Received: by 2002:ac0:a5a6:0:0:0:0:0 with SMTP id m35-v6csp7051851imm; Tue, 28 Aug 2018 05:45:06 -0700 (PDT) X-Google-Smtp-Source: ANB0VdZPecWmyjpeKnIhTe4N1N013qlqaMwk9olKx380YVlCn34zzNI+uqRMWzcWRyNkijvpFVGH X-Received: by 2002:a17:902:b60e:: with SMTP id b14-v6mr1410005pls.111.1535460306362; Tue, 28 Aug 2018 05:45:06 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1535460306; cv=none; d=google.com; s=arc-20160816; b=O8oIeRswEmX1we27nQBzSmj+aJMcivgd2v9F/kihETDsSZhkYPC6m3H6VaokEw5QKk GvwLkIA0qB82Ftm1i4MsyvCviDjwiTyKpIHg406Jy1bYgZv47I/2OTOXO57++RKgprHg nm5zWGHn8O/f+UHYb9M3M53tjTXv5dgWxJcQvCwj7810iN4or6XIDAWGig5V5rNdNK4g NeXKv0MzIPEpgexHOeqsXb3aZmOBPOeKATxQ0K9+7ivmQsi4c3ddIvqTEpS23Tuzwocz Sh5YYbUakOf+4N5ek8jzPLbD/vppPDzEf7JoclPb0mhhu98Btsl0p+LlDNM3y3rgFmx3 1Lew== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature :arc-authentication-results; bh=frWhn4S9KCm1DSyV4+IQkgu7JU6rC2gg4yQa9wCMVrY=; b=T6TovbWuyMWl/9vwSzqeNXsSyTAJF+0FXFUXWdku1b+FjUM2nLCc57TBzaObZQ12V/ 8YPv3CjWQ3yFQtR9c0mI41aHxozCBAJ/6vKw4x8pD2SBUm17JpIeMPzZdMZaiOy4Ilha My/Z111880CymM+qT4ETl5pIZaKaCb0PJFiJQJOt4BGaxPOptBUjEkYowRlXXp0tnLEz 3kC+VlQuS/+Oge7NJH1na/8n4Yq7GhvYrRnFaXx+YDQtXxneeKP8wn7/r/Q0OFi0+50q DjrU1WCMsuOVFxU2pSRNadrUuKbaLiVLM0bw1lcvbPGNDBHc2dUEzYEBvqTbhPPxVO37 MFEA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=QK2hWoW0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o12-v6si927644pfd.142.2018.08.28.05.44.50; Tue, 28 Aug 2018 05:45:06 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=QK2hWoW0; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727868AbeH1Qdw (ORCPT + 99 others); Tue, 28 Aug 2018 12:33:52 -0400 Received: from mail-wr1-f65.google.com ([209.85.221.65]:42378 "EHLO mail-wr1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727067AbeH1Qdw (ORCPT ); Tue, 28 Aug 2018 12:33:52 -0400 Received: by mail-wr1-f65.google.com with SMTP id v17-v6so1439979wrr.9; Tue, 28 Aug 2018 05:42:22 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=frWhn4S9KCm1DSyV4+IQkgu7JU6rC2gg4yQa9wCMVrY=; b=QK2hWoW05SUggMhvfEkmKpBC0vDdlKj+wqRPoHh5btR1Nq+sDfQdAh69hpb4ahWMqK ip4vYFxqiFYqVaAwdzkdw7wCQyGfwx9iqPz4oe+Cr4XRw2EjPUBKWmx38qT5NlZ/Ijjz dEY0kRZeq8EjcP3ULvOaHOJTNvDNE0n/5SN8tRRuXUJximhPnnNNB2+iFKmTuJvyzx4I 4AyGX7Jg/0Sa+zfWHTxLWVy+uu987Nl5djd/erRcekC/TaeyxEJkSazqzJA7aYQWmdMk 6W7nMTAxlBTWncq2oOgbpvG+K16+7/6srxHu6GqL+a8FUt6FUSYdylT3MzrLk4YDVRpL W2Gw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=frWhn4S9KCm1DSyV4+IQkgu7JU6rC2gg4yQa9wCMVrY=; b=K8dadmehWS342cYKYGKJJ+SoHno5Cpm9aeTIJwp4hgOhzXgHwsYXzQScN+Nb6RqSK6 4qkcDVFgsy4Q49s06Dg/sXCNIDZx8VrTl7WuIJkxAXNy69kC6ZdbfcaMSURkVDksWahj Twgk0cZv47m/4u7m4q/LiKqJ1f8hQs1D1re1gKxAItHI430s8urzH5aSSFKHUtjJGEGC nwjub0ejLor5NhTd1yjv2hM8tMDxae1DxQp8/iVQOIeV4cil1eEeJ/kBaoxIcY6ZCC9w 5QAyT8CQ30SltfQmHmECvIfhCHZ9xVFUhJimlLv7fWCWmyDI7BF9+Er9/2dL+ljCM6io NLLQ== X-Gm-Message-State: APzg51AYkdZZ8gyfT2qPq+o/qwIpqiUcnip7LyDkBGlhhvTJK8bQkDkb 3FivZkLFY+ocWhzJTygZn25cKwUHw+ko6edyQ2fFsggQ X-Received: by 2002:a5d:61c1:: with SMTP id q1-v6mr1087855wrv.33.1535460141840; Tue, 28 Aug 2018 05:42:21 -0700 (PDT) MIME-Version: 1.0 References: <1535453838-12154-1-git-send-email-sunil.kovvuri@gmail.com> <1535453838-12154-11-git-send-email-sunil.kovvuri@gmail.com> In-Reply-To: From: Sunil Kovvuri Date: Tue, 28 Aug 2018 18:12:10 +0530 Message-ID: Subject: Re: [PATCH 10/15] soc: octeontx2: Reconfig MSIX base with IOVA To: Arnd Bergmann Cc: LKML , olof@lixom.net, LAKML , linux-soc@vger.kernel.org, Geetha sowjanya , Sunil Goutham , tglx@linutronix.de, Marc Zyngier , jason@lakedaemon.net, linux-pci Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Aug 28, 2018 at 5:39 PM Arnd Bergmann wrote: > > On Tue, Aug 28, 2018 at 12:58 PM wrote: > > > > From: Geetha sowjanya > > > > HW interprets RVU_AF_MSIXTR_BASE address as an IOVA, hence > > create a IOMMU mapping for the physcial address configured by > > firmware and reconfig RVU_AF_MSIXTR_BASE with IOVA. > > > > Signed-off-by: Geetha sowjanya > > Signed-off-by: Sunil Goutham > > I think this needs some more explanation. What is the difference between > the MSI-X support in this driver and every other one? Are you working > around a hardware bug, or is there something odd in the implementation > of your irqchip driver? Do you use a GIC to handle the MSI interrupts > or something else? > > Arnd This admin function is a PCI device which is capable of provisioning HW blocks to other PCIe SRIOV devices in the system. Each HW block (eg memory buffer pools, NIC dewscriptors, crypto engines e.t.c) needs certain no of MSIX vectors. Admin function has a set of 32K MSIX vectors in memory (not on-chip) which based on HW block provisioning to a PCI device attaches the required number of vectors to that device. Some part of this configuration is done by low level firmware. RVU_AF_MSIXTR_BASE points to the memory region allocated for 32K MSIX vectors. If kernel is booted with IOMMU enabled and admin function device is attached to SMMU, HW will go through translation to access this MSIX vector memory region. Hence the mapping done in this patch. Thanks, Sunil.