Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757598AbcK3OmO (ORCPT ); Wed, 30 Nov 2016 09:42:14 -0500 Received: from foss.arm.com ([217.140.101.70]:48724 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757488AbcK3OmE (ORCPT ); Wed, 30 Nov 2016 09:42:04 -0500 Subject: Re: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions To: Auger Eric , Will Deacon References: <1479215363-2898-1-git-send-email-eric.auger@redhat.com> <6c9012fd-070b-6218-48e7-69b37f2559dd@redhat.com> <20161130103713.GB2724@arm.com> <1899e46c-7b06-01d6-6cff-eb0985a4f11d@redhat.com> Cc: drjones@redhat.com, jason@lakedaemon.net, kvm@vger.kernel.org, marc.zyngier@arm.com, joro@8bytes.org, punit.agrawal@arm.com, linux-kernel@vger.kernel.org, iommu@lists.linux-foundation.org, diana.craciun@nxp.com, alex.williamson@redhat.com, pranav.sawargaonkar@gmail.com, linux-arm-kernel@lists.infradead.org, tglx@linutronix.de, christoffer.dall@linaro.org, eric.auger.pro@gmail.com From: Robin Murphy Message-ID: <7fca514b-53fd-ce58-687b-f6f65240f210@arm.com> Date: Wed, 30 Nov 2016 14:41:55 +0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:45.0) Gecko/20100101 Thunderbird/45.4.0 MIME-Version: 1.0 In-Reply-To: <1899e46c-7b06-01d6-6cff-eb0985a4f11d@redhat.com> Content-Type: text/plain; charset=windows-1252 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2378 Lines: 52 On 30/11/16 14:08, Auger Eric wrote: > Hi Will, > > On 30/11/2016 11:37, Will Deacon wrote: >> On Wed, Nov 30, 2016 at 10:49:33AM +0100, Auger Eric wrote: >>> On 15/11/2016 14:09, Eric Auger wrote: >>>> Following LPC discussions, we now report reserved regions through >>>> iommu-group sysfs reserved_regions attribute file. >>>> >>>> Reserved regions are populated through the IOMMU get_resv_region callback >>>> (former get_dm_regions), now implemented by amd-iommu, intel-iommu and >>>> arm-smmu. >>>> >>>> The intel-iommu reports the [FEE0_0000h - FEF0_000h] MSI window as an >>>> IOMMU_RESV_NOMAP reserved region. >>>> >>>> arm-smmu reports the MSI window (arbitrarily located at 0x8000000 and >>>> 1MB large) and the PCI host bridge windows. >>>> >>>> The series integrates a not officially posted patch from Robin: >>>> "iommu/dma: Allow MSI-only cookies". >>>> >>>> This series currently does not address IRQ safety assessment. >>> >>> I will respin this series taking into account Joerg's comment. Does >>> anyone have additional comments or want to put forward some conceptual >>> issues with the current direction and with this implementation? >>> >>> As for the IRQ safety assessment, in a first step I would propose to >>> remove the IOMMU_CAP_INTR_REMAP from arm-smmus and consider the >>> assignment as unsafe. Any objection? >> >> Well, yeah, because it's perfectly safe with GICv3. > > Well except if you have an MSI controller in-between the device and the > sMMU (typically embedded in the host bridge). Detecting this situation > is not straightforward; hence my proposal. That's not the GICv3 (ITS) case, though, and either way it's irrelevant to the "safety" aspect in question; the fact that writes to the ITS carry sideband signals which disambiguate and isolate MSIs has nothing to do with whether that write undergoes address translation along the way. It's also not legacy INTx, and the fact that we have to pretend the SMMU provides MSI isolation in order to make things work with INTx is an entirely separate piece of brokenness I've raised several times before. I more than anyone would love to remove IOMMU_CAP_INTR_REMAP from the SMMU drivers yesterday, but doing so breaks the existing use-case on ARM unless we actually fix that aspect of VFIO first (I did look into it once, but it seemed way beyond my comprehension at the time). Robin.