[{"id":3680014,"web_url":"http://patchwork.ozlabs.org/comment/3680014/","msgid":"<35163ccd-a282-417c-865e-9cc111b70fa5@deltatee.com>","list_archive_url":null,"date":"2026-04-21T18:14:57","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":70191,"url":"http://patchwork.ozlabs.org/api/people/70191/","name":"Logan Gunthorpe","email":"logang@deltatee.com"},"content":"On 2026-04-21 11:43, Matt Evans wrote:\n> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n> pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> Signed-off-by: Matt Evans <mattev@meta.com>\n\nThis makes sense to me, thanks.\n\nReviewed-by: Logan Gunthorpe <logang@deltatee.com>","headers":{"Return-Path":"\n <linux-pci+bounces-52869-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=deltatee.com header.i=@deltatee.com header.a=rsa-sha256\n header.s=20200525 header.b=UDSWvqt7;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52869-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=deltatee.com header.i=@deltatee.com\n header.b=\"UDSWvqt7\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=204.191.154.188","smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=deltatee.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=deltatee.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Vtb056lz1yGt\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 04:16:54 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 3815D3014652\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 18:15:10 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id B09F033F59E;\n\tTue, 21 Apr 2026 18:15:09 +0000 (UTC)","from ale.deltatee.com (ale.deltatee.com [204.191.154.188])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 6477B33F8BC;\n\tTue, 21 Apr 2026 18:15:08 +0000 (UTC)","from guinness.priv.deltatee.com ([172.16.1.162])\n\tby ale.deltatee.com with esmtpsa  (TLS1.3) tls\n TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256\n\t(Exim 4.98.2)\n\t(envelope-from <logang@deltatee.com>)\n\tid 1wFFch-000000002do-3Vm9;\n\tTue, 21 Apr 2026 12:15:00 -0600"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776795309; cv=none;\n b=DDjb1ElT/apzflqk5Fi5ORCflSdtA1IyBvR2IMbJa07hW+k0dZGIg8myYHH4c7TZ2EvPvm+vE1czDPXDr2bII2RhcDVF1UA+UpVgMWZq7rjQRh//2s0MS38r0mDK8i1+7W5s1RXXNpRl4B9m9EHHfN3eukTo0csqmxlNQegk96I=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776795309; c=relaxed/simple;\n\tbh=jUh7Grx6DMmDoLYuoJ2lx+wKFp6/tOdknTR+gvX98G8=;\n\th=Message-ID:Date:MIME-Version:To:Cc:References:From:In-Reply-To:\n\t Content-Type:Subject;\n b=D3BOenZihICD1atpIeRIvKrCbMBqezOXFgk5ZdcadaROQ9pVhPTelzbUg4ekX3eeJSw47nAYMSC/hfu3QEvSEkTqvLeg5iQMHyrf/nFES6mNL9m7Otra6U9JwKNZf7MgagWpLVdYAabB9My7Ae8pKRjwa28IKMBTbtx96FpGy8k=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=quarantine dis=none) header.from=deltatee.com;\n spf=pass smtp.mailfrom=deltatee.com;\n dkim=pass (2048-bit key) header.d=deltatee.com header.i=@deltatee.com\n header.b=UDSWvqt7; arc=none smtp.client-ip=204.191.154.188","DKIM-Signature":"v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;\n\td=deltatee.com; s=20200525; h=Subject:In-Reply-To:From:References:Cc:To:\n\tMIME-Version:Date:Message-ID:content-disposition;\n\tbh=B8hFtIuFqE25OFd700xADDBrxfR+UtQr6/9m0uTtlDY=; b=UDSWvqt7qXPCMW0sHl5h2hYCS+\n\t3sxMQ51aoRE87mEiCrV7LttIHQQf7ueERg9Dv2TRv5RWjwHXaFtc9RRETL9iCbMC4d7Ax/aMjeUQw\n\tSiCriXSSQ0gB+s6RBUvk9aQsoaDXBouHW1dsN5++++yEsBisEA3WfQ2pD0ULwn8f4pOthlCzxb+Q3\n\tV2iyZo/3PCLG/28Z7Joq3BhrsR93j0rC6qKeJcj/6DssSww23I88wHyi54RbC/nlETWcogjpwczlz\n\tW8qQR2YgimemZ3g/1c4Af1Etu+kwY5JkWNTHCVGmdtlBVn3hMLy/SANWLqC0CEroWZtazlXJZtTW6\n\t+v5dqs2g==;","Message-ID":"<35163ccd-a282-417c-865e-9cc111b70fa5@deltatee.com>","Date":"Tue, 