Received: by 10.223.185.116 with SMTP id b49csp8465703wrg; Fri, 2 Mar 2018 02:12:57 -0800 (PST) X-Google-Smtp-Source: AG47ELtk9NpFxwIJ1axmpFGY940v5Y6PcY7BqSksde0tf14gHncku4npkL+MGUWm+dTIliQWsXGZ X-Received: by 10.99.165.71 with SMTP id r7mr4199639pgu.60.1519985577200; Fri, 02 Mar 2018 02:12:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519985577; cv=none; d=google.com; s=arc-20160816; b=YXz64PhEUMtJM6HAEXFHPS+B0iNAuYmbfkMoCBtEsZweopEnojzetgnuwoD71I5mVr uF62o3NlQPgXuTlMcSPyBy1MLQOwfT0J/LRkJdRmaBK+K4J68Tlj1PH0RjHIAXZ8donG F044Q08HTODY/TxlJkqvQlaeNnB3E8kpnGI967S2SfdPZhcvJW5L30gGLWO+qGqnc7l/ 8DLFXSHzZGv5y6fSD6FVmO6w7D18TS2mn5HObP6rXiWOAHaNNg8rShdW9hiDVE+6kGnE 4KD13T9mG+MlsaoCpFut2cYH3iDVCLKN/C/77uI+y0RrViZN4jW/Nw0F5pKL+JZPmTZr CXDw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:dmarc-filter:dkim-signature:dkim-signature :arc-authentication-results; bh=khK8jwDpjlsfs41q+00SrZrcBq6FSRJQIOZ8sDuyt9w=; b=MfhW+IyoRQlfJxILmTAnkhUZO2ZWBhoftn122A6pWdCEfIZ0ZT+2JCNVwbhup9Mud0 GsccTfstW6XberDEhCk4dIXkqQb3Wd/Ze0tZ/ZvC6EaTi1b4l4nS18+KbjED0JRUzvH8 eEisCYsyrkucuI0jtWnRrMbVvDx3Q/c13LHQl6hmBKfUlcThXWqgEP30Vo1hAGlz2mzS ncGhdRdKq4lkzurdDJ+EhtfS00oBacEVkLsbruA77rn7r0jNb7rftVTokJvtn4BmFh8r HVAzQTL0G0ojgtKghs8rll4pfoOh/m215i50BOeKBjBNLXvl6zm/iblAfh5bvf5dSbVN AYeg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=cEKdqL3A; dkim=pass header.i=@codeaurora.org header.s=default header.b=N4tn94jx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id m16si3779898pgn.290.2018.03.02.02.12.42; Fri, 02 Mar 2018 02:12:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@codeaurora.org header.s=default header.b=cEKdqL3A; dkim=pass header.i=@codeaurora.org header.s=default header.b=N4tn94jx; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1426237AbeCBKL0 (ORCPT + 99 others); Fri, 2 Mar 2018 05:11:26 -0500 Received: from smtp.codeaurora.org ([198.145.29.96]:46928 "EHLO smtp.codeaurora.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1426224AbeCBKLU (ORCPT ); Fri, 2 Mar 2018 05:11:20 -0500 Received: by smtp.codeaurora.org (Postfix, from userid 1000) id B48AC6074C; Fri, 2 Mar 2018 10:11:19 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1519985479; bh=Tm1vg9amY0vXe3hsi35XDevCO3/k2lFKTL34QHn9cNY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=cEKdqL3AHuMEa13H/rv77PahiM/8UE44Zij0YJbozIkYM4szcxLz+8p5fZl90DtSc gn0yHqX4ww6XEwltExiP8NIdrAONBEWXJWa/0NYNqEnOoNBkTBoc5Q/N8+DLea6ofJ H061X87/1i6OwU72I+u+PQv4DxiJg4hijEy1N9GI= X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on pdx-caf-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.8 required=2.0 tests=ALL_TRUSTED,BAYES_00, DKIM_SIGNED,T_DKIM_INVALID autolearn=no autolearn_force=no version=3.4.0 Received: from blr-ubuntu-41.ap.qualcomm.com (blr-bdr-fw-01_globalnat_allzones-outside.qualcomm.com [103.229.18.19]) (using TLSv1.1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) (Authenticated sender: vivek.gautam@smtp.codeaurora.org) by smtp.codeaurora.org (Postfix) with ESMTPSA id 3D46260316; Fri, 2 Mar 2018 10:11:13 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=codeaurora.org; s=default; t=1519985477; bh=Tm1vg9amY0vXe3hsi35XDevCO3/k2lFKTL34QHn9cNY=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=N4tn94jxvi044NLscub/e6AskSj55ce2kIlEZXQQixgygXnAHNguVsEsq8WaaVale +z8yMQW/vvLdRwDItM3YUjY/hjGddL9H+bKt/71mbAxliv45rTrhKMd0ApuvlLRMo7 EfBPc0tpT8DyqzR3Dr1eC0zWzuIJ+AKKPwCsMy4c= DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org 3D46260316 Authentication-Results: pdx-caf-mail.