Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp747356imw; Thu, 14 Jul 2022 10:04:02 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vk8WvaHlRQzXKh7/x0JhKfFlIEdPO2CxCV1HRmb3teEca2A3tgmslzgvjw8V8hvXRnDdkO X-Received: by 2002:a17:907:60d4:b0:722:e603:cb40 with SMTP id hv20-20020a17090760d400b00722e603cb40mr9962769ejc.272.1657818242412; Thu, 14 Jul 2022 10:04:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657818242; cv=none; d=google.com; s=arc-20160816; b=HLGHGTXdt2jQfEWzQP/b87KggbewgzZEZhCogsCb/Wevg3VavAUjt/iPDhNzZiKSbc rRQJwgb5c2vApwz0HKBLGhYtz+RDODNH+L8SsQm8XMgYqFEQ+h/jc0Dby8LGfyUlhspR 061gEngvBItmd/DfUnXuqb74PdJbsq6U8kforsa5LmIrAdvDZSxxDst1SuCjbAnaXM9v zXrFG5v8r2+teOB/qN7iAbGcqYoUBkBdPYzj5s77UwuahDQaDde+uBsRvJq+Yse9uohs 4DJEmLD/cTVq2WqOu2ncxMMT8gMu+vEGlarfwyj3znc9v6hl2eJaM5T3+DvCNleA7v2G pelQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IZpjZAr4g1dpDBXrOrcfUkHPeUERh/JliRxp06JVucg=; b=LOMu+MA2ve85cQOoWZhko9MMjf7OOJtRiYminhrGCiZRkPTiGeaqfRLQvJVNsFyuf5 95HsQmY4YAZmWG5wpC1WJXG0fnzJIykSg1ysIWsDc7EkLN/FWuc3bU+m8aFC1swq558c /p6e7Sw/tt/P9r/6/Pcrxns6Up7VVgkUwQtTjQP1sRDJgB1GpdydjE8pn8Ozr3uJWnl7 XKYNBLVUPVRZ+UcO/zscxRHtxMQzKuEO166q/BBa0/IkdgRQINUbu9z7Vw3HaBsx7wTL rNSdLq6GpiRX/cg41Fd3WiGNWsc9ef6l+3WbfLFIr+3U6RwHqxql0NuT0sCdWpgrzveC SMTg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="W+Cm9cW/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w6-20020a056402070600b0043a4f6a0127si2547015edx.105.2022.07.14.10.03.35; Thu, 14 Jul 2022 10:04:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b="W+Cm9cW/"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S240148AbiGNQ4M (ORCPT + 99 others); Thu, 14 Jul 2022 12:56:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56932 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239150AbiGNQz6 (ORCPT ); Thu, 14 Jul 2022 12:55:58 -0400 Received: from mail-wm1-x335.google.com (mail-wm1-x335.google.com [IPv6:2a00:1450:4864:20::335]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id C735852FE0 for ; Thu, 14 Jul 2022 09:55:57 -0700 (PDT) Received: by mail-wm1-x335.google.com with SMTP id h14-20020a1ccc0e000000b0039eff745c53so1565682wmb.5 for ; Thu, 14 Jul 2022 09:55:57 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=IZpjZAr4g1dpDBXrOrcfUkHPeUERh/JliRxp06JVucg=; b=W+Cm9cW/KqhsoUWLtK5lM2En6frOk3DnHTnfxJ1rLk8V1Yy7iqDT/XaD3KJvZtRB2s +wI1V2J9RGVol7di4+23oo12YHUhRPKldPKSV9YjJ5yjRhjrP2WaAN5WBs0dNPgnNpad HuJTHxC2yiT+rhVjRowuYazf0MbDsgo69VCsIM7HubxLF7kelLSkr0esfPhTrUxEUoAj qUDA/f2J+d74jP7aA8vMRl/XbZaIPTTn4CP/4jHqkfLZl09qcxuI9UEK/0ESchYUL1Bo wEKWTz5GNh1u+XnfmJpCtUYZJu5ERLefGE8Eh3Pylxz82X29Qo84Fi4d8pzdT2NYw5FK AGwA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=IZpjZAr4g1dpDBXrOrcfUkHPeUERh/JliRxp06JVucg=; b=kXPpuJ6iON6RyUXmvc/N+Cp1gtp5AlV3TeLqtxuSKVTN9GgZNnZI/d2YyCOMopPBUk