21 Apr 2026 12:14:57 -0600","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","To":"Matt Evans <mattev@meta.com>, Bjorn Helgaas <bhelgaas@google.com>,\n Ankit Agrawal <ankita@nvidia.com>, Leon Romanovsky <leon@kernel.org>,\n Alex Williamson <alex@shazbot.org>, Niklas Schnelle <schnelle@linux.ibm.com>","Cc":"linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org","References":"<20260421174351.3897842-1-mattev@meta.com>","Content-Language":"en-CA","From":"Logan Gunthorpe <logang@deltatee.com>","In-Reply-To":"<20260421174351.3897842-1-mattev@meta.com>","Content-Type":"text/plain; charset=UTF-8","Content-Transfer-Encoding":"7bit","X-SA-Exim-Connect-IP":"172.16.1.162","X-SA-Exim-Rcpt-To":"mattev@meta.com, bhelgaas@google.com, ankita@nvidia.com,\n leon@kernel.org, alex@shazbot.org, schnelle@linux.ibm.com,\n linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org","X-SA-Exim-Mail-From":"logang@deltatee.com","X-Spam-Level":"","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","X-SA-Exim-Version":"4.2.1 (built Sun, 23 Feb 2025 07:57:16 +0000)","X-SA-Exim-Scanned":"Yes (on ale.deltatee.com)"}},{"id":3680041,"web_url":"http://patchwork.ozlabs.org/comment/3680041/","msgid":"<20260421194954.GA28413@unreal>","list_archive_url":null,"date":"2026-04-21T19:49:54","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":68852,"url":"http://patchwork.ozlabs.org/api/people/68852/","name":"Leon Romanovsky","email":"leon@kernel.org"},"content":"On Tue, Apr 21, 2026 at 10:43:51AM -0700, Matt Evans wrote:\n> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n> pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n\nI don't object to the patch, but this Fixes line doesn't look correct.\nnon_mappable_bars applies only to s390, which doesn't support p2p. That\nwasn't prevented before 372d6d1b8ae3c refactoring too.\n\nThanks","headers":{"Return-Path":"\n <linux-pci+bounces-52876-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=JS8qELIw;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52876-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"JS8qELIw\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0Y0P4RrVz1yGs\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 05:52:05 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 3FED23035A9A\n\tfor <incoming@patchwork.ozlabs.org>; Tue, 21 Apr 2026 19:50:01 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 64C0F3DCDA4;\n\tTue, 21 Apr 2026 19:50:00 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 41C03178372;\n\tTue, 21 Apr 2026 19:50:00 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 2A31EC2BCB0;\n\tTue, 21 Apr 2026 19:49:58 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776801000; cv=none;\n b=bY8Jla9+D3jI87BjXyjDfgi2nzOj8Rr8V/B6DHS+ZvRoC0JtCZLu6Mye7NsngAzUV5X4TaOJMWpyRO6Fh7gjsAWKrbdBHYzTPF3NxciZaP86Z1Y3iDAxi4B8xs1CTek/rbjwxti5c6l92KU6m1uaNH1XLMt1lxqfTnkDsQpAgf8=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776801000; c=relaxed/simple;\n\tbh=97V/EKLbZ3KWqU80pF5kvk00TJ3g7If0s+0qeYX7tFg=;\n\th=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:\n\t Content-Type:Content-Disposition:In-Reply-To;\n