From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S935637AbcKWUMu (ORCPT ); Wed, 23 Nov 2016 15:12:50 -0500 Received: from mx1.redhat.com ([209.132.183.28]:46484 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S933283AbcKWUMs (ORCPT ); Wed, 23 Nov 2016 15:12:48 -0500 Subject: Re: Summary of LPC guest MSI discussion in Santa Fe To: Jon Masters , Will Deacon , Alex Williamson References: <1478209178-3009-1-git-send-email-eric.auger@redhat.com> <20161103220205.37715b49@t450s.home> <20161108024559.GA20591@arm.com> <83d7bf8e-1aa9-b61b-4e83-ba9da1926d19@jonmasters.org> Cc: Eric Auger , eric.auger.pro@gmail.com, christoffer.dall@linaro.org, marc.zyngier@arm.com, robin.murphy@arm.com, joro@8bytes.org, tglx@linutronix.de, jason@lakedaemon.net, linux-arm-kernel@lists.infradead.org, kvm@vger.kernel.org, drjones@redhat.com, linux-kernel@vger.kernel.org, pranav.sawargaonkar@gmail.com, iommu@lists.linux-foundation.org, punit.agrawal@arm.com, diana.craciun@nxp.com, benh@kernel.crashing.org, arnd@arndb.de, jcm@redhat.com, dwmw@amazon.co.uk From: Don Dutile Message-ID: <5835F839.40905@redhat.com> Date: Wed, 23 Nov 2016 15:12:41 -0500 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.2.0 MIME-Version: 1.0 In-Reply-To: <83d7bf8e-1aa9-b61b-4e83-ba9da1926d19@jonmasters.org> Content-Type: text/plain; charset=utf-8; format=flowed Content-Transfer-Encoding: 7bit X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.26]); Wed, 23 Nov 2016 20:12:48 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/21/2016 12:13 AM, Jon Masters wrote: > On 11/07/2016 07:45 PM, Will Deacon wrote: > >> I figured this was a reasonable post to piggy-back on for the LPC minutes >> relating to guest MSIs on arm64. > > Thanks for this Will. I'm still digging out post-LPC and SC16, but the > summary was much appreciated, and I'm glad the conversation is helping. > >> 1. The physical memory map is not standardised (Jon pointed out that >> this is something that was realised late on) > > Just to note, we discussed this one about 3-4 years ago. I recall making > a vigorous slideshow at a committee meeting in defense of having a > single memory map for ARMv8 servers and requiring everyone to follow it. > I was weak. I listened to the comments that this was "unreasonable". > Instead, I consider it was unreasonable of me to not get with the other > OS vendors and force things to be done one way. The lack of a "map at > zero" RAM location on ARMv8 has been annoying enough for 32-bit DMA only > devices on 64-bit (behind an SMMU but in passthrough mode it doesn't > help) and other issues beyond fixing the MSI doorbell regions. If I ever > have a time machine, I tried harder. > >> Jon pointed out that most people are pretty conservative about hardware >> choices when migrating between them -- that is, they may only migrate >> between different revisions of the same SoC, or they know ahead of time >> all of the memory maps they want to support and this could be communicated >> by way of configuration to libvirt. > > I think it's certainly reasonable to assume this in an initial > implementation and fix it later. Currently, we're very conservative > about host CPU passthrough anyway and can't migrate from one microarch > to another revision of the same microarch even. And on x86, nobody > really supports e.g. Intel to AMD and back again. I've always been of Thats primarily due to diff virt implentations ... vme vs svm. 1) thats not the case here; can argue cross arch variations .. gicv2 vs gicv3 vs gicv4 ... but cross vendor should work if arch and common feature map (like x86 libvirt can resolve) is provided 2) second chance to do it better; look n learn! and common thread i am trying to drive home here ... learn from past mistakes *and* good choices. > the mind that we should ensure the architecture can handle this, but > then cautiously approach this with a default to not doing it. > >> Alex asked if there was a security >> issue with DMA bypassing the SMMU, but there aren't currently any systems >> where that is known to happen. Such a system would surely not be safe for >> passthrough. > > There are other potential security issues that came up but don't need to > be noted here (yet). I have wanted to clarify the SBSA for a long time > when it comes to how IOMMUs should be implemented. It's past time that > we went back and had a few conversations about that. I've poked. > >> Ben mused that a way to handle conflicts dynamically might be to hotplug >> on the entire host bridge in the guest, passing firmware tables describing >> the new reserved regions as a property of the host bridge. Whilst this >> may well solve the issue, it was largely considered future work due to >> its invasive nature and dependency on firmware tables (and guest support) >> that do not currently exist. > > Indeed. It's an elegant solution (thanks Ben) that I gather POWER > already does (good for them). We've obviously got a few things to clean > up after we get the basics in place. Again, I think we can consider it > reasonable that the MSI doorbell regions are predetermined on system A > well ahead of any potential migration (that may or may not then work) > for the moment. Vendors will want to loosen this later, and they can > drive the work to do that, for example by hotplugging a host bridge. > > Jon. >