Received: by 2002:a05:7412:419a:b0:f3:1519:9f41 with SMTP id i26csp858653rdh; Thu, 23 Nov 2023 22:39:23 -0800 (PST) X-Google-Smtp-Source: AGHT+IHCGJBXIVlMZsdavZ8Kop6YeB4E9bLYbbZfHAD1/ZikLTbGIbGfoRkA1tUtEM2hyszyuHuC X-Received: by 2002:a05:6358:1082:b0:16b:70e4:8665 with SMTP id j2-20020a056358108200b0016b70e48665mr1459532rwi.15.1700807963434; Thu, 23 Nov 2023 22:39:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700807963; cv=none; d=google.com; s=arc-20160816; b=yaTypuWMzCVRZiD38o6DApvKoFeFhLcTaON9Y8XxSUk74e9J741PFSgUiu79Nku3tw +EMj3bODKS1fc0wl8VsdAFzkDmjm+kFs2ikpCcsYlNFa40R3btF45pDguKCRneU6Z9ym 23757Nc/E9c04fWc4YY+vJsgtesQLhC4j39FNV56b0DesKw1sfpk/WmQFgSn5/Mg9axD pFB/80gtwxvgVIUs057DHV3Jr9enfnRLPmAeM9CeSCbkFtIt015RVImjtLT0YEYe8D4R V3AzUtkUpV7oFxOz6B89ugL4kCaxrENQIkUtHz7ja6wagFjkBWpN5uv8J5rm8uwTQx/L AGzQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=XJfK9r4difAVXV2U8xd6TIUL/J9MDrHGpJaRZDcJCwI=; fh=sMel+Zbk5GsPVU20XG7g9y0Vs7og2qFK7xnwUyRPnu8=; b=kj9x4NuD9zEq9l1PdLJ5CpctT6m4ZzXSYt9pLfdqfYFFzHjVJMMszlNX2COCDbE663 87T6cOPKU5bhfbVRzMqObF5FZIRC+GCqSomSZ8kl13LGAWjudLr/LYXHLJPnVHNq/KQl lfDcqW1za+U+cICtj01JLWovlTfYq3zRlWtj6hXxzzLNCUguGi9zgtwZH0rUs4ZAq9kl kJ3oCrvpKbGfNlSPvq3jfW0Ne10QBk631utjO4Y1e2qDOrdfQXPAsEkM6xty4ADRxhS4 Kyllv/dlCyEGEYKuSp4xrCd1LWgOFZIfoZbwi2AIPQvUxDo6ssLNoHguob0kbgDhROUj /aGQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=h0fdekOx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Return-Path: Received: from snail.vger.email (snail.vger.email. [2620:137:e000::3:7]) by mx.google.com with ESMTPS id k6-20020a6568c6000000b005b93eb7d322si2925545pgt.481.2023.11.23.22.39.23 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 23 Nov 2023 22:39:23 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) client-ip=2620:137:e000::3:7; Authentication-Results: mx.google.com; dkim=pass header.i=@quicinc.com header.s=qcppdkim1 header.b=h0fdekOx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:7 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=quicinc.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by snail.vger.email (Postfix) with ESMTP id D3907802C6B2; Thu, 23 Nov 2023 22:39:21 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at snail.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229705AbjKXGjK (ORCPT + 99 others); Fri, 24 Nov 2023 01:39:10 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:50826 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229453AbjKXGjJ (ORCPT ); Fri, 24 Nov 2023 01:39:09 -0500 Received: from mx0b-0031df01.pphosted.com (mx0b-0031df01.pphosted.com [205.220.180.131]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1935FD46; Thu, 23 Nov 2023 22:39:15 -0800 (PST) Received: from pps.filterd (m0279870.ppops.net [127.0.0.1]) by mx0a-0031df01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 3AO5IuF2010656; Fri, 24 Nov 2023 06:39:09 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=quicinc.com; h=message-id : date : mime-version : subject : to : cc : references : from : in-reply-to : content-type : content-transfer-encoding; s=qcppdkim1; bh=XJfK9r4difAVXV2U8xd6TIUL/J9MDrHGpJaRZDcJCwI=; b=h0fdekOxqWrWsryVRzqxaaHAQbLQjrwxHHlkirtJc59pqArq9WjoC4Vou5OLdRI3tJnX eWXLumG5capce5VZlagy3M0IH5VNCr8I7Ld+ukz8Zw7BlTWobW7viWs7jI2DFkIkBADu OUytbTh+kL0U/pT7UvJaB8u9SU2oTTb4HGZYKOSwova8fLkdjfQVDe+qyoeQ3iYsMPly pBgMEiGFFgrNOxzYvxCOA+ub3GNDBwJKzL6f/3xIrJ15Th5bkVq/QIVP5xEuVsoXsagr BfAveWxBo+FbBHsoWzZq3W/GETbe3tqrsw58UP/2dbI9NH69QFU21VqUETG5GMf5c4VM XQ== Received: from nasanppmta04.qualcomm.com (i-global254.qualcomm.com [199.106.103.254]) by mx0a-0031df01.pphosted.com (PPS) with ESMTPS id 3uj4hwhw4x-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 24 Nov 2023 06:39:09 +0000 Received: from nasanex01a.na.qualcomm.com (nasanex01a.na.qualcomm.com [10.52.223.231]) by NASANPPMTA04.qualcomm.com (8.17.1.5/8.17.1.5) with ESMTPS id 3AO6d8Su006461 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Fri, 24 Nov 2023 06:39:08 GMT Received: from [10.216.35.253] (10.80.80.8) by nasanex01a.na.qualcomm.com (10.52.223.231) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Thu, 23 Nov 2023 22:39:02 -0800 Message-ID: Date: Fri, 24 Nov 2023 12:08:59 +0530 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.13.0 Subject: Re: [PATCH v2 2/3] arm64: dts: qcom: sc7280: Move video-firmware to chrome-common Content-Language: en-US To: Luca Weiss , Stanimir Varbanov , Bryan O'Donoghue , Andy Gross , Bjorn Andersson , Konrad Dybcio , Mauro Carvalho Chehab , , Rob Herring , Krzysztof Kozlowski , Conor Dooley CC: <~postmarketos/upstreaming@lists.sr.ht>, , , , , References: <20231002-sc7280-venus-pas-v2-0-bd2408891317@fairphone.com> <20231002-sc7280-venus-pas-v2-2-bd2408891317@fairphone.com> <4cfad910-1821-3a31-c372-3f6b199e8f71@quicinc.com> From: Vikash Garodia In-Reply-To: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [10.80.80.8] X-ClientProxiedBy: nasanex01b.na.qualcomm.com (10.46.141.250) To nasanex01a.na.qualcomm.com (10.52.223.231) X-QCInternal: smtphost X-Proofpoint-Virus-Version: vendor=nai engine=6200 definitions=5800 signatures=585085 X-Proofpoint-GUID: _2PehKUl5y5-OQPPRjcBhX25pqjQpTVO X-Proofpoint-ORIG-GUID: _2PehKUl5y5-OQPPRjcBhX25pqjQpTVO X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.987,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2023-11-23_15,2023-11-22_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 impostorscore=0 malwarescore=0 priorityscore=1501 bulkscore=0 mlxscore=0 mlxlogscore=999 suspectscore=0 phishscore=0 spamscore=0 lowpriorityscore=0 clxscore=1015 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311060000 definitions=main-2311240049 X-Spam-Status: No, score=-3.8 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,NICE_REPLY_A, RCVD_IN_DNSWL_BLOCKED,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE, URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (snail.vger.email [0.0.0.0]); Thu, 23 Nov 2023 22:39:22 -0800 (PST) On 11/22/2023 7:50 