From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 84819D68BDA for ; Fri, 15 Nov 2024 22:13:21 +0000 (UTC) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1tC4YU-0000qn-B5; Fri, 15 Nov 2024 17:12:42 -0500 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tC4YS-0000qP-Vy; Fri, 15 Nov 2024 17:12:41 -0500 Received: from mail-dm6nam12on20604.outbound.protection.outlook.com ([2a01:111:f403:2417::604] helo=NAM12-DM6-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1tC4YQ-00079M-3n; Fri, 15 Nov 2024 17:12:40 -0500 ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wa4bGiJ2F6W/n0nu6twfBEI4r1LkkFH2hDoBWw6xYOUh99/jfGfdj3Nh0gHnoAVhrY+C8y4JATFlGJZ9b62LTrp1+mez8YdmVAct5rqbLy6ok7XI193m1xWjZzQUf5zZ7BlLuZ6G/U6mcgqimiaJ9wMT4VHNYJGXJN8dDwbOg214iVeRUoZ+1zHGs2S7cxRbsffxL8H5OOui3nZc6AA2wI5Mt3NrjUbUDbgqVHrRMZ9StHcpL5rtWGge+WcTkp+RNk940dq8Blff1Eq33VOsg24H5jXVHqfpVMBMOgiRSwQE/l2h3UfI80cNktYrPRLsoECeHjpu0eQjA2D39NeFog== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=JCKdkj34elrzrch45Y0A03++SfE04vRhJ88Oah2C+3s=; b=ZdHQdCCvLbbc4jTGcBQNtAsXNsvtUVft5nRQYFHVgFotBnM7hB4uRBl/aEbdrl8VrKHwx4EFw40XJ5pio8uJuQiWm8Yx4Sg98MjgNY02g4TX+87JlewzSa5vYqz5bKrA3LGL5MWMqzKBk6fPQmLxSqxT0h4BZPUCjmJczCk+ZriTfTXkbkFjf8UUeSVfpEJFXduFU9niIo+uW0Tf3PdMcOPqmKCajQ70kH6YBvkCL677PdTAlGfLq9Ssch5BO5YgvIOZ+j1wkZ9LJiXqFshPwaByorANHUn2xPZYyATHQxMS8foYo96f+MZ7dfDoWpI+kQHGpQpNdHgfnbzIiW8lpg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.118.233) smtp.rcpttodomain=redhat.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=JCKdkj34elrzrch45Y0A03++SfE04vRhJ88Oah2C+3s=; b=oA9EMJ8n4HS9R2CXUFCWEGMjO759gdsIUnOxJPJOSiJJwvoVgZR5oMXkDkQfp+94XWjRhbA3nZfUiKbDPqBITexNUDuYhRp7wRxPLkxz+E7fwMCJma6XSBCROZWD8sFasq4VPDwxU8oqrFKRbGZCH9jusQ4xcyfpFUSik8g8aJPWLMpiILJW9C1hKJ9+N6Gkdl2Bj4DpZEP2YyW0AeSTOXqyLB7MIwd0JpnVur1mnn83oiVfhn5BnUDpsmnVtCh1mhZ/m1m7/xHw8ZJLvwVuohKvU1jlsLiUBiRMosdmZVGCLjCxRZ6fpVSuG5yJ/gexUj622BswzDvB29xGCUtZmg== Received: from BYAPR06CA0014.namprd06.prod.outlook.com (2603:10b6:a03:d4::27) by DM4PR12MB6591.namprd12.prod.outlook.com (2603:10b6:8:8e::13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8158.20; Fri, 15 Nov 2024 22:12:31 +0000 Received: from MWH0EPF000A6732.namprd04.prod.outlook.com (2603:10b6:a03:d4:cafe::d) by BYAPR06CA0014.outlook.office365.com (2603:10b6:a03:d4::27) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8158.17 via Frontend Transport; Fri, 15 Nov 2024 22:12:30 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.118.233) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.118.233 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.118.233; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.118.233) by MWH0EPF000A6732.mail.protection.outlook.com (10.167.249.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.8158.14 via Frontend Transport; Fri, 15 Nov 2024 22:12:30 +0000 Received: from drhqmail201.nvidia.com (10.126.190.180) by mail.nvidia.com (10.127.129.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 15 Nov 2024 14:12:23 -0800 Received: from drhqmail201.nvidia.com (10.126.190.180) by drhqmail201.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Fri, 15 Nov 2024 14:12:23 -0800 Received: from Asurada-Nvidia (10.127.8.12) by mail.nvidia.com (10.126.190.180) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4 via Frontend Transport; Fri, 15 Nov 2024 14:12:22 -0800 Date: Fri, 15 Nov 2024 14:12:21 -0800 From: Nicolin Chen To: Eric Auger CC: Shameerali Kolothum Thodi , "qemu-arm@nongnu.org" , "qemu-devel@nongnu.org" , "peter.maydell@linaro.org" , "jgg@nvidia.com" , "ddutile@redhat.com" , Linuxarm , "Wangzhou (B)" , jiangkunkun , Jonathan Cameron , "zhangfei.gao@linaro.org" Subject: Re: [RFC PATCH 5/5] hw/arm/virt-acpi-build: Add IORT RMR regions to handle MSI nested binding Message-ID: References: <20241108125242.60136-1-shameerali.kolothum.thodi@huawei.com> <20241108125242.60136-6-shameerali.kolothum.thodi@huawei.com> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: X-NV-OnPremToCloud: ExternallySecured X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: MWH0EPF000A6732:EE_|DM4PR12MB6591:EE_ X-MS-Office365-Filtering-Correlation-Id: 9023cc3b-34e7-4a79-0444-08dd05c29932 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230040|1800799024|36860700013|376014|7416014|82310400026; X-Microsoft-Antispam-Message-Info: =?us-ascii?Q?Hl4fT+dIik56+pQYDMkj0LUKHV82NG4CaxNPToCm59/gH7+xAmX6EIonCIu+?= =?us-ascii?Q?2DUm+1JiuWAys0I/Xm5Mbk9V5+qYoES3SdkuVq7bW9P4pNAbSDHwPCuvapU0?= =?us-ascii?Q?TslpUorNmCpohdylT8uktoU5QxqNlqZgfvLZJoQem0F7yOem351lhqNr04pY?= =?us-ascii?Q?cgdOp0/8zhLDQTXmiR+ANt3lu558y+TBLI2VWvxXOgAhIR3fkvCRsQUYlfk2?= =?us-ascii?Q?qe+KQrDmKarW2q1d0Ani7RKHGRCssbLMRcCnGg3Jcacfkxst+AUdaXBkXYn6?= =?us-ascii?Q?26r8bjev25/threAb7gFAPDcZ8/FJx8iOhTU6AZJgd4fNf1wTDPRDbsvsbp6?= =?us-ascii?Q?puRxwal8Z15KE+m3eGxlUKDaNRhl07y36Pw1Ia1iB2wHjxtlQDV10O7oSCIM?= =?us-ascii?Q?0sPjFG1Dl0R8syPRKtZwMY1xoSRR7T7C/Cj/Q2ZTui8fcqYTDhwIyJBrrJ8l?= =?us-ascii?Q?uhUXnAcYO13rfKa3C7IBT6Fj32u59KHG5Dy100YwY7Dk2fgXDVeDeTe8fY1Z?= =?us-ascii?Q?jpwWnW9faWyIGjgDAfVUFPUEuMCHhVec3t0zgxPmvTH9JhB6HxYQgJDKvg+s?= =?us-ascii?Q?1EGzLZl38n/mY9MBHjAaX9jvskH4Hfhy/ju4f6s9wttjDpfvxSHZtMdiR2Yv?= =?us-ascii?Q?zajaLcTC+8/he4ik6j/SsxKpw0L6yeeu/+mUjQ4vP9XQlpGXftlMLRsKOMff?= =?us-ascii?Q?ZT0ll8towZGGAZpQygx21juYoXqfyuGFitm1elwGdoVdSSdNBuECZUrW6mGs?= =?us-ascii?Q?zsd5jBtpVwLLrXUdedEGfFyAU6zPZqiqGnTAVJzSaC9NcttUkD0BpIkqd0hd?= =?us-ascii?Q?opJY+Zt+GiNDDKQA94vK9La/VzzmO+BUTZCIp4oSp8l0KUDHToNmlOwNQbLH?= =?us-ascii?Q?TgAJlI2rZA5rtYFMpC1yNmEpj7zLNAuwaPSn0uNq3HQvNnWLINbQDQVVecRN?= =?us-ascii?Q?fEmoxaBY+h9NjORw776Rk9dUWdNp9EXIHCtWvmymIU8TwVETHZnz5e/TySjk?= =?us-ascii?Q?LBRfbnxdJVAH/5Ehy0hFeNPy5VKq82ztVaUWNSDFq+JDVbAkirNex9ws8jD1?= =?us-ascii?Q?CHC50SNfq4rabTNG2uJDPBYWQrQpydVg8W9oKhwlj+tujx7hbgp2flUUGmTK?= =?us-ascii?Q?lBvEZrdNSdPspaPr6uWaJdi0j09kDqoTUs+IH30L9/3WUhEjhLhnr8BOkytT?= =?us-ascii?Q?3y860P4SBU/2k8Kn8UoFN1WyUgDJi0w1OzYDXvteLKnjVEOcSueZcyxBTpFc?= =?us-ascii?Q?+BFSTm4k0VVV8meeHjAZY1688cBVb7gSVRY2c+nCOp9pCk7aNVRPRny3zRhL?= =?us-ascii?Q?nAtNqxoOq39nUOPQ7cMQZ64T94Fpmm1OsAVJKJVMe/UtKcO+Tmq53E54r/Xv?= =?us-ascii?Q?