Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1753767AbdFVVLZ (ORCPT ); Thu, 22 Jun 2017 17:11:25 -0400 Received: from mx1.redhat.com ([209.132.183.28]:45262 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753373AbdFVVLX (ORCPT ); Thu, 22 Jun 2017 17:11:23 -0400 DMARC-Filter: OpenDMARC Filter v1.3.2 mx1.redhat.com 64FFD43A2A Authentication-Results: ext-mx06.extmail.prod.ext.phx2.redhat.com; dmarc=none (p=none dis=none) header.from=redhat.com Authentication-Results: ext-mx06.extmail.prod.ext.phx2.redhat.com; spf=pass smtp.mailfrom=alex.williamson@redhat.com DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.redhat.com 64FFD43A2A Date: Thu, 22 Jun 2017 15:11:18 -0600 From: Alex Williamson To: Alexey Kardashevskiy Cc: linuxppc-dev@lists.ozlabs.org, kvm@vger.kernel.org, linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org, Yongji Xie , Benjamin Herrenschmidt , Gavin Shan , Paul Mackerras , David Gibson Subject: Re: [PATCH kernel 0/3 REPOST] vfio-pci: Add support for mmapping MSI-X table Message-ID: <20170622151118.0006c3d3@w520.home> In-Reply-To: <20170615054845.8428-1-aik@ozlabs.ru> References: <20170615054845.8428-1-aik@ozlabs.ru> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.30]); Thu, 22 Jun 2017 21:11:23 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2993 Lines: 78 On Thu, 15 Jun 2017 15:48:42 +1000 Alexey Kardashevskiy wrote: > Here is a patchset which Yongji was working on before > leaving IBM LTC. Since we still want to have this functionality > in the kernel (DPDK is the first user), here is a rebase > on the current upstream. > > > Current vfio-pci implementation disallows to mmap the page > containing MSI-X table in case that users can write directly > to MSI-X table and generate an incorrect MSIs. > > However, this will cause some performance issue when there > are some critical device registers in the same page as the > MSI-X table. We have to handle the mmio access to these > registers in QEMU emulation rather than in guest. > > To solve this issue, this series allows to expose MSI-X table > to userspace when hardware enables the capability of interrupt > remapping which can ensure that a given PCI device can only > shoot the MSIs assigned for it. And we introduce a new bus_flags > PCI_BUS_FLAGS_MSI_REMAP to test this capability on PCI side > for different archs. > > The patch 3 are based on the proposed patchset[1]. > > Changelog > v3: > - rebased on the current upstream There's something not forthcoming here, the last version I see from Yongji is this one: https://lists.linuxfoundation.org/pipermail/iommu/2016-June/017245.html Which was a 6-patch series where patches 2-4 tried to apply PCI_BUS_FLAGS_MSI_REMAP for cases that supported other platforms. That doesn't exist here, so it's not simply a rebase. Patch 1/ seems to equate this new flag to the IOMMU capability IOMMU_CAP_INTR_REMAP, but nothing is done here to match them together. That patch also mentions the work Eric has done for similar features on ARM, but again those patches are dropped. It seems like an incomplete feature now. Thanks, Alex > v2: > - Make the commit log more clear > - Replace pci_bus_check_msi_remapping() with pci_bus_msi_isolated() > so that we could clearly know what the function does > - Set PCI_BUS_FLAGS_MSI_REMAP in pci_create_root_bus() instead > of iommu_bus_notifier() > - Reserve VFIO_REGION_INFO_FLAG_CAPS when we allow to mmap MSI-X > table so that we can know whether we allow to mmap MSI-X table > in QEMU > > [1] https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg1138820.html > > > This is based on sha1 > 63f700aab4c1 Linus Torvalds "Merge tag 'xtensa-20170612' of git://github.com/jcmvbkbc/linux-xtensa". > > Please comment. Thanks. > > > > Yongji Xie (3): > PCI: Add a new PCI_BUS_FLAGS_MSI_REMAP flag > pci-ioda: Set PCI_BUS_FLAGS_MSI_REMAP for IODA host bridge > vfio-pci: Allow to expose MSI-X table to userspace if interrupt > remapping is enabled > > include/linux/pci.h | 1 + > arch/powerpc/platforms/powernv/pci-ioda.c | 8 ++++++++ > drivers/vfio/pci/vfio_pci.c | 18 +++++++++++++++--- > drivers/vfio/pci/vfio_pci_rdwr.c | 3 ++- > 4 files changed, 26 insertions(+), 4 deletions(-) >