Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751764AbcLHHal (ORCPT ); Thu, 8 Dec 2016 02:30:41 -0500 Received: from mail-db5eur01on0053.outbound.protection.outlook.com ([104.47.2.53]:2400 "EHLO EUR01-DB5-obe.outbound.protection.outlook.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1750729AbcLHHag (ORCPT ); Thu, 8 Dec 2016 02:30:36 -0500 X-Greylist: delayed 3641 seconds by postgrey-1.27 at vger.kernel.org; Thu, 08 Dec 2016 02:30:36 EST From: Bharat Bhushan To: Eric Auger , "eric.auger.pro@gmail.com" , "christoffer.dall@linaro.org" , "marc.zyngier@arm.com" , "robin.murphy@arm.com" , "alex.williamson@redhat.com" , "will.deacon@arm.com" , "joro@8bytes.org" , "tglx@linutronix.de" , "jason@lakedaemon.net" , "linux-arm-kernel@lists.infradead.org" CC: "drjones@redhat.com" , "kvm@vger.kernel.org" , "punit.agrawal@arm.com" , "linux-kernel@vger.kernel.org" , "iommu@lists.linux-foundation.org" , "pranav.sawargaonkar@gmail.com" Subject: RE: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions Thread-Topic: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and IOVA reserved regions Thread-Index: AQHSP0GE0ACdhLv5pUyzXa4qmnpeQ6D9j59A Date: Thu, 8 Dec 2016 03:56:51 +0000 Message-ID: References: <1479215363-2898-1-git-send-email-eric.auger@redhat.com> In-Reply-To: <1479215363-2898-1-git-send-email-eric.auger@redhat.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: spf=none (sender IP is ) smtp.mailfrom=bharat.bhushan@nxp.com; x-originating-ip: [192.88.169.1] x-ms-office365-filtering-correlation-id: b3bc2632-024d-47cb-5960-08d41f1e3df4 x-microsoft-antispam: UriScan:;BCL:0;PCL:0;RULEID:(22001);SRVR:AM5PR0401MB2548; x-microsoft-exchange-diagnostics: 1;AM5PR0401MB2548;7:DgT2c0Gt2M8YddEFGmEnUCmpvTmL5T74R2OJNJwlTdZ6yzFzPG8oxHoyeN15Y2V7u7DUTdbtqn4x2HfX7feOwaZ0cUxWmgEBjKHC18f39G+npehsRRun2kazztKeszFVOHHSd3SwQeNKXpKzV3f7hPvjxefa2PB19Cz6i0Z0mUnhNtu3ieVDXXB6JVhksrWmyISzdhyrapf+h+COMzIzq+bxWA31M7UFNN3snotJbQd/LqTwZ5xsE5hIENKSz2i6qeos43JxDZgy3hl/bX1XsX96pKP57zGeO9Jb8fo8rU085CvEo/DERImh+kXx6uqyvhFKK4u9Owjz9G5Bj0XlqoSy555jI2he2u41adcY9DI8QJ0anNtkfPanssImq5vmUqO06/PzIEGuaPkImF4zb2399SV0KF9hnEPhKqSPT5Q9TJlcZbfMz2pkJVnPzZv0trYUL4u5LSXT6EDp+E1yAg== x-microsoft-antispam-prvs: x-exchange-antispam-report-test: UriScan:(180628864354917)(20558992708506)(166708455590820)(9452136761055)(258649278758335); x-exchange-antispam-report-cfa-test: BCL:0;PCL:0;RULEID:(6040375)(601004)(2401047)(5005006)(8121501046)(3002001)(10201501046)(6055026)(6041248)(20161123562025)(20161123564025)(20161123560025)(20161123555025)(6047074)(6072148);SRVR:AM5PR0401MB2548;BCL:0;PCL:0;RULEID:;SRVR:AM5PR0401MB2548; x-forefront-prvs: 0150F3F97D x-forefront-antispam-report: SFV:NSPM;SFS:(10009020)(6009001)(7916002)(39410400002)(39860400002)(39850400002)(39840400002)(39450400003)(13464003)(189002)(199003)(377454003)(2950100002)(7846002)(2900100001)(92566002)(2906002)(33656002)(4326007)(101416001)(66066001)(74316002)(305945005)(8936002)(38730400001)(39060400001)(7736002)(68736007)(9686002)(7416002)(77096006)(3846002)(86362001)(6116002)(5660300001)(2201001)(229853002)(102836003)(7696004)(76576001)(81156014)(105586002)(106116001)(3280700002)(122556002)(106356001)(3660700001)(189998001)(54356999)(76176999)(5001770100001)(50986999)(6506006)(97736004)(81166006)(2501003)(921003)(1121003);DIR:OUT;SFP:1101;SCL:1;SRVR:AM5PR0401MB2548;H:AM5PR0401MB2545.eurprd04.prod.outlook.com;FPR:;SPF:None;PTR:InfoNoRecords;MX:1;A:1;LANG:en; spamdiagnosticoutput: 1:99 spamdiagnosticmetadata: NSPM Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 X-OriginatorOrg: nxp.com X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Dec 