Cover Letter Detail
Show a cover letter.
GET /api/1.1/covers/2229551/?format=api
{ "id": 2229551, "url": "http://patchwork.ozlabs.org/api/1.1/covers/2229551/?format=api", "web_url": "http://patchwork.ozlabs.org/project/kvm-riscv/cover/20260428131359.34872-1-fangyu.yu@linux.alibaba.com/", "project": { "id": 70, "url": "http://patchwork.ozlabs.org/api/1.1/projects/70/?format=api", "name": "Linux KVM RISC-V", "link_name": "kvm-riscv", "list_id": "kvm-riscv.lists.infradead.org", "list_email": "kvm-riscv@lists.infradead.org", "web_url": "", "scm_url": "", "webscm_url": "" }, "msgid": "<20260428131359.34872-1-fangyu.yu@linux.alibaba.com>", "date": "2026-04-28T13:13:48", "name": "[RFC,00/11] iommu/riscv: Add hardware dirty tracking for second-stage domains", "submitter": { "id": 91416, "url": "http://patchwork.ozlabs.org/api/1.1/people/91416/?format=api", "name": null, "email": "fangyu.yu@linux.alibaba.com" }, "mbox": "http://patchwork.ozlabs.org/project/kvm-riscv/cover/20260428131359.34872-1-fangyu.yu@linux.alibaba.com/mbox/", "series": [ { "id": 501850, "url": "http://patchwork.ozlabs.org/api/1.1/series/501850/?format=api", "web_url": "http://patchwork.ozlabs.org/project/kvm-riscv/list/?series=501850", "date": "2026-04-28T13:13:48", "name": "iommu/riscv: Add hardware dirty tracking for second-stage domains", "version": 1, "mbox": "http://patchwork.ozlabs.org/series/501850/mbox/" } ], "comments": "http://patchwork.ozlabs.org/api/covers/2229551/comments/", "headers": { "Return-Path": "\n <kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org>", "X-Original-To": "incoming@patchwork.ozlabs.org", "Delivered-To": "patchwork-incoming@legolas.ozlabs.org", "Authentication-Results": [ "legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n secure) header.d=lists.infradead.org header.i=@lists.infradead.org\n header.a=rsa-sha256 header.s=bombadil.20210309 header.b=iXZrLH+d;\n\tdkim=fail reason=\"signature verification failed\" (1024-bit key;\n unprotected) header.d=linux.alibaba.com header.i=@linux.alibaba.com\n header.a=rsa-sha256 header.s=default header.b=xsmC5wAY;\n\tdkim-atps=neutral", "legolas.ozlabs.org;\n spf=none (no SPF record) smtp.mailfrom=lists.infradead.org\n (client-ip=2607:7c80:54:3::133; helo=bombadil.infradead.org;\n envelope-from=kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org;\n receiver=patchwork.ozlabs.org)" ], "Received": [ "from bombadil.infradead.org (bombadil.infradead.org\n [IPv6:2607:7c80:54:3::133])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g4grS3B4sz1xrS\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 28 Apr 2026 23:14:32 +1000 (AEST)", "from localhost ([::1] helo=bombadil.infradead.org)\n\tby bombadil.infradead.org with esmtp (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHiGk-00000001V0q-2Mev;\n\tTue, 28 Apr 2026 13:14:30 +0000", "from out30-111.freemail.mail.aliyun.com ([115.124.30.111])\n\tby bombadil.infradead.org with esmtps (Exim 4.98.2 #2 (Red Hat Linux))\n\tid 1wHiGg-00000001UyS-2XCS;\n\tTue, 28 Apr 2026 13:14:29 +0000", "from localhost.localdomain(mailfrom:fangyu.yu@linux.alibaba.com\n fp:SMTPD_---0X1ubICp_1777382049 cluster:ay36)\n by smtp.aliyun-inc.com;\n Tue, 28 Apr 2026 21:14:12 +0800" ], "DKIM-Signature": [ "v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=lists.infradead.org; s=bombadil.20210309; h=Sender:\n\tContent-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post:\n\tList-Archive:List-Unsubscribe:List-Id:MIME-Version:Message-Id:Date:Subject:Cc\n\t:To:From:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From:\n\tResent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References:\n\tList-Owner; bh=xtO2HsDQmxTTN/dVfVFeQYDUXdYCV8llC9axqDcX2U4=; b=iXZrLH+diZGosC\n\t5sbgtBaAutWh2DNOXddp0F/Kcfx92BjHMj5AiYlXEg9DlN1zYEYpE1FpHOwHzMvrPS6qzZgfHZFZZ\n\t911+K//SWwjG1MHPKlkBsr97MDw9UbC8X7xKQgqaV2YHWN4wLpdeFpoqhVMMAzRCuJBL53Dc3FLqx\n\tdz+bi5EmsXdTzVJl2+eNW9nYxqvmFW4SeJj1HFGWquKmjPPCVOqULnMsFuEsMPbs513hlYCbqcDtN\n\t2Nfo92/wHBg7CLrYNszIzbiNFq1VtHAVZirAGxe2izszD9hUb64vEBvSzYJVDGdgz33+11ZMHFFzJ\n\tDjeQzpfUtUZdXOslmpCw==;", "v=1; a=rsa-sha256; c=relaxed/relaxed;\n\td=linux.alibaba.com; s=default;\n\tt=1777382058; h=From:To:Subject:Date:Message-Id:MIME-Version:Content-Type;\n\tbh=2eUnDZEfxgG5YZ/aUJ43Dh+182ud/Kd1EhVPQjTWqdA=;\n\tb=xsmC5wAYnTQRZaE0N019Ocxzpf0XIO55wvWrCW7shGbqdsijN0JhIRJJrVmct1jLzsh15PTmLmXJuOeObeeQOLNZA+vnPfCjFJTs/2g4Bk3ZfrzkI4szu/ecDTfVmWh6UvM/qTHYE+fHaAEkL+qRneUvsd6sYncQxEAxS160qNM=" ], "X-Alimail-AntiSpam": "\n AC=PASS;BC=-1|-1;BR=01201311R511e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=maildocker-contentspam033037009110;MF=fangyu.yu@linux.alibaba.com;NM=1;PH=DS;RN=23;SR=0;TI=SMTPD_---0X1ubICp_1777382049;", "From": "fangyu.yu@linux.alibaba.com", "To": "joro@8bytes.org,\n\twill@kernel.org,\n\trobin.murphy@arm.com,\n\tpjw@kernel.org,\n\tpalmer@dabbelt.com,\n\taou@eecs.berkeley.edu,\n\talex@ghiti.fr,\n\ttjeznach@rivosinc.com,\n\tjgg@ziepe.ca,\n\tkevin.tian@intel.com,\n\tbaolu.lu@linux.intel.com,\n\tvasant.hegde@amd.com,\n\tanup@brainfault.org,\n\tatish.patra@linux.dev,\n\tskhawaja@google.com,\n\tjgg@nvidia.com", "Cc": "guoren@kernel.org,\n\tkvm@vger.kernel.org,\n\tiommu@lists.linux.dev,\n\tkvm-riscv@lists.infradead.org,\n\tlinux-riscv@lists.infradead.org,\n\tlinux-kernel@vger.kernel.org,\n\tFangyu Yu <fangyu.yu@linux.alibaba.com>", "Subject": "[RFC PATCH 00/11] iommu/riscv: Add hardware dirty tracking for\n second-stage domains", "Date": "Tue, 28 Apr 2026 21:13:48 +0800", "Message-Id": "<20260428131359.34872-1-fangyu.yu@linux.alibaba.com>", "X-Mailer": "git-send-email 2.39.3 (Apple Git-146)", "MIME-Version": "1.0", "X-CRM114-Version": "20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 ", "X-CRM114-CacheID": "sfid-20260428_061427_682494_4B049C5F ", "X-CRM114-Status": "UNSURE ( 8.54 )", "X-CRM114-Notice": "Please train this message.", "X-Spam-Score": "-17.6 (-----------------)", "X-Spam-Report": "Spam detection software,\n running on the system \"bombadil.infradead.org\",\n has NOT identified this incoming email as spam. The original\n message has been attached to this so you can view it or label\n similar future email. If you have any questions, see\n the administrator of that system for details.\n Content preview: From: Fangyu Yu <fangyu.yu@linux.alibaba.com> The RISC-V\n IOMMU\n architecture defines an AMO_HWAD capability (Hardware Access/Dirty update)\n that allows the IOMMU to atomically set the A/D bits in second-stage PTEs\n on DMA access. When DC.tc.GADE is [...]\n Content analysis details: (-17.6 points, 5.0 required)\n pts rule name description\n ---- ----------------------\n --------------------------------------------------\n -0.0 RCVD_IN_DNSWL_NONE RBL: Sender listed at https://www.dnswl.org/, no\n trust\n [115.124.30.111 listed in list.dnswl.org]\n -7.5 USER_IN_DEF_SPF_WL From: address is in the default SPF welcome-list\n 0.0 SPF_HELO_NONE SPF: HELO does not publish an SPF Record\n -0.0 SPF_PASS SPF: sender matches SPF record\n -7.5 USER_IN_DEF_DKIM_WL From: address is in the default DKIM welcome-list\n -0.1 DKIM_VALID_EF Message has a valid DKIM or DK signature from\n envelope-from domain\n 0.1 DKIM_SIGNED Message has a DKIM or DK signature,\n not necessarily valid\n -0.1 DKIM_VALID Message has at least one valid DKIM or DK\n signature\n -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from\n author's\n domain\n -1.9 BAYES_00 BODY: Bayes spam probability is 0 to 1%\n [score: 0.0000]\n -0.5 ENV_AND_HDR_SPF_MATCH Env and Hdr From used in default SPF WL Match\n 0.0 UNPARSEABLE_RELAY Informational: message