b=sEXbn4S5ifACcpQfhxKQj/Dx5Uj3M+vFNuBDcguzAv/U8tJEJm5Lms3htM58Te86kWor5H6W1ruTD3wyWIdEWJBmp72jELehLuOD2uHLVAiRkiuvaW1X4VEJLP9YSvBPfjutm9p8seK7sjgl2qEohoLYClA+oD5OdWqCkR6Bfbg=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=JS8qELIw; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776800999;\n\tbh=97V/EKLbZ3KWqU80pF5kvk00TJ3g7If0s+0qeYX7tFg=;\n\th=Date:From:To:Cc:Subject:References:In-Reply-To:From;\n\tb=JS8qELIw/RF+EjHgO3UvXikNVe5AiH217evZVd5UbB01Zjtt6JpoAXZS2QLeQbigx\n\t 1nUJ+g84HokGnIJeqSHEGLWOffJU+O+DDLYzSgDFx602FQmDCGTzqFY/JW/AiiDarH\n\t /f7LFZHLxPMisb9zZZrRAnrB2LnXBCy+57AIRC+T0Z8kN1ITxS7u6FhsP+CEGX386r\n\t pqt53OsP8vVj5AyTO2VngRAlxSDq+yCKBNnynIvrFck/FN9u2qcKbLo1afEDiTnOGC\n\t cK9DLZh3FYh5ouNm9lUOu0Qa0Vs8tgDx+60M5DoDEIUBN7oQhsIpIUab3oxt45AzP2\n\t CWwU6evxEDzmw==","Date":"Tue, 21 Apr 2026 22:49:54 +0300","From":"Leon Romanovsky <leon@kernel.org>","To":"Matt Evans <mattev@meta.com>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n\tLogan Gunthorpe <logang@deltatee.com>,\n\tAnkit Agrawal <ankita@nvidia.com>,\n\tAlex Williamson <alex@shazbot.org>,\n\tNiklas Schnelle <schnelle@linux.ibm.com>, linux-pci@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Message-ID":"<20260421194954.GA28413@unreal>","References":"<20260421174351.3897842-1-mattev@meta.com>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","In-Reply-To":"<20260421174351.3897842-1-mattev@meta.com>"}},{"id":3680374,"web_url":"http://patchwork.ozlabs.org/comment/3680374/","msgid":"<8de7b03f58c53bf40933f1afa5833419a58cef7c.camel@linux.ibm.com>","list_archive_url":null,"date":"2026-04-22T09:19:52","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":78856,"url":"http://patchwork.ozlabs.org/api/people/78856/","name":"Niklas Schnelle","email":"schnelle@linux.ibm.com"},"content":"On Tue, 2026-04-21 at 10:43 -0700, Matt Evans wrote:\n> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n> pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> Signed-off-by: Matt Evans <mattev@meta.com>\n> ---\n> \n> This arises from Alex Williamson's suggestion to test\n> non_mappable_bars when getting the provider, with discussion here:\n> \n>  https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n> \n> The goal was to prevent a hole where VFIO could export DMABUFs for\n> BARs marked non-mappable, and to fix for all users of the provider\n> rather than just VFIO.  Alex observed that non_mappable_bars should be\n> taken to mean BARs weren't usable by the CPU _or_ peers and,\n> considering that, its comment about userspace access wasn't quite\n> right.\n> \n> \n>  drivers/pci/p2pdma.c | 3 ++-\n>  include/linux/pci.h  | 2 +-\n>  2 files changed, 3 insertions(+), 2 deletions(-)\n> \n> diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c\n> index 7c898542af8d..4a783413f466 100644\n> --- a/drivers/pci/p2pdma.c\n> +++ b/drivers/pci/p2pdma.c\n> @@ -318,7 +318,8 @@ struct p2pdma_provider *pcim_p2pdma_provider(struct pci_dev *pdev, int bar)\n>  {\n>  \tstruct pci_p2pdma *p2p;\n>  \n> -\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM))\n> +\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM) ||\n> +\t    pdev->non_mappable_bars)\n>  \t\treturn NULL;\n>  \n>  \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n> diff --git a/include/linux/pci.h b/include/linux/pci.h\n> index 2c4454583c11..1e6802017d6b 100644\n> --- a/include/linux/pci.h\n> +++ b/include/linux/pci.h\n> @@ -508,7 +508,7 @@ struct pci_dev {\n>  \tunsigned int\tno_command_memory:1;\t/* No PCI_COMMAND_MEMORY */\n>  \tunsigned int\trom_bar_overlap:1;\t/* ROM BAR disable broken */\n>  \tunsigned int\trom_attr_enabled:1;\t/* Display of ROM attribute enabled? */\n> -\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped to user-space  */\n> +\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped by CPU or peers */\n>  \tpci_dev_flags_t dev_flags;\n>  \tatomic_t\tenable_cnt;\t/* pci_enable_device has been called */\n>  \n\nSorry for the late reply. For s390's ISM device this definitely makes\nsense. The BAR can indeed not be accessed by P2P and extending this\nseems reasonable to me. \n\nFeel free to add my:\n\nReviewed-by: Niklas Schnelle <schnelle@linux.ibm.com>\n\nThanks,\nNiklas","headers":{"Return-Path":"\n <linux-pci+bounces-52932-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=aOXcjhxM;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52932-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=ibm.com header.i=@ibm.com\n header.b=\"aOXcjhxM\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=148.163.158.5","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=linux.ibm.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g0v5R5LGxz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 19:27:39 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 775AB302881A\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 09:21:17 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id EF9C981732;\n\tWed, 22 Apr 2026 09:21:16 +0000 (UTC)","from mx0b-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com\n [148.163.158.5])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 471283C277B;\n\tWed, 22 Apr 2026 09:21:15 +0000 (UTC)","from pps.filterd (m0356516.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63LImZwu679949;\n\tWed, 22 Apr 2026 09:20:56 GMT","from ppma21.wdc07v.mail.ibm.com\n (5b.69.3da9.ip4.static.sl-reverse.com [169.61.105.91])\n\tby mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4dpeu7jf90-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tWed, 22 Apr 2026 09:20:55 +0000 (GMT)","from pps.filterd (ppma21.wdc07v.mail.ibm.com [127.0.0.1])\n\tby ppma21.wdc07v.mail.ibm.com (8.18.1.7/8.18.1.7) with ESMTP id\n 63M9KNTW019093;\n\tWed, 22 Apr 2026 09:20:55 GMT","from smtprelay07.wdc07v.mail.ibm.com ([172.16.1.74])\n\tby ppma21.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4dpjky9k9j-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tWed, 22 Apr 2026 09:20:55 +0000 (GMT)","from smtpav02.wdc07v.mail.ibm.com (smtpav02.wdc07v.mail.ibm.com\n [10.39.53.229])\n\tby smtprelay07.wdc07v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 63M9KspY28312114\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n\tWed, 22 Apr 2026 09:20:54 GMT","from smtpav02.wdc07v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id AF0EF58058;\n\tWed, 22 Apr 2026 09:20:54 +0000 (GMT)","from smtpav02.wdc07v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 5229B58059;\n\tWed, 22 Apr 2026 09:20:53 +0000 (GMT)","from [9.52.215.169] (unknown [9.52.215.169])\n\tby smtpav02.wdc07v.mail.ibm.com (Postfix) with ESMTP;\n\tWed, 22 Apr 2026 09:20:53 +0000 (GMT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776849676; cv=none;\n b=IBC0oE/mjm3InUyEQrkyTlNB+6MUezb33Wi2A+F7PvePkSLY3PGqeKqVqXENSJsdUBag3gCDHIFeRSIFE3ats2TebXNoLC64PW459GyKl7foJt7UbfeJhvmrl1VYuarLZoN2