PM, Luca Weiss wrote: > On Wed Nov 22, 2023 at 2:17 PM CET, Vikash Garodia wrote: >> >> On 10/2/2023 7:50 PM, Luca Weiss wrote: >>> If the video-firmware node is present, the venus driver assumes we're on >>> a system that doesn't use TZ for starting venus, like on ChromeOS >>> devices. >>> >>> Move the video-firmware node to chrome-common.dtsi so we can use venus >>> on a non-ChromeOS devices. >>> >>> At the same time also disable the venus node by default in the dtsi, >>> like it's done on other SoCs. >>> >>> Reviewed-by: Bryan O'Donoghue >>> Signed-off-by: Luca Weiss >>> --- >>> arch/arm64/boot/dts/qcom/sc7280-chrome-common.dtsi | 8 ++++++++ >>> arch/arm64/boot/dts/qcom/sc7280.dtsi | 6 ++---- >>> 2 files changed, 10 insertions(+), 4 deletions(-) >>> >>> diff --git a/arch/arm64/boot/dts/qcom/sc7280-chrome-common.dtsi b/arch/arm64/boot/dts/qcom/sc7280-chrome-common.dtsi >>> index 5d462ae14ba1..cd491e46666d 100644 >>> --- a/arch/arm64/boot/dts/qcom/sc7280-chrome-common.dtsi >>> +++ b/arch/arm64/boot/dts/qcom/sc7280-chrome-common.dtsi >>> @@ -104,6 +104,14 @@ &scm { >>> dma-coherent; >>> }; >>> >>> +&venus { >>> + status = "okay"; >>> + >>> + video-firmware { >>> + iommus = <&apps_smmu 0x21a2 0x0>; >>> + }; >>> +}; >>> + >>> &watchdog { >>> status = "okay"; >>> }; >>> diff --git a/arch/arm64/boot/dts/qcom/sc7280.dtsi b/arch/arm64/boot/dts/qcom/sc7280.dtsi >>> index 66f1eb83cca7..fa53f54d4675 100644 >>> --- a/arch/arm64/boot/dts/qcom/sc7280.dtsi >>> +++ b/arch/arm64/boot/dts/qcom/sc7280.dtsi >>> @@ -3740,6 +3740,8 @@ venus: video-codec@aa00000 { >>> <&apps_smmu 0x2184 0x20>; 0x2184 is a secure SID. I think qcm6490-fairphone-fp5.dts needs to override the iommus property as well to retain only the non secure SID i.e 0x2180 ? I am seeing below crash Call trace: [ 47.663593] qcom_smmu_write_s2cr+0x64/0xa4 [ 47.663616] arm_smmu_attach_dev+0x120/0x284 [ 47.663647] __iommu_attach_device+0x24/0xf8 [ 47.676845] __iommu_device_set_domain+0x70/0xd0 [ 47.681632] __iommu_group_set_domain_internal+0x60/0x1b4 [ 47.687218] iommu_setup_default_domain+0x358/0x418 [ 47.692258] __iommu_probe_device+0x3e4/0x404 Could you please reconfirm if Video SID 0x2184 (and mask) is allowed by the qcm6490-fairphone-fp5 hardware having TZ ? >>> memory-region = <&video_mem>; >>> >>> + status = "disabled"; >>> + >>> video-decoder { >>> compatible = "venus-decoder"; >>> }; >>> @@ -3748,10 +3750,6 @@ video-encoder { >>> compatible = "venus-encoder"; >>> }; >>> >>> - video-firmware { >>> - iommus = <&apps_smmu 0x21a2 0x0>; >>> - }; >>> - >>> venus_opp_table: opp-table { >>> compatible = "operating-points-v2"; >>> >>> >> Changes look good. Is this tested on SC7280 ? > > Hi Vikash, > > I didn't test it myself on sc7280 (just qcm6490-fp5) but dtx_diff > reports no differences except for status = okay property being added, so > there should be no change on those boards. See below. > > Regards > Luca I tested on SC7280 (herobrine) and all good. Regards, Vikash