Qualcomm's arm-smmu 500 implementation supports runtime pm
so enable the same.
Signed-off-by: Vivek Gautam
---
Based on iommu/arm-smmu pm runtime support series [1]:
[PATCH v8 0/5] iommu/arm-smmu: Add runtime pm/sleep support
Tested on sdm845 with necessary
On Tue, Mar 6, 2018 at 7:07 PM, Tomasz Figa wrote:
> Hi Jeffy,
>
> It looks like I missed some details of how runtime PM enable works
> before, so we might be able to simplify things. Sorry for not getting
> things right earlier.
>
> On Tue, Mar 6, 2018 at 12:27 PM, Jeffy Chen
Hi Tomasz,
Thanks for your reply.
On 03/06/2018 06:07 PM, Tomasz Figa wrote:
Hi Jeffy,
It looks like I missed some details of how runtime PM enable works
before, so we might be able to simplify things. Sorry for not getting
things right earlier
hmm, right, the enable state should be the
It was noticed that the IRTE configured for guest OS kernel
was over-written while the guest was running. As a result,
vt-d Posted Interrupts configured for the guest are not being
delivered directly, and instead bounces off the host. Every
interrupt delivery takes a VM Exit.
It was noticed that
Dear All,
I am very sorry to bother you, do you know who is supposed to take this patch?
Thanks,
Fab
> -Original Message-
> From: Biju Das [mailto:biju@bp.renesas.com]
> Sent: 24 January 2018 15:42
> To: Joerg Roedel ; Laurent Pinchart
>
Hey Robin,
On Tue, Feb 27, 2018 at 01:49:14PM +, Robin Murphy wrote:
> On 26/02/18 18:05, Will Deacon wrote:
> >On Thu, Dec 14, 2017 at 04:58:51PM +, Robin Murphy wrote:
> >>Bring io-pgtable-arm in line with the ARMv8.2-LPA feature allowing
> >>52-bit physical addresses when using the
Hi Fabrizio,
On Tue, Mar 6, 2018 at 5:55 PM, Fabrizio Castro
wrote:
> I am very sorry to bother you, do you know who is supposed to take this patch?
Jörg is the IOMMU maintainer, so I assume he's the one.
>> -Original Message-
>> From: Biju Das
Hi Robin,
On Tue, Feb 27, 2018 at 01:28:31PM +, Robin Murphy wrote:
> On 26/02/18 18:04, Will Deacon wrote:
> >On Thu, Dec 14, 2017 at 04:58:50PM +, Robin Murphy wrote:
> >>Before trying to add the SMMUv3.1 support for 52-bit addresses, make
> >>things bearable by cleaning up the various
On 2018-03-06 05:46, Jean-Philippe Brucker wrote:
On 05/03/18 21:53, Sinan Kaya wrote:
On 2/12/2018 1:33 PM, Jean-Philippe Brucker wrote:
+static struct workqueue_struct *iommu_fault_queue;
Is there anyway we can make this fault queue per struct device?
Since this is common code, I think it
On 06/03/18 04:59, Jitendra Bhivare wrote:
iPROC SoC has a special device window to treat GICv3 ITS MSI.
Ugh, really? After preferably printing out 100 copies of the SBSA,
binding them all together and dropping the lot onto the hardware
designers from a great height, could you clarify what
On 06/03/18 04:59, Jitendra Bhivare wrote:
With SoC wide DMA mask of 40-bit, the mappings for entire IOVA space can't
be specified in the PAXBv2 PCIe RC of SoC. The holes in IOVA space needs to
be reserved to prevent any IOVA allocations in those spaces.
Can you clarify why? If this is the PCI
On 06/03/18 04:59, Jitendra Bhivare wrote:
Certain regions in IO virtual address space may need to be reserved to be
not used for devices configured behind IOMMU.
Add documentation of the property to allow such regions to be specified in
DT to be reserved using IOMMU_RESV_RESERVED type.
That
On 05/03/18 21:53, Sinan Kaya wrote:
> On 2/12/2018 1:33 PM, Jean-Philippe Brucker wrote:
>> +static struct workqueue_struct *iommu_fault_queue;
>
> Is there anyway we can make this fault queue per struct device?
> Since this is common code, I think it needs some care.
I don't think it's better,
On 05/03/18 15:28, Sinan Kaya wrote:
> On 2/12/2018 1:33 PM, Jean-Philippe Brucker wrote:
>> +static void io_mm_free(struct io_mm *io_mm)
>> +{
>> +struct mm_struct *mm;
>> +void (*release)(struct io_mm *);
>> +
>> +release = io_mm->release;
>> +mm = io_mm->mm;
>> +
>> +
On 05/03/18 21:44, Sinan Kaya wrote:
> On 2/12/2018 1:33 PM, Jean-Philippe Brucker wrote:
>> +static int iommu_queue_fault(struct iommu_domain *domain, struct device
>> *dev,
>> + struct iommu_fault_event *evt)
>> +{
>> +struct iommu_fault_group *group;
>> +struct
Hi Jeffy,
It looks like I missed some details of how runtime PM enable works
before, so we might be able to simplify things. Sorry for not getting
things right earlier.
On Tue, Mar 6, 2018 at 12:27 PM, Jeffy Chen wrote:
> When the power domain is powered off, the
Current ARM SMMU virtualizes MSI addresses to IOVA space.
In iProc SoCs, MSI needs to be steered. Allow reserving MSI address range
using DT node entry as direct region.
Signed-off-by: Jitendra Bhivare
---
drivers/iommu/arm-smmu.c | 14 +-
1 file
ARM SoCs need a way to reserve IOMMU regions. Some address ranges used
by devices sitting behind IOMMU are treated specially. To prevent these
ranges from getting mapped in IOVA space, use the existing framework and
code to reserve the ranges using DT properties.
This patch set is created
With SoC wide DMA mask of 40-bit, the mappings for entire IOVA space can't
be specified in the PAXBv2 PCIe RC of SoC. The holes in IOVA space needs to
be reserved to prevent any IOVA allocations in those spaces.
reserved-dma-region property is added to specify the ranges which should
never be
iPROC SoC provides restricted windows to access sparsed memory as per ARM
memory map to the devices sitting behind IOMMU. The windows cover enough
DDR space but not the entire 40-bit 1TB space used by IOMMU code as per
the DMA mask set.
Current IOMMU code does not provide a hook to reserve these
iPROC SoC has a special device window to treat GICv3 ITS MSI.
Current code maps MSI to IOVA space. Add SMMU node property to use
direct mappings for MSI region.
This property is read and reserved when arm_smmu_get_resv_regions
gets called.
Signed-off-by: Jitendra Bhivare
Certain regions in IO virtual address space may need to be reserved to be
not used for devices configured behind IOMMU.
Add documentation of the property to allow such regions to be specified in
DT to be reserved using IOMMU_RESV_RESERVED type.
Reviewed-by: Ray Jui
22 matches
Mail list logo