Received: by 10.223.164.202 with SMTP id h10csp9450wrb; Thu, 30 Nov 2017 06:17:04 -0800 (PST) X-Google-Smtp-Source: AGs4zMbfaF+eoQ7oy/YilVIJZ/UO48ZBKAo9FfPR/w0O6CkyVX/srQWddsjhrVDQwm8XXBNt3EMZ X-Received: by 10.99.119.15 with SMTP id s15mr2507899pgc.90.1512051424836; Thu, 30 Nov 2017 06:17:04 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1512051424; cv=none; d=google.com; s=arc-20160816; b=F8uDjV19d6rf42CTSe5p8GxdR+xqvSnrBvt/FAY7xfSjYg1o94fts/GuvU+823fsxd 8+48tU7MbpCGinvvgCmIMBct4gV4XbhEnlOedMsT+3W5MhCm8CmM0HYuE566KBu45yj6 RMIKQC4S7oQJxdTpt0kwNquSj7VmWCaDc06XgSjw1O+CuKx3tFZAVM2GLY6pTFyBVaWi Tj+E0WxGIYTngBiW+P8ybPQDrSzKOKIEE72/1MI/tv+o8VVHnVvt/G+sKxv5tC359nJ2 /chYBRE4peI7JRbqvYsnagqyeRzmNoHLxArA9iFzEh6sixrTHd000LHfhEY1YML0EnuI ULuQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:message-id:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date:from :references:cc:to:subject:arc-authentication-results; bh=9VYhBmFlNEiyMSI5bkKu8GRhg8VVa+6CZ+duIEABgDc=; b=beX1NMkxMKRyJO6bKd+TmgYuacm0fq7mCD0+uDrIQNGlYIBzguslbKiduViQRNKf9u kPyIpCK2tXak6gqG0q+OP4ziG2RLAmZzlYl36mYY94u3TJ5zSSGpVwuKalNwyl9EuXen J2qT6swXFsK6nxCdanycEqtqVF/M+APK+VQo2RnqhWCH0wBKLTjPLR740NuWoOnmJmri f4BmRAkRy5eEklwsGD2b1WZAj5tEtdEb9WxGmHqO6jMd8qIVHPRapYB2hctuBV46+uyd 0D8rT1Nz6qPlFypUX8erdKryZ/4f8EWaypdGpnY7zZoIhuuZ+0slAtBSdu7nKLkLOQlq sIPA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w22si3127521pll.402.2017.11.30.06.16.50; Thu, 30 Nov 2017 06:17:04 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=ibm.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752321AbdK3OQa (ORCPT + 99 others); Thu, 30 Nov 2017 09:16:30 -0500 Received: from mx0a-001b2d01.pphosted.com ([148.163.156.1]:55260 "EHLO mx0a-001b2d01.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752332AbdK3OQ1 (ORCPT ); Thu, 30 Nov 2017 09:16:27 -0500 Received: from pps.filterd (m0098396.ppops.net [127.0.0.1]) by mx0a-001b2d01.pphosted.com (8.16.0.21/8.16.0.21) with SMTP id vAUEGOa8001225 for ; Thu, 30 Nov 2017 09:16:27 -0500 Received: from e06smtp14.uk.ibm.com (e06smtp14.uk.ibm.com [195.75.94.110]) by mx0a-001b2d01.pphosted.com with ESMTP id 2ejjwajub3-1 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=NOT) for ; Thu, 30 Nov 2017 09:16:24 -0500 Received: from localhost by e06smtp14.uk.ibm.com with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted for from ; Thu, 30 Nov 2017 14:16:07 -0000 Received: from b06cxnps4076.portsmouth.uk.ibm.com (9.149.109.198) by e06smtp14.uk.ibm.com (192.168.101.144) with IBM ESMTP SMTP Gateway: Authorized Use Only! Violators will be prosecuted; Thu, 30 Nov 2017 14:16:04 -0000 Received: from d06av26.portsmouth.uk.ibm.com (d06av26.portsmouth.uk.ibm.com [9.149.105.62]) by b06cxnps4076.portsmouth.uk.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id vAUEG4QV17432594; Thu, 30 Nov 2017 14:16:04 GMT Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id B8026AE055; Thu, 30 Nov 2017 14:09:09 +0000 (GMT) Received: from d06av26.portsmouth.uk.ibm.