Received: by 2002:a25:ad19:0:0:0:0:0 with SMTP id y25csp8933534ybi; Tue, 23 Jul 2019 18:22:44 -0700 (PDT) X-Google-Smtp-Source: APXvYqzTo6m21M3/A89BIMPyZXd/Z8Xq8ufIwQW3fsAOp9cbhtuY4GDIJPGtHgc6LAgtyi34okXY X-Received: by 2002:a17:902:2884:: with SMTP id f4mr81840343plb.286.1563931364518; Tue, 23 Jul 2019 18:22:44 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1563931364; cv=none; d=google.com; s=arc-20160816; b=v0JNgAi77eAEyoJWfz61M7rclbFOwkbFeK5sDP9c27qn2DJDg+egwL3SLXw6IBgbac a4y3g5BWYHa5LR3uNN32VsaA3InjII5N1l6kfZOHsfow+tcvG+GOpiIors30hhTMCaKD ciM13EpBHqgp1ke0kjxIsSMmdiNwCNSIFjvdbGWF5nykdV4EfXbKo1wbqxkEDhvPaDvo c3ZtFqdX6vcW4CmUh7DUqbJVSnTvvV3+S2j6he2mUjY/J0T3C4cyPIL4qLAjeV7yY9Yj oyYz4y1EQA5xFY8eqHPMyyrAG02+IrIu1yF5H7OMstb+qTlGJxYlFfQbDfPOqheJ50kz O8ag== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:message-id:date:subject:cc :to:from; bh=hA4UgjtiMq+etAlsThaHvbT/tii8ejcOU3wc2RitDMg=; b=XYmxXW0hqpWZLUk0fg9VZCU8zl9MY9S8Zz81JTp917FC5ks7WQWofpVjwroZgl8erd aui+bL4XElLl7DdmaaukhQN58R0l5mgerId60G0XQzCjBl0BVbdnwsE1rBb1IdTERppD MycASVHdBpDuk8zhinNMTbwyQcPq58135HFEzRpyJpRG0rpaNyW6zX+LNnJWWk+dMD4H WpRSXYfcI2zfceK66FaDKtSDqbkoF+SREUoeyZoyvxzwlcR4dhYh6wg++22r615CX7WX lic2kzzguc0qM1hSK4RomLJp3BYoas79+AWd4d/Ebx5MS/a4DAO8RUeiXp2hp+Vj66Je GdlQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id c1si11894915plr.405.2019.07.23.18.22.15; Tue, 23 Jul 2019 18:22:44 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2388757AbfGWQI3 (ORCPT + 99 others); Tue, 23 Jul 2019 12:08:29 -0400 Received: from szxga04-in.huawei.com ([45.249.212.190]:2705 "EHLO huawei.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1727363AbfGWQI2 (ORCPT ); Tue, 23 Jul 2019 12:08:28 -0400 Received: from DGGEMS401-HUB.china.huawei.com (unknown [172.30.72.60]) by Forcepoint Email with ESMTP id 0681BBBCE45D5BFE0D5D; Wed, 24 Jul 2019 00:08:24 +0800 (CST) Received: from S00345302A-PC.china.huawei.com (10.202.227.237) by DGGEMS401-HUB.china.huawei.com (10.3.19.201) with Microsoft SMTP Server id 14.3.439.0; Wed, 24 Jul 2019 00:08:15 +0800 From: Shameer Kolothum To: , CC: , , , , , , , Shameer Kolothum Subject: [PATCH v8 0/6] vfio/type1: Add support for valid iova list management Date: Tue, 23 Jul 2019 17:06:31 +0100 Message-ID: <20190723160637.8384-1-shameerali.kolothum.thodi@huawei.com> X-Mailer: git-send-email 2.12.0.windows.1 MIME-Version: 1.0 Content-Type: text/plain X-Originating-IP: [10.202.227.237] X-CFilter-Loop: Reflected Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This is to revive this series which almost made to 4.18 but got dropped as Alex found an issue[1] with IGD and USB devices RMRR region being reported as reserved regions. Thanks to Eric for his work here[2]. It provides a way to exclude these regions while reporting the valid iova regions and this respin make use of that. Please note that I don't have a platform to verify the reported RMRR issue and appreciate testing on those platforms. Thanks, Shameer [1] https://lkml.org/lkml/2018/6/5/760 [2] https://lore.kernel.org/patchwork/cover/1083072/ v7-->v8 -Rebased to 5.3-rc1 -Addressed comments from Alex and Eric. Please see individual patch history. -Added Eric's R-by to patches 4/5/6 v6-->v7 -Rebased to 5.2-rc6 + Eric's patches -Added logic to exclude IOMMU_RESV_DIRECT_RELAXABLE reserved memory region type(patch #2). -Dropped patch #4 of v6 as it is already part of mainline. -Addressed "container with only an mdev device will have an empty list" case(patches 4/6 & 5/6 - Suggested by Alex) Old ---- This series introduces an iova list associated with a vfio iommu. The list is kept updated taking care of iommu apertures, and reserved regions. Also this series adds checks for any conflict with existing dma mappings whenever a new device group is attached to the domain. User-space can retrieve valid iova ranges using VFIO_IOMMU_GET_INFO ioctl capability chains. Any dma map request outside the valid iova range will be rejected. v5 --> v6 -Rebased to 4.17-rc1 -Changed the ordering such that previous patch#7 "iommu/dma: Move PCI window region reservation back...") is now patch #4. This will avoid any bisection issues pointed out by Alex. -Added Robins's Reviewed-by tag for patch#4 v4 --> v5 Rebased to next-20180315. -Incorporated the corner case bug fix suggested by Alex to patch #5. -Based on suggestions by Alex and Robin, added patch#7. This moves the PCI window reservation back in to DMA specific path. This is to fix the issue reported by Eric[1]. v3 --> v4 Addressed comments received for v3. -dma_addr_t instead of phys_addr_t -LIST_HEAD() usage. -Free up iova_copy list in case of error. -updated logic in filling the iova caps info(patch #5) RFCv2 --> v3 Removed RFC tag. Addressed comments from Alex and Eric: - Added comments to make iova list management logic more clear. - Use of iova list copy so that original is not altered in case of failure. RFCv1 --> RFCv2 Addressed comments from Alex: -Introduced IOVA list management and added checks for conflicts with existing dma map entries during attach/detach. Shameer Kolothum (6): vfio/type1: Introduce iova list and add iommu aperture validity check vfio/type1: Check reserved region conflict and update iova list vfio/type1: Update iova list on detach vfio/type1: check dma map request is within a valid iova range vfio/type1: Add IOVA range capability support vfio/type1: remove duplicate retrieval of reserved regions drivers/vfio/vfio_iommu_type1.c | 518 +++++++++++++++++++++++++++++++- include/uapi/linux/vfio.h | 26 +- 2 files changed, 531 insertions(+), 13 deletions(-) -- 2.17.1