From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753031Ab3KSVkB (ORCPT ); Tue, 19 Nov 2013 16:40:01 -0500 Received: from avon.wwwdotorg.org ([70.85.31.133]:45688 "EHLO avon.wwwdotorg.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752228Ab3KSVj7 (ORCPT ); Tue, 19 Nov 2013 16:39:59 -0500 Message-ID: <528BDAAA.4000203@wwwdotorg.org> Date: Tue, 19 Nov 2013 14:39:54 -0700 From: Stephen Warren User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: Hiroshi Doyu , swarren@nvidia.com, will.deacon@arm.com, grant.likely@linaro.org, thierry.reding@gmail.com, galak@codeaurora.org CC: mark.rutland@arm.com, devicetree@vger.kernel.org, iommu@lists.linux-foundation.org, linux-tegra@vger.kernel.org, linux-arm-kernel@lists.infradead.org, lorenzo.pieralisi@arm.com, linux-kernel@vger.kernel.org Subject: Re: [PATCHv5 4/9] iommu/tegra: smmu: register device to iommu dynamically References: <1384853593-32202-1-git-send-email-hdoyu@nvidia.com> <1384853593-32202-5-git-send-email-hdoyu@nvidia.com> In-Reply-To: <1384853593-32202-5-git-send-email-hdoyu@nvidia.com> X-Enigmail-Version: 1.5.2 Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/19/2013 02:33 AM, Hiroshi Doyu wrote: > platform_devices are registered as IOMMU'able dynamically via > add_device() and remove_device(). > > Tegra SMMU can have multiple address spaces(AS). IOMMU'able devices > can belong to one of them. Multiple IOVA maps are created at boot-up, > which can be attached to devices later. We reserve 2 of them for > static assignment, AS[0] for system default, AS[1] for AHB clusters as > protected domain from others, where there are many traditional > pheripheral devices like USB, SD/MMC. They should be isolated from > some smart devices like host1x for system robustness. Even if smart > devices behaves wrongly, the traditional devices(SD/MMC, USB) wouldn't > be affected, and the system could continue most likely. DMA API(ARM) > needs ARM_DMA_USE_IOMMU to be enabled. > diff --git a/drivers/iommu/tegra-smmu.c b/drivers/iommu/tegra-smmu.c > +static int smmu_iommu_add_device(struct device *dev) > +{ > + int err = -EPROBE_DEFER; > + u32 swgroups = dev->platform_data; > + struct dma_iommu_mapping *map = NULL; > + > + if (test_bit(TEGRA_SWGROUP_PPCS, swgroups)) > + map = smmu_handle->map[SYSTEM_PROTECTED]; > + else > + map = smmu_handle->map[SYSTEM_DEFAULT]; > + > + if (map) > + err = arm_iommu_attach_device(dev, map); > + else > + return -EPROBE_DEFER; Given that patch 2 exists, if this test fails, then surely the appropriate error code is some fatal error, not -EPROBE_DEFER; any deferrals should have happened long before this point.