Received: by 2002:ad5:4acb:0:0:0:0:0 with SMTP id n11csp766513imw; Thu, 14 Jul 2022 10:21:17 -0700 (PDT) X-Google-Smtp-Source: AGRyM1vWNGodz0Agol1f64DznyOT5BsjHEb+Z+y/jLmwzM2Nr+uhi6y3IM4WNrT647r500zbx6t3 X-Received: by 2002:a05:6a00:1ad2:b0:52a:c5b4:f851 with SMTP id f18-20020a056a001ad200b0052ac5b4f851mr9364151pfv.50.1657819277546; Thu, 14 Jul 2022 10:21:17 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1657819277; cv=none; d=google.com; s=arc-20160816; b=qnB6W2RyZQlGVqIU1Aa3botduM3UXbr5eXs9Ggqf7h/hMJX4u9zsWTQSU3m1Tpvp97 Nx+a+bWLVMabGbwK9GNElW8Gnh8YKXmla9ur8SPaGsv50noqhk+K6OEUv7IFpwZ67uxH tM9W3bh+DCSfPhoUbn8ON17+M1IOhqNVyLUEn1u+wTq3O59HHR7AhjpF1FhcvP82nbLS tO+YWL4tM5OdjaqckbPJdpo1PPwE9zKKSFk2yVi/yyZbI3cTrLgIVtXF03Bml4pNTrEv 1VuBRd5mp2f3pK+LxFSTSwKWDK/wNmwuTUYwVlQ59gOZoU+QcneIRkZWLv7cjMKLdahh PNrg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=nU0WVVbdgEc789G5a6s5LocA0QeCbC2E3DQ5sHk48Y8=; b=0LAciuM3ZbdbKgZ8DXbDvFdFx4QWPzbUTvhE476i3t+at1O47NTXgMc6J/teDMDYC8 nsedbVqamdMu1UroV2oaa7zAsRndEGakh+NRz9FRF8QCKu1BPJU1ehWYE2h8quwSKsBc 75nlYXgEbp47K9lXbs1ZEBNdaytX3btxg4k7DKoHL2Now9FFWRTaWvLYXx+GrEVOfJjC 9xzwpxdj7LwTUewYHw8XEZ+WV+z2il5d1EboU8SDMrDJl8MfSeFtBN9y9U9E7wqYuGo6 D2r68jt3hvqwqoP1IO4ScRsYE9YcmYSvCk36qrtV2X9N/OhAehRKi2N4pQm8LAf6i0JQ Zafw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=IYzHDmH6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id rm9-20020a17090b3ec900b001efbb3cfc8fsi2936424pjb.120.2022.07.14.10.21.02; Thu, 14 Jul 2022 10:21:17 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@linaro.org header.s=google header.b=IYzHDmH6; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linaro.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238874AbiGNQ4V (ORCPT + 99 others); Thu, 14 Jul 2022 12:56:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:57158 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239839AbiGNQ4D (ORCPT ); Thu, 14 Jul 2022 12:56:03 -0400 Received: from mail-wr1-x430.google.com (mail-wr1-x430.google.com [IPv6:2a00:1450:4864:20::430]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 8B9BE54CBD for ; Thu, 14 Jul 2022 09:56:01 -0700 (PDT) Received: by mail-wr1-x430.google.com with SMTP id z12so3369261wrq.7 for ; Thu, 14 Jul 2022 09:56:01 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=nU0WVVbdgEc789G5a6s5LocA0QeCbC2E3DQ5sHk48Y8=; b=IYzHDmH6TgdKlf033EfO1Bg7jNq4Zm8uLryO7o6yzv6Ii23qReYyoXEWZNdJN4wNBz 91CunxhQuK2D4gOwqIQIPlvaMskTJn7ZqteC4EL4/6gPBvpJkKZAGc3wGrtaJG9IxL1a CB6noJky+hMahbL7giTw4QO2UCSHzu3CTOHUm7EF2V1L2UClKHK+r40pTMyRCWXgwEcC +5R7j+/v2Xc3nW2EhkvgoQgVYu7cXbbRPBdQJqhy0NF2Ua1NcIxp2VMipbNQTsSp1Lfy 2DWAETiTz1VZ9n+vIBEjZlwLH54b4etHBnO4sCojLtvP+erRugR8wUTqVr8wd9Mi967+ yWTA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=nU0WVVbdgEc789G5a6s5LocA0QeCbC2E3DQ5sHk48Y8=; b=XKjGTbGRsRJpvwIeEgddSwBa9RJbh3Zbi4ArKwq09El/Vbo6VOVik84yHQ71No/HUl m2McEw4wJa3kkB/TcMP2nWSGbmHP5MheDmyIs3SgM44l6UR9UB2ARK6m/8r1l6OpPPdA n3L6KAcBIjNdIt08nzehqeWKnJWq3OR4HyqCrLT+jbySWS2puJr7i7AAr0EMu318D/oZ Ja7KpSKT3PClBHtw727ZfALgdIs2Pthwd53wowy082idmAk/FFf13UmzNk4dV8fv4ZJC erpNdSyatx5FiEfI82jZ4D2y1rLclhv7ZLJa6PBWxq8+1vGbI/0Y4RWU3pwd+25ZBHDT ZLlA== X-Gm-Message-State: AJIora+hu/T9EkMZ6sAuaEQPtYS7cSiYyd/Kkv+o5fNg7zxPRQ0dpgUW CXlsqSBFt4QyCBmvFXqtDqOx1Q== X-Received: by 