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: pdx-caf-mail.web.codeaurora.org; spf=none smtp.mailfrom=vivek.gautam@codeaurora.org From: Vivek Gautam To: joro@8bytes.org, robh+dt@kernel.org, mark.rutland@arm.com, rjw@rjwysocki.net, robin.murphy@arm.com, will.deacon@arm.com, robdclark@gmail.com, iommu@lists.linux-foundation.org, devicetree@vger.kernel.org, linux-kernel@vger.kernel.org Cc: tfiga@chromium.org, jcrouse@codeaurora.org, sboyd@codeaurora.org, sricharan@codeaurora.org, m.szyprowski@samsung.com, architt@codeaurora.org, linux-arm-msm@vger.kernel.org, vivek.gautam@codeaurora.org Subject: [PATCH v8 3/5] iommu/arm-smmu: Invoke pm_runtime during probe, add/remove device Date: Fri, 2 Mar 2018 15:40:48 +0530 Message-Id: <20180302101050.6191-4-vivek.gautam@codeaurora.org> X-Mailer: git-send-email 2.16.1.72.g5be1f00a9a70 In-Reply-To: <20180302101050.6191-1-vivek.gautam@codeaurora.org> References: <20180302101050.6191-1-vivek.gautam@codeaurora.org> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Sricharan R The smmu device probe/remove and add/remove master device callbacks gets called when the smmu is not linked to its master, that is without the context of the master device. So calling runtime apis in those places separately. Signed-off-by: Sricharan R [vivek: Cleanup pm runtime calls] Signed-off-by: Vivek Gautam --- drivers/iommu/arm-smmu.c | 96 ++++++++++++++++++++++++++++++++++++++++++++---- 1 file changed, 88 insertions(+), 8 deletions(-) diff --git a/drivers/iommu/arm-smmu.c b/drivers/iommu/arm-smmu.c index c8b16f53f597..3d6a1875431f 100644 --- a/drivers/iommu/arm-smmu.c +++ b/drivers/iommu/arm-smmu.c @@ -209,6 +209,8 @@ struct arm_smmu_device { struct clk_bulk_data *clks; int num_clks; + bool rpm_supported; + u32 cavium_id_base; /* Specific to Cavium */ spinlock_t global_sync_lock; @@ -268,6 +270,20 @@ static struct arm_smmu_option_prop arm_smmu_options[] = { { 0, NULL}, }; +static inline int arm_smmu_rpm_get(struct arm_smmu_device *smmu) +{ + if (smmu->rpm_supported) + return pm_runtime_get_sync(smmu->dev); + + return 0; +} + +static inline void arm_smmu_rpm_put(struct arm_smmu_device *smmu) +{ + if (smmu->rpm_supported) + pm_runtime_put(smmu->dev); +} + static struct arm_smmu_domain *to_smmu_domain(struct iommu_domain *dom) { return container_of(dom, struct arm_smmu_domain, domain); @@ -913,11 +929,15 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain) struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); struct arm_smmu_device *smmu = smmu_domain->smmu; struct arm_smmu_cfg *cfg = &smmu_domain->cfg; - int irq; + int ret, irq; if (!smmu || domain->type == IOMMU_DOMAIN_IDENTITY) return; + ret = arm_smmu_rpm_get(smmu); + if (ret < 0) + return; + /* * Disable the context bank and free the page tables before freeing * it. @@ -932,6 +952,8 @@ static void arm_smmu_destroy_domain_context(struct iommu_domain *domain) free_io_pgtable_ops(smmu_domain->pgtbl_ops); __arm_smmu_free_bitmap(smmu->context_map, cfg->cbndx); + + arm_smmu_rpm_put(smmu); } static struct iommu_domain *arm_smmu_domain_alloc(unsigned type) @@ -1213,10 +1235,15 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) return -ENODEV; smmu = fwspec_smmu(fwspec); + + ret = arm_smmu_rpm_get(smmu); + if (ret < 0) + return ret; + /* Ensure that the domain is finalised */ ret = arm_smmu_init_domain_context(domain, smmu); if (ret < 0) - return ret; + goto rpm_put; /* * Sanity check the domain. We don't support domains across @@ -1231,10 +1258,17 @@ static int arm_smmu_attach_dev(struct iommu_domain *domain, struct device *dev) } /* Looks ok, so add the device to the domain */ - return arm_smmu_domain_add_master(smmu_domain, fwspec); + ret = arm_smmu_domain_add_master(smmu_domain, fwspec); + + arm_smmu_rpm_put(smmu); + + return ret; destroy_domain: arm_smmu_destroy_domain_context(domain); +rpm_put: + arm_smmu_rpm_put(smmu); + return ret; } @@ -1242,22 +1276,36 @@ static int arm_smmu_map(struct iommu_domain *domain, unsigned long iova, phys_addr_t paddr, size_t size, int prot) { struct io_pgtable_ops *ops = to_smmu_domain(domain)->pgtbl_ops; + struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); + struct arm_smmu_device *smmu = smmu_domain->smmu; + int ret; if (!ops) return -ENODEV; - return ops->map(ops, iova, paddr, size, prot); + arm_smmu_rpm_get(smmu); + ret = ops->map(ops, iova, paddr, size, prot); + arm_smmu_rpm_put(smmu); + + return ret; } static size_t arm_smmu_unmap(struct iommu_domain *domain, unsigned long iova, size_t size) { struct io_pgtable_ops *ops = to_smmu_domain(domain)->pgtbl_ops; + struct arm_smmu_domain *smmu_domain = to_smmu_domain(domain); + struct arm_smmu_device *smmu = smmu_domain->smmu; + size_t ret; if (!ops) return 0; - return ops->unmap(ops, iova, size); + arm_smmu_rpm_get(smmu); + ret = ops->unmap(ops, iova, size); + arm_smmu_rpm_put(smmu); + + return ret; } static void arm_smmu_iotlb_sync(struct iommu_domain *domain) @@ -1412,14 +1460,22 @@ static int arm_smmu_add_device(struct device *dev) while (i--) cfg->smendx[i] = INVALID_SMENDX; + ret = arm_smmu_rpm_get(smmu); + if (ret < 0) + goto out_cfg_free; + ret = arm_smmu_master_alloc_smes(dev); if (ret) - goto out_cfg_free; + goto out_rpm_put; iommu_device_link(&smmu->iommu, dev); + arm_smmu_rpm_put(smmu); + return 0; +out_rpm_put: + arm_smmu_rpm_put(smmu); out_cfg_free: kfree(cfg); out_free: @@ -1432,7 +1488,7 @@ static void arm_smmu_remove_device(struct device *dev) struct iommu_fwspec *fwspec = dev->iommu_fwspec; struct arm_smmu_master_cfg *cfg; struct arm_smmu_device *smmu; - + int ret; if (!fwspec || fwspec->ops != &arm_smmu_ops) return; @@ -1440,8 +1496,15 @@ static void arm_smmu_remove_device(struct device *dev) cfg = fwspec->iommu_priv; smmu = cfg->smmu; + ret = arm_smmu_rpm_get(smmu); + if (ret < 0) + return; + iommu_device_unlink(&smmu->iommu, dev); arm_smmu_master_free_smes(fwspec); + + arm_smmu_rpm_put(smmu); + iommu_group_remove_device(dev); kfree(fwspec->iommu_priv); iommu_fwspec_free(dev); @@ -1907,6 +1970,7 @@ struct arm_smmu_match_data { enum arm_smmu_implementation model; const char * const *clks; int num_clks; + bool rpm_supported; }; #define ARM_SMMU_MATCH_DATA(name, ver, imp) \ @@ -2029,6 +2093,7 @@ static int arm_smmu_device_dt_probe(struct platform_device *pdev, smmu->version = data->version; smmu->model = data->model; smmu->num_clks = data->num_clks; + smmu->rpm_supported = data->rpm_supported; arm_smmu_fill_clk_data(smmu, data->clks); @@ -2129,6 +2194,8 @@ static int arm_smmu_device_probe(struct platform_device *pdev) smmu->irqs[i] = irq; } + platform_set_drvdata(pdev, smmu); + err = devm_clk_bulk_get(smmu->dev, smmu->num_clks, smmu->clks); if (err) return err; @@ -2137,6 +2204,13 @@ static int arm_smmu_device_probe(struct platform_device *pdev) if (err) return err; + if (smmu->rpm_supported) + pm_runtime_enable(dev); + + err = arm_smmu_rpm_get(smmu); + if (err < 0) + return err; + err = arm_smmu_device_cfg_probe(smmu); if (err) return err; @@ -2178,10 +2252,11 @@ static int arm_smmu_device_probe(struct platform_device *pdev) return err; } - platform_set_drvdata(pdev, smmu); arm_smmu_device_reset(smmu); arm_smmu_test_smr_masks(smmu); + arm_smmu_rpm_put(smmu); + /* * For ACPI and generic DT bindings, an SMMU will be probed before * any device which might need it, so we want the bus ops in place @@ -2217,9 +2292,14 @@ static int arm_smmu_device_remove(struct platform_device *pdev) if (!bitmap_empty(smmu->context_map, ARM_SMMU_MAX_CBS)) dev_err(&pdev->dev, "removing device with active domains!\n"); + arm_smmu_rpm_get(smmu); /* Turn the thing off */ writel(sCR0_CLIENTPD, ARM_SMMU_GR0_NS(smmu) + ARM_SMMU_GR0_sCR0); + arm_smmu_rpm_put(smmu); + if (smmu->rpm_supported) + pm_runtime_disable(smmu->dev); + clk_bulk_unprepare(smmu->num_clks, smmu->clks); return 0; -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation