From: lorenzo.pieralisi@arm.com (Lorenzo Pieralisi)
To: linux-arm-kernel@lists.infradead.org
Subject: [RFCv2 2/2] iommu/arm-smmu-v3:Enable ACPI based HiSilicon erratum 161010801
Date: Thu, 8 Jun 2017 09:48:51 +0100 [thread overview]
Message-ID: <20170608084851.GA8607@red-moon> (raw)
In-Reply-To: <5FC3163CFD30C246ABAA99954A238FA838362082@FRAEML521-MBX.china.huawei.com>
On Tue, Jun 06, 2017 at 03:01:36PM +0000, Shameerali Kolothum Thodi wrote:
[...]
> > > + irq_dom = pci_msi_get_device_domain(to_pci_dev(dev));
> > > + if (irq_dom) {
> > > + int ret;
> > > + u32 rid;
> > > +
> > > + rid = pci_msi_domain_get_msi_rid(irq_dom,
> > to_pci_dev(dev));
> > > + ret = iort_dev_find_its_base(dev, rid, 0, &base);
> >
> > Well, here we use ITS id 0 which is fine as long as code in IORT uses the same
> > policy for getting the irq_domain (ie we want to reserve the ITS address
> > space that is actually used by the device to send IRQs not a a different one) it
> > is just a heads-up because I find this confusing.
>
> Ok. Just to make it clear, 0 is the index into the ITS identifier
> list. I noted that iort_get_device_domain() uses index 0 while
> retrieving the ITS identifier. May be use the same approach here as
> well? ie, remove the index from function call?
>
> I am not sure, how we can get the index info though theoretically It
> is possible for the ITS group node having multiple ITSs.
Actually I think it would make sense to reserve ALL ITS regions a device
may be mapped to instead of just index 0 (ie in your case it is
equivalent); this leaves us some leeway as to choose which ITS the
device will be actually mapped to and this code does not have to care.
Lorenzo
>
> > > + if (!ret) {
> > > + dev_info(dev, "SMMUv3:HW MSI resv addr
> > 0x%pa\n", &base);
> > > + region = iommu_alloc_resv_region(base, SZ_128K,
> > > + prot,
> > IOMMU_RESV_MSI);
> > > + return region;
> > > + }
> > > + }
> > > +
> > > + return NULL;
> > > +}
> > > +#else
> > > +static struct iommu_resv_region *arm_smmu_acpi_alloc_hw_msi(struct
> > > +device *dev) {
> > > + return NULL;
> > > +}
> > > +#endif
> > > +
> > > static int arm_smmu_add_device(struct device *dev) {
> > > int i, ret;
> > > @@ -1903,11 +1936,20 @@ static int arm_smmu_of_xlate(struct device
> > > *dev, struct of_phandle_args *args) static void
> > arm_smmu_get_resv_regions(struct device *dev,
> > > struct list_head *head)
> > > {
> > > - struct iommu_resv_region *region;
> > > + struct iommu_fwspec *fwspec = dev->iommu_fwspec;
> > > + struct iommu_resv_region *region = NULL;
> > > int prot = IOMMU_WRITE | IOMMU_NOEXEC | IOMMU_MMIO;
> > > + struct arm_smmu_device *smmu;
> > > +
> > > + smmu = arm_smmu_get_by_fwnode(fwspec->iommu_fwnode);
> > >
> > > - region = iommu_alloc_resv_region(MSI_IOVA_BASE,
> > MSI_IOVA_LENGTH,
> > > - prot, IOMMU_RESV_SW_MSI);
> > > + if (smmu && (smmu->options & ARM_SMMU_OPT_RESV_HW_MSI)
> > &&
> > > + dev_is_pci(dev))
> > > + region = arm_smmu_acpi_alloc_hw_msi(dev);
> >
> > Is it safe to carry on if arm_smmu_acpi_alloc_hw_msi() returns NULL here ?
>
> It is just that PCIe devices won't be functional on this platforms as the endpoint will
> be configured with ITS IOVA address. May be I should add some dev_warn() here.
>
> Thanks,
> Shameer
next prev parent reply other threads:[~2017-06-08 8:48 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-05-31 14:32 [RFCv2 0/2] iommu/smmu-v3: Workaround for hisilicon 161010801 erratum(reserve HW MSI) shameer
2017-05-31 14:32 ` [RFCv2 1/2] acpi:iort: Add new helper function to retrieve ITS base addr from dev IORT node shameer
2017-06-06 14:10 ` Lorenzo Pieralisi
2017-06-06 15:17 ` Shameerali Kolothum Thodi
[not found] ` <tencent_159A581A4E3E9E7D35F82179@qq.com>
2017-06-06 14:36 ` 回复: Alibaba-kernel Jacob Pan
2017-05-31 14:32 ` [RFCv2 2/2] iommu/arm-smmu-v3:Enable ACPI based HiSilicon erratum 161010801 shameer
2017-06-06 13:56 ` Lorenzo Pieralisi
2017-06-06 15:01 ` Shameerali Kolothum Thodi
2017-06-07 17:16 ` Lorenzo Pieralisi
2017-06-08 9:17 ` Shameerali Kolothum Thodi
2017-06-08 8:48 ` Lorenzo Pieralisi [this message]
2017-06-08 9:09 ` Shameerali Kolothum Thodi
2017-06-08 10:15 ` Lorenzo Pieralisi
2017-06-08 11:43 ` Shameerali Kolothum Thodi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20170608084851.GA8607@red-moon \
--to=lorenzo.pieralisi@arm.com \
--cc=linux-arm-kernel@lists.infradead.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).