2002:a5d:6da3:0:b0:21d:cde7:cb7 with SMTP id u3-20020a5d6da3000000b0021dcde70cb7mr227704wrs.683.1657817760912; Thu, 14 Jul 2022 09:56:00 -0700 (PDT) Received: from localhost ([31.134.121.151]) by smtp.gmail.com with ESMTPSA id l29-20020a05600c1d1d00b003a2e27fc275sm2797092wms.12.2022.07.14.09.56.00 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 14 Jul 2022 09:56:00 -0700 (PDT) From: Sam Protsenko To: Marek Szyprowski , Krzysztof Kozlowski Cc: Joerg Roedel , Will Deacon , Robin Murphy , Janghyuck Kim , Cho KyongHo , Daniel Mentz , David Virag , Sumit Semwal , iommu@lists.linux.dev, linux-arm-kernel@lists.infradead.org, linux-samsung-soc@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v3 6/6] iommu/exynos: Enable default VM instance on SysMMU v7 Date: Thu, 14 Jul 2022 19:55:50 +0300 Message-Id: <20220714165550.8884-7-semen.protsenko@linaro.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20220714165550.8884-1-semen.protsenko@linaro.org> References: <20220714165550.8884-1-semen.protsenko@linaro.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org In order to enable SysMMU v7 with VM register layout, at least the default VM instance (n=0) must be enabled, in addition to enabling the SysMMU itself. To do so, add corresponding write to MMU_CTRL_VM[0] register, before writing to MMU_CTRL register. Signed-off-by: Sam Protsenko Acked-by: Marek Szyprowski --- Changes in v3: - Reworked for using plain writel() - Added Marek's Acked-by tag Changes in v2: - Extracted VM enabling code to the separate function - Used new SysMMU read/write functions to access the registers drivers/iommu/exynos-iommu.c | 16 ++++++++++++++++ 1 file changed, 16 insertions(+) diff --git a/drivers/iommu/exynos-iommu.c b/drivers/iommu/exynos-iommu.c index fc9ef3ff0057..8e18984a0c4f 100644 --- a/drivers/iommu/exynos-iommu.c +++ b/drivers/iommu/exynos-iommu.c @@ -135,6 +135,8 @@ static u32 lv2ent_offset(sysmmu_iova_t iova) #define CFG_SYSSEL (1 << 22) /* System MMU 3.2 only */ #define CFG_FLPDCACHE (1 << 20) /* System MMU 3.2+ only */ +#define CTRL_VM_ENABLE BIT(0) +#define CTRL_VM_FAULT_MODE_STALL BIT(3) #define CAPA0_CAPA1_EXIST BIT(11) #define CAPA1_VCR_ENABLED BIT(14) @@ -163,6 +165,7 @@ static u32 lv2ent_offset(sysmmu_iova_t iova) /* v7.x registers */ #define REG_V7_CAPA0 0x870 #define REG_V7_CAPA1 0x874 +#define REG_V7_CTRL_VM 0x8000 #define has_sysmmu(dev) (dev_iommu_priv_get(dev) != NULL) @@ -548,6 +551,18 @@ static void __sysmmu_init_config(struct sysmmu_drvdata *data) writel(cfg, data->sfrbase + REG_MMU_CFG); } +static void __sysmmu_enable_vid(struct sysmmu_drvdata *data) +{ + u32 ctrl; + + if (MMU_MAJ_VER(data->version) < 7 || !data->has_vcr) + return; + + ctrl = readl(data->sfrbase + REG_V7_CTRL_VM); + ctrl |= CTRL_VM_ENABLE | CTRL_VM_FAULT_MODE_STALL; + writel(ctrl, data->sfrbase + REG_V7_CTRL_VM); +} + static void __sysmmu_enable(struct sysmmu_drvdata *data) { unsigned long flags; @@ -558,6 +573,7 @@ static void __sysmmu_enable(struct sysmmu_drvdata *data) writel(CTRL_BLOCK, data->sfrbase + REG_MMU_CTRL); __sysmmu_init_config(data); __sysmmu_set_ptbase(data, data->pgtable); + __sysmmu_enable_vid(data); writel(CTRL_ENABLE, data->sfrbase + REG_MMU_CTRL); data->active = true; spin_unlock_irqrestore(&data->lock, flags); -- 2.30.2