dCLEqTY1z5OJeVEPrBAMj5Cp8+fn0CDvTAgtGSmfsu0bMRBS0fD/ElTW9oEh5GqmVO2v nR/IFgyMrpAPsp5svpvmEja+LdRrQGLc7G4g2kou9z/UXhJmYAPFc49YXjKxBwqdks3x bZWmu51N2dC+wcBgPsjL84NSslBm4e+tB/fGhMCl4RZawanMG+oFXpb8zwS43B0gJNmr gI7gmuT3yyZJXKZnzSnH1eiJWyC/S4ni4AqQsf/UHON9Yqrn8OcgeCSUM+Aeq4os+SJL 2HzQ== X-Gm-Message-State: AJIora+L7g54jdfrrpglwNGJcRMS0osStD+XvpEIcWWd9UkJ+3RXtFJ3 1mLLhklQ1hVlxsRNNKvsHU8kpQ== X-Received: by 2002:a05:600c:1e87:b0:3a2:fd16:5934 with SMTP id be7-20020a05600c1e8700b003a2fd165934mr9028538wmb.25.1657817756378; Thu, 14 Jul 2022 09:55:56 -0700 (PDT) Received: from localhost ([31.134.121.151]) by smtp.gmail.com with ESMTPSA id l13-20020a05600c2ccd00b003a2f2bb72d5sm5516033wmc.45.2022.07.14.09.55.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Jul 2022 09:55:55 -0700 (PDT) From: Sam Protsenko To: Marek Szyprowski , Krzysztof Kozlowski Cc: Joerg Roedel , Will Deacon , Robin Murphy , Janghyuck Kim , Cho KyongHo , Daniel Mentz , David Virag , Sumit Semwal , iommu@lists.linux.dev, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 3/6] iommu/exynos: Set correct dma mask for SysMMU v5+ Date: Thu, 14 Jul 2022 19:55:47 +0300 Message-Id: <20220714165550.8884-4-semen.protsenko@linaro.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220714165550.8884-1-semen.protsenko@linaro.org> References: <20220714165550.8884-1-semen.protsenko@linaro.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org SysMMU v5+ supports 36 bit physical address space. Set corresponding DMA mask to avoid falling back to SWTLBIO usage in dma_map_single() because of failed dma_capable() check. The original code for this fix was suggested by Marek. Signed-off-by: Sam Protsenko Co-developed-by: Marek Szyprowski Signed-off-by: Marek Szyprowski Acked-by: Krzysztof Kozlowski --- Changes in v3: - Added Krzysztof's Acked-by tag Changes in v2: - Handled failed dma_set_mask() call - Replaced "Originally-by" tag by "Co-developed-by" + SoB tags drivers/iommu/exynos-iommu.c | 10 ++++++++++ 1 file changed, 10 insertions(+) diff --git a/drivers/iommu/exynos-iommu.c b/drivers/iommu/exynos-iommu.c index c85db9dab851..494f7d7aa9c5 100644 --- a/drivers/iommu/exynos-iommu.c +++ b/drivers/iommu/exynos-iommu.c @@ -646,6 +646,14 @@ static int exynos_sysmmu_probe(struct platform_device *pdev) } } + if (MMU_MAJ_VER(data->version) >= 5) { + ret = dma_set_mask(dev, DMA_BIT_MASK(36)); + if (ret) { + dev_err(dev, "Unable to set DMA mask: %d\n", ret); + goto err_dma_set_mask; + } + } + /* * use the first registered sysmmu device for performing * dma mapping operations on iommu page tables (cpu cache flush) @@ -657,6 +665,8 @@ static int exynos_sysmmu_probe(struct platform_device *pdev) return 0; +err_dma_set_mask: + iommu_device_unregister(&data->iommu); err_iommu_register: iommu_device_sysfs_remove(&data->iommu); return ret; -- 2.30.2