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 4E95DAE045; Thu, 30 Nov 2017 14:09:09 +0000 (GMT) Received: from [9.145.49.184] (unknown [9.145.49.184]) by d06av26.portsmouth.uk.ibm.com (Postfix) with ESMTP; Thu, 30 Nov 2017 14:09:09 +0000 (GMT) Subject: Re: [PATCH] vfio/iommu_type1: report the IOMMU aperture info To: Jean-Philippe Brucker , "alex.williamson@redhat.com" Cc: "cohuck@redhat.com" , "borntraeger@de.ibm.com" , "zyimin@linux.vnet.ibm.com" , "pasic@linux.vnet.ibm.com" , "kvm@vger.kernel.org" , "linux-kernel@vger.kernel.org" References: <1512041678-4563-1-git-send-email-pmorel@linux.vnet.ibm.com> <1ad1aff9-1651-d1a9-cd1b-07bfd7dd0817@arm.com> From: Pierre Morel Date: Thu, 30 Nov 2017 15:16:03 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.4.0 MIME-Version: 1.0 In-Reply-To: <1ad1aff9-1651-d1a9-cd1b-07bfd7dd0817@arm.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Language: en-US Content-Transfer-Encoding: 8bit X-TM-AS-GCONF: 00 x-cbid: 17113014-0016-0000-0000-000005075E0A X-IBM-AV-DETECTION: SAVI=unused REMOTE=unused XFE=unused x-cbparentid: 17113014-0017-0000-0000-000028434A75 Message-Id: <7cf3e03e-e9b4-0e27-098b-3bc391abcf96@linux.vnet.ibm.com> X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10432:,, definitions=2017-11-30_04:,, signatures=0 X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 priorityscore=1501 malwarescore=0 suspectscore=0 phishscore=0 bulkscore=0 spamscore=0 clxscore=1015 lowpriorityscore=0 impostorscore=0 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1709140000 definitions=main-1711300187 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 30/11/2017 13:57, Jean-Philippe Brucker wrote: > Hello, > > On 30/11/17 11:34, Pierre Morel wrote: > [...] >> +/** >> + * vfio_get_aperture - report minimal aperture of a vfio_iommu >> + * @iommu: the current vfio_iommu >> + * @start: a pointer to the aperture start >> + * @end : a pointer to the aperture end >> + * >> + * This function iterate on the domains using the given vfio_iommu >> + * and restrict the aperture to the minimal aperture common >> + * to all domains sharing this vfio_iommu. >> + */ >> +static void vfio_get_aperture(struct vfio_iommu *iommu, uint64_t *start, >> + uint64_t *end) >> +{ >> + struct iommu_domain_geometry geometry; >> + struct vfio_domain *domain; >> + >> + *start = 0; >> + *end = U64_MAX; > > I wonder if the default values should also reflect what the VFIO > implementation actually supports. Looking at vfio_dma_do_map, a 32-bit > host will reject any iova greater than 32 bits. In addition, > vfio_dma_do_unmap doesn't support unmapping the last page of a 64-bit > address space (existing IOMMUs would probably reject map requests with > IOVA > 52 bits anyway, but if they don't report a domain aperture, VFIO > can't guess it). > > I think it's convenient to use VFIO_IOMMU_UNMAP_DMA on the full address > space when an unmap-all is needed, maybe we could provide default aperture > values that help doing this? (~0U for 32-bit and (~0ULL - PAGE_SIZE) for > 64-bit) > > Thanks, > Jean > Thanks, I will take care of this. Pierre -- Pierre Morel Linux/KVM/QEMU in B�blingen - Germany From 1585500379417562666@xxx Thu Nov 30 14:09:50 +0000 2017 X-GM-THRID: 1585490648319889089 X-Gmail-Labels: Inbox,Category Forums,HistoricalUnread