_DEFER;
> >>
> >> I think we miss here (and in all other drivers) device links to qcm.
> >>
> >
> > Well, SCM, once probed, cannot be unbound. What would device links
> > guarantee above that?
>
> Runtime PM, probe ordering (dependencies) detection.
>
Shouldn't we cross that bridge when we get there? SCM has no support
for runtime PM. Probe ordering is quite well handled with a simple
probe deferral. This is also not a parent-child relationship. SHM
Bridge calls into the trustzone using SCM, but SCM is also a user of
SHM Bridge.
> >
> >>> +
> >>> + ret = qcom_scm_enable_shm_bridge();
> >>> + if (ret)
> >>> + return dev_err_probe(dev, ret,
> >>> + "Failed to enable the SHM bridge\n");
> >>> +
> >>> + default_pool = qcom_shm_bridge_pool_new_for_dev(
> >>> + dev, qcom_shm_bridge_default_pool_size);
> >>> + if (IS_ERR(default_pool))
> >>> + return dev_err_probe(dev, PTR_ERR(default_pool),
> >>> + "Failed to create the default SHM Bridge pool\n");
> >>> +
> >>> + WRITE_ONCE(qcom_shm_bridge_default_pool, default_pool);
> >>> +
> >>> + return 0;
> >>> +}
> >>> +
> >>> +static const struct of_device_id qcom_shm_bridge_of_match[] = {
> >>> + { .compatible = "qcom,shm-bridge", },
> >>> + { }
> >>> +};
> >>> +
> >>> +static struct platform_driver qcom_shm_bridge_driver = {
> >>> + .driver = {
> >>> + .name = "qcom-shm-bridge",
> >>> + .of_match_table = qcom_shm_bridge_of_match,
> >>> + /*
> >>> + * Once enabled, the SHM Bridge feature cannot be disabled so
> >>> + * there's no reason to ever unbind the driver.
> >>> + */
> >>> + .suppress_bind_attrs = true,
> >>> + },
> >>> + .probe = qcom_shm_bridge_probe,
> >>> +};
> >>> +
> >>> +static int __init qcom_shm_bridge_init(void)
> >>> +{
> >>> + return platform_driver_register(&qcom_shm_bridge_driver);
> >>> +}
> >>> +subsys_initcall(qcom_shm_bridge_init);
> >>
> >> Why this is part of subsystem? Should be rather device_initcall... or
> >> simply module (and a tristate).
> >>
> >
> > We want it to get up as soon as possible (right after SCM, because SCM
> > is the first user).
>
> Then probably should be populated/spawned by SCM.
>
I really prefer probe deferral over one platform driver creating
platform devices for another. The device is on the DT, let's let OF
populate it as it should.
Bart