has unparseable relay\n lines", "X-BeenThere": "kvm-riscv@lists.infradead.org", "X-Mailman-Version": "2.1.34", "Precedence": "list", "List-Id": "<kvm-riscv.lists.infradead.org>", "List-Unsubscribe": "<http://lists.infradead.org/mailman/options/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=unsubscribe>", "List-Archive": "<http://lists.infradead.org/pipermail/kvm-riscv/>", "List-Post": "<mailto:kvm-riscv@lists.infradead.org>", "List-Help": "<mailto:kvm-riscv-request@lists.infradead.org?subject=help>", "List-Subscribe": "<http://lists.infradead.org/mailman/listinfo/kvm-riscv>,\n <mailto:kvm-riscv-request@lists.infradead.org?subject=subscribe>", "Content-Type": "text/plain; charset=\"utf-8\"", "Content-Transfer-Encoding": "base64", "Sender": "\"kvm-riscv\" <kvm-riscv-bounces@lists.infradead.org>", "Errors-To": "kvm-riscv-bounces+incoming=patchwork.ozlabs.org@lists.infradead.org" }, "content": "From: Fangyu Yu <fangyu.yu@linux.alibaba.com>\n\nThe RISC-V IOMMU architecture defines an AMO_HWAD capability (Hardware\nAccess/Dirty update) that allows the IOMMU to atomically set the A/D bits\nin second-stage PTEs on DMA access. When DC.tc.GADE is asserted, the IOMMU\nautonomously sets D on the first write to a page mapped by an iohgatp\ndomain. This series wires that capability up to the iommufd dirty-tracking\ninterface (IOMMU_HWPT_SET_DIRTY_TRACKING / IOMMU_HWPT_GET_DIRTY_BITMAP) and\nreports IOMMU_CAP_DIRTY_TRACKING.\n\nDesign notes\n------------\n\n* The feature is scoped to second-stage (iohgatp) domains only; these are\n the domains created for KVM / VFIO device pass-through when userspace\n allocates an HWPT with IOMMU_HWPT_ALLOC_NEST_PARENT or\n IOMMU_HWPT_ALLOC_DIRTY_TRACKING. First-stage (iosatp) domains are not\n touched by this series.\n\n* The page-table side plugs into the existing generic_pt dirty hook\n framework (amdv1 / vtdss style). RISC-V adds the three required PTE\n ops – is_write_dirty / make_write_clean / make_write_dirty.\n\nTesting\n-------\n\n* Test on QEMU RISC-V, a virtio-net and an e1000e device was passed through\n to an L2 guest via vfio-pci + iommufd.\n\n* generic_pt KUnit: the existing test_dirty case now runs and passes for\n the RISC-V 64-bit format.\n\nFollow-up work\n--------------\n* Build a dedicated end-to-end test case that drives the full flow\n (HWPT_ALLOC with DIRTY_TRACKING -> attach -> IOAS_MAP -> generate real\n DMA -> SET_DIRTY_TRACKING -> GET_DIRTY_BITMAP -> verify bitmap against\n expected IOVA footprint) so that the behaviour can be regression-tested\n beyond the KUnit PTE-level coverage.\n\n* If possible, rebase and retest on top of the updated \"iommu irqbypass\"\n patchset.\n\n\nFangyu Yu (6):\n iommupt: Add RISC-V Second-stage (iohgatp) page table support\n iommu/riscv: Add domain_alloc_paging_flags for second-stage domain\n iommupt: Don't preset D when RISC-V IOMMU dirty tracking on\n iommu/riscv: Add dirty tracking support for second-stage domains\n iommu/riscv: Add IOTINVAL.GVMA after updating DDT/PDT entries\n iommupt: Add RISC-V dirty tracking PTE ops\n\nTomasz Jeznach (2):\n iommu/riscv: report iommu capabilities\n RISC-V: KVM: Enable KVM_VFIO interfaces on RISC-V arch\n\nZong Li (3):\n iommu/riscv: use data structure instead of individual values\n iommu/riscv: support GSCID and GVMA invalidation command\n iommu/riscv: support nested iommu for getting iommu hardware\n information\n\n arch/riscv/kvm/Kconfig | 2 +\n drivers/iommu/generic_pt/fmt/riscv.h | 120 ++++++++++++-\n drivers/iommu/riscv/iommu-bits.h | 7 +\n drivers/iommu/riscv/iommu.c | 247 +++++++++++++++++++++++----\n include/linux/generic_pt/common.h | 13 ++\n include/linux/generic_pt/iommu.h | 17 +-\n include/uapi/linux/iommufd.h | 18 ++\n 7 files changed, 383 insertions(+), 41 deletions(-)" }