+KmshqzL9TwQ6bf6Vtgt4oBIGuOf36ItHncsIe10M7VEdrJEQw=3D=3D?= X-Forefront-Antispam-Report: CIP:216.228.118.233; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc7edge2.nvidia.com; CAT:NONE; SFS:(13230040)(1800799024)(36860700013)(376014)(7416014)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 15 Nov 2024 22:12:30.7839 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 9023cc3b-34e7-4a79-0444-08dd05c29932 X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.118.233]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: MWH0EPF000A6732.namprd04.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR12MB6591 Received-SPF: softfail client-ip=2a01:111:f403:2417::604; envelope-from=nicolinc@nvidia.com; helo=NAM12-DM6-obe.outbound.protection.outlook.com X-Spam_score_int: -21 X-Spam_score: -2.2 X-Spam_bar: -- X-Spam_report: (-2.2 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.12, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org Sender: qemu-devel-bounces+qemu-devel=archiver.kernel.org@nongnu.org On Thu, Nov 14, 2024 at 11:41:58AM +0100, Eric Auger wrote: > Hi Shameer, > > On 11/14/24 09:48, Shameerali Kolothum Thodi wrote: > > > >> -----Original Message----- > >> From: Nicolin Chen > >> Sent: Wednesday, November 13, 2024 6:31 PM > >> To: Shameerali Kolothum Thodi > >> Cc: qemu-arm@nongnu.org; qemu-devel@nongnu.org; > >> eric.auger@redhat.com; peter.maydell@linaro.org; jgg@nvidia.com; > >> ddutile@redhat.com; Linuxarm ; Wangzhou (B) > >> ; jiangkunkun ; > >> Jonathan Cameron ; > >> zhangfei.gao@linaro.org > >> Subject: Re: [RFC PATCH 5/5] hw/arm/virt-acpi-build: Add IORT RMR regions > >> to handle MSI nested binding > >> > >> On Fri, Nov 08, 2024 at 12:52:42PM +0000, Shameer Kolothum wrote: > >>> From: Eric Auger > >>> > >>> To handle SMMUv3 nested stage support it is practical to expose the > >>> guest with reserved memory regions (RMRs) covering the IOVAs used by > >>> the host kernel to map physical MSI doorbells. > >> There has been an ongoing solution for MSI alternative: > >> https://lore.kernel.org/kvm/cover.1731130093.git.nicolinc@nvidia.com/ > >> > >> So, I think we should keep this patch out of this series, instead put it on top > >> of the testing branch. > > Yes. I think then we can support DT solution as well. > > > > On that MSI RFC above, have you seen Eric's earlier/initial proposal to bind the Guest MSI in > > nested cases. IIRC, it was providing an IOCTL and then creating a mapping in the host. > > > > I think this is the latest on that. > > https://lore.kernel.org/linux-iommu/20210411114659.15051-4-eric.auger@redhat.com/ > yes this is the latest before I stopped my VFIO integration efforts. > > > > But not sure, why we then moved to RMR approach. Eric? > > This was indeed the 1st integration approach. Using RMR instead was > suggested by Jean-Philippe and I considered it as simpler (because we > needed the SET_MSI_BINDING iotcl) so I changed the approach. Oh, I didn't realized Eric had this.. Now, Robin wanted it back (in iommufd though), against the RMR :-/ Nicolin