From: Robin Murphy <robin.murphy@arm.com>
To: pmorel@linux.ibm.com, gerald.schaefer@de.ibm.com
Cc: linux-s390@vger.kernel.org, walling@linux.ibm.com,
Jean-Philippe Brucker <jean-philippe.brucker@arm.com>,
iommu@lists.linux-foundation.org, linux-kernel@vger.kernel.org,
alex.williamson@redhat.com
Subject: Re: [PATCH v1] iommu/s390: Declare s390 iommu reserved regions
Date: Mon, 21 Jan 2019 12:49:34 +0000 [thread overview]
Message-ID: <70a30a0a-cee6-ac59-61fc-b4b018467179@arm.com> (raw)
In-Reply-To: <3cd790d6-aa6f-e817-27ce-56d7a9b6b6e5@linux.ibm.com>
On 18/01/2019 13:29, Pierre Morel wrote:
> On 17/01/2019 14:02, Robin Murphy wrote:
>> On 15/01/2019 17:37, Pierre Morel wrote:
>>> The s390 iommu can only allow DMA transactions between the zPCI device
>>> entries start_dma and end_dma.
>>>
>>> Let's declare the regions before start_dma and after end_dma as
>>> reserved regions using the appropriate callback in iommu_ops.
>>>
>>> The reserved region may later be retrieved from sysfs or from
>>> the vfio iommu internal interface.
>>
>> For this particular case, I think the best solution is to give VFIO
>> the ability to directly interrogate the domain geometry (which s390
>> appears to set correctly already). The idea of reserved regions was
>> really for 'unexpected' holes inside the usable address space - using
>> them to also describe places that are entirely outside that address
>> space rather confuses things IMO.
>>
>> Furthermore, even if we *did* end up going down the route of actively
>> reserving addresses beyond the usable aperture, it doesn't seem
>> sensible for individual drivers to do it themselves when the core API
>> already describes the relevant information generically.
>>
>> Robin.
>
> Robin,
>
> I already posted a patch retrieving the geometry through
> VFIO_IOMMU_GET_INFO using a specific capability for the geometry [1],
> and AFAIU, Alex did not agree with this.
>
> What is different in what you propose?
I didn't mean to imply that aperture and reserved regions are mutually
exclusive, just that they are conceptually distinct things, i.e. there
is a fundamental difference between "address which could in theory be
mapped but wouldn't work as expected" and "address which is physically
impossible to map at all".
Admittedly I hadn't closely followed all of the previous discussions,
and Alex has a fair point - for VFIO users who will mostly care about
checking whether two address maps are compatible, it probably is more
useful to just describe a single list of usable regions, rather than the
absolute bounds plus a list of unusable holes within them. That still
doesn't give us any need to conflate things throughout the kernel
internals, though - the typical usage there is to size an IOVA allocator
or page table based on the aperture, then carve out any necessary
reservations. In that context, having to be aware of and handle
'impossible' reservations outside the aperture just invites bugs and
adds complexity that would be better avoided.
Robin.
>
> @Alex: I was hoping that this patch goes in your direction. What do you
> think?
>
> Thanks,
> Pierre
>
> [1]: https://lore.kernel.org/patchwork/patch/1030369/
>
>>
>>>
>>> This seems to me related with the work Shameer has started on
>>> vfio_iommu_type1 so I add Alex and Shameer to the CC list.
>>>
>>>
>>> Pierre Morel (1):
>>> iommu/s390: Declare s390 iommu reserved regions
>>>
>>> drivers/iommu/s390-iommu.c | 29 +++++++++++++++++++++++++++++
>>> 1 file changed, 29 insertions(+)
>>>
>>
>
>
prev parent reply other threads:[~2019-01-21 12:49 UTC|newest]
Thread overview: 14+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-01-15 17:37 [PATCH v1] iommu/s390: Declare s390 iommu reserved regions Pierre Morel
2019-01-15 17:37 ` Pierre Morel
2019-01-15 19:33 ` Gerald Schaefer
2019-01-16 9:33 ` Pierre Morel
2019-01-17 9:23 ` Shameerali Kolothum Thodi
2019-01-17 13:02 ` Pierre Morel
2019-01-17 13:02 ` Robin Murphy
2019-01-18 13:29 ` Pierre Morel
2019-01-18 13:51 ` Jean-Philippe Brucker
2019-01-18 13:51 ` Jean-Philippe Brucker
2019-01-21 11:51 ` Pierre Morel
2019-01-21 15:50 ` Jean-Philippe Brucker
2019-01-22 17:58 ` Alex Williamson
2019-01-21 12:49 ` Robin Murphy [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=70a30a0a-cee6-ac59-61fc-b4b018467179@arm.com \
--to=robin.murphy@arm.com \
--cc=alex.williamson@redhat.com \
--cc=gerald.schaefer@de.ibm.com \
--cc=iommu@lists.linux-foundation.org \
--cc=jean-philippe.brucker@arm.com \
--cc=linux-kernel@vger.kernel.org \
--cc=linux-s390@vger.kernel.org \
--cc=pmorel@linux.ibm.com \
--cc=walling@linux.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.