2016 03:56:51.3605 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 686ea1d3-bc2b-4c6f-a92c-d99c5c301635 X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM5PR0401MB2548 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Transfer-Encoding: 8bit X-MIME-Autoconverted: from quoted-printable to 8bit by mail.home.local id uB87Ul9X016820 Content-Length: 3334 Lines: 94 Hi Eric, I have tested this series on NXP platform. Thanks -Bharat > -----Original Message----- > From: iommu-bounces@lists.linux-foundation.org [mailto:iommu- > bounces@lists.linux-foundation.org] On Behalf Of Eric Auger > Sent: Tuesday, November 15, 2016 6:39 PM > To: eric.auger@redhat.com; eric.auger.pro@gmail.com; > christoffer.dall@linaro.org; marc.zyngier@arm.com; > robin.murphy@arm.com; alex.williamson@redhat.com; > will.deacon@arm.com; joro@8bytes.org; tglx@linutronix.de; > jason@lakedaemon.net; linux-arm-kernel@lists.infradead.org > Cc: drjones@redhat.com; kvm@vger.kernel.org; punit.agrawal@arm.com; > linux-kernel@vger.kernel.org; iommu@lists.linux-foundation.org; > pranav.sawargaonkar@gmail.com > Subject: [RFC v3 00/10] KVM PCIe/MSI passthrough on ARM/ARM64 and > IOVA reserved regions > > Following LPC discussions, we now report reserved regions through iommu- > group sysfs reserved_regions attribute file. > > Reserved regions are populated through the IOMMU get_resv_region > callback (former get_dm_regions), now implemented by amd-iommu, intel- > iommu and arm-smmu. > > The intel-iommu reports the [FEE0_0000h - FEF0_000h] MSI window as an > IOMMU_RESV_NOMAP reserved region. > > arm-smmu reports the MSI window (arbitrarily located at 0x8000000 and 1MB > large) and the PCI host bridge windows. > > The series integrates a not officially posted patch from Robin: > "iommu/dma: Allow MSI-only cookies". > > This series currently does not address IRQ safety assessment. > > Best Regards > > Eric > > Git: complete series available at > https://github.com/eauger/linux/tree/v4.9-rc5-reserved-rfc-v3 > > History: > RFC v2 -> v3: > - switch to an iommu-group sysfs API > - use new dummy allocator provided by Robin > - dummy allocator initialized by vfio-iommu-type1 after enumerating > the reserved regions > - at the moment ARM MSI base address/size is left unchanged compared > to v2 > - we currently report reserved regions and not usable IOVA regions as > requested by Alex > > RFC v1 -> v2: > - fix intel_add_reserved_regions > - add mutex lock/unlock in vfio_iommu_type1 > > > Eric Auger (10): > iommu/dma: Allow MSI-only cookies > iommu: Rename iommu_dm_regions into iommu_resv_regions > iommu: Add new reserved IOMMU attributes > iommu: iommu_alloc_resv_region > iommu: Do not map reserved regions > iommu: iommu_get_group_resv_regions > iommu: Implement reserved_regions iommu-group sysfs file > iommu/vt-d: Implement reserved region get/put callbacks > iommu/arm-smmu: Implement reserved region get/put callbacks > vfio/type1: Get MSI cookie > > drivers/iommu/amd_iommu.c | 20 +++--- > drivers/iommu/arm-smmu.c | 52 +++++++++++++++ > drivers/iommu/dma-iommu.c | 116 ++++++++++++++++++++++++++---- > --- > drivers/iommu/intel-iommu.c | 50 ++++++++++---- > drivers/iommu/iommu.c | 141 > ++++++++++++++++++++++++++++++++++++---- > drivers/vfio/vfio_iommu_type1.c | 26 ++++++++ > include/linux/dma-iommu.h | 7 ++ > include/linux/iommu.h | 49 ++++++++++---- > 8 files changed, 391 insertions(+), 70 deletions(-) > > -- > 1.9.1 > > _______________________________________________ > iommu mailing list > iommu@lists.linux-foundation.org > https://lists.linuxfoundation.org/mailman/listinfo/iommu