Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932185AbcKRKHi (ORCPT ); Fri, 18 Nov 2016 05:07:38 -0500 Received: from mail-db5eur01on0050.outbound.protection.outlook.com ([104.47.2.50]:13824 "EHLO EUR01-DB5-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1753020AbcKRKHa (ORCPT ); Fri, 18 Nov 2016 05:07:30 -0500 From: Bharat Bhushan To: Eric Auger , "eric.auger.pro@gmail.com" , "christoffer.dall@linaro.org" , "marc.zyngier@arm.com" , "robin.murphy@arm.com" , "alex.williamson@redhat.com" , "will.deacon@arm.com" , "joro@8bytes.org" , "tglx@linutronix.de" , "jason@lakedaemon.net" , "linux-arm-kernel@lists.infradead.org" CC: "drjones@redhat.com" , "kvm@vger.kernel.org" , "punit.agrawal@arm.com" , "linux-kernel@vger.kernel.org" , "iommu@lists.linux-foundation.org" , "pranav.sawargaonkar@gmail.com" Subject: RE: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions Thread-Topic: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions Thread-Index: AQHSP0GE0ACdhLv5pUyzXa4qmnpeQ6DeO2Gg Date: Fri, 18 Nov 2016 05:34:37 +0000 Message-ID: References: <1479215363-2898-1-git-send-email-eric.auger@redhat.com> In-Reply-To: <1479215363-2898-1-git-send-email-eric.auger@redhat.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=bharat.bhushan@nxp.com; x-originating-ip: [192.88.169.1] x-microsoft-exchange-diagnostics: 1;HE1PR0401MB2554;7:CVwCVp39bItzK3i/jv4E8ZIj2pwwZfxU6+vcJBVlXcs7iXOuTCWFJCzTeuwVPRP89ZGgrpoLbmLt+M1+eeDdKvqkxhGuM9KOx042zupcjBntoVhsampCb2wUSp2i7lCQtF6004oy9p6KAC6awzX3GqqgNnQRMD4OANRdEFEDeMRgSxk6F25DkH87yXhiLqx2wsGOEYnJq4pZRe6dRtDt46exBJ/BvbKLFL74HVYRmz7wyOicA/GbcnD/rMXphdku6ZnSat44UOH9QvzPGRQNGNBwicmR//HH0V8B6O6IbNooUJ9NpzS3OIAfqVuKgdhfSrUDA+fdmUQh6R/EU68IYFrNX5qImgkhTqRPQqOay2s= x-ms-office365-filtering-correlation-id: c5f2b1fe-0bb0-4b56-ce70-08d40f74961a x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:HE1PR0401MB2554; x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(180628864354917)(20558992708506)(166708455590820)(9452136761055)(258649278758335); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(6060326)(6045074)(6040281)(601004)(2401047)(8121501046)(5005006)(3002001)(10201501046)(6055026)(6061324)(6041223)(6046074);SRVR:HE1PR0401MB2554;BCL:0;PCL:0;RULEID:;SRVR:HE1PR0401MB2554; x-forefront-prvs: 01304918F3 x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(6009001)(7916002)(377454003)(189002)(13464003)(199003)(7736002)(2501003)(92566002)(3280700002)(77096005)(5001770100001)(66066001)(76576001)(68736007)(105586002)(3660700001)(6116002)(7846002)(97736004)(2950100002)(74316002)(3846002)(2906002)(6506003)(2201001)(86362001)(122556002)(102836003)(2900100001)(305945005)(4326007)(106356001)(87936001)(5660300001)(101416001)(189998001)(106116001)(54356999)(229853002)(33656002)(81156014)(76176999)(81166006)(8936002)(50986999)(7416002)(7696004)(9686002)(921003)(1121003);DIR:OUT;SFP:1101;SCL:1;SRVR:HE1PR0401MB2554;H:HE1PR0401MB2556.eurprd04.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Nov 2016 05:34:37.2252 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR0401MB2554 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by mail.home.local id uAIA7xp4017117 Content-Length: 3402 Lines: 94 Hi Eric, Have you sent out QEMU side patches based on this new approach? In case I missed please point me the patches? Thanks -Bharat > -----Original Message----- > From: iommu-bounces@lists.linux-foundation.org [mailto:iommu- > bounces@lists.linux-foundation.org] On Behalf Of Eric Auger > Sent: Tuesday, November 15, 2016 6:39 PM > To: eric.auger@redhat.com; eric.auger.pro@gmail.com; > christoffer.dall@linaro.org; marc.zyngier@arm.com; > robin.murphy@arm.com; alex.williamson@redhat.com; > will.deacon@arm.com; joro@8bytes.org; tglx@linutronix.de; > jason@lakedaemon.net; linux-arm-kernel@lists.infradead.org > Cc: drjones@redhat.com; kvm@vger.kernel.org; punit.agrawal@arm.com; > linux-kernel@vger.kernel.org; iommu@lists.linux-foundation.org; > pranav.sawargaonkar@gmail.com > Subject: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and > IOVA reserved regions > > Following LPC discussions, we now report reserved regions through iommu- > group sysfs reserved_regions attribute file. > > Reserved regions are populated through the IOMMU get_resv_region > callback (former get_dm_regions), now implemented by amd-iommu, intel- > iommu and arm-smmu. > > The intel-iommu reports the [FEE0_0000h - FEF0_000h] MSI window as an > IOMMU_RESV_NOMAP reserved region. > > arm-smmu reports the MSI window (arbitrarily located at 0x8000000 and 1MB > large) and the PCI host bridge windows. > > The series integrates a not officially posted patch from Robin: > "iommu/dma: Allow MSI-only cookies". > > This series currently does not address IRQ safety assessment. > > Best Regards > > Eric > > Git: complete series available at > https://github.com/eauger/linux/tree/v4.9-rc5-reserved-rfc-v3 > > History: > RFC v2 -> v3: > - switch to an iommu-group sysfs API > - use new dummy allocator provided by Robin > - dummy allocator initialized by vfio-iommu-type1 after enumerating > the reserved regions > - at the moment ARM MSI base address/size is left unchanged compared > to v2 > - we currently report reserved regions and not usable IOVA regions as > requested by Alex > > RFC v1 -> v2: > - fix intel_add_reserved_regions > - add mutex lock/unlock in vfio_iommu_type1 > > > Eric Auger (10): > iommu/dma: Allow MSI-only cookies > iommu: Rename iommu_dm_regions into iommu_resv_regions > iommu: Add new reserved IOMMU attributes > iommu: iommu_alloc_resv_region > iommu: Do not map reserved regions > iommu: iommu_get_group_resv_regions > iommu: Implement reserved_regions iommu-group sysfs file > iommu/vt-d: Implement reserved region get/put callbacks > iommu/arm-smmu: Implement reserved region get/put callbacks > vfio/type1: Get MSI cookie > > drivers/iommu/amd_iommu.c | 20 +++--- > drivers/iommu/arm-smmu.c | 52 +++++++++++++++ > drivers/iommu/dma-iommu.c | 116 ++++++++++++++++++++++++++---- > --- > drivers/iommu/intel-iommu.c | 50 ++++++++++---- > drivers/iommu/iommu.c | 141 > ++++++++++++++++++++++++++++++++++++---- > drivers/vfio/vfio_iommu_type1.c | 26 ++++++++ > include/linux/dma-iommu.h | 7 ++ > include/linux/iommu.h | 49 ++++++++++---- > 8 files changed, 391 insertions(+), 70 deletions(-) > > -- > 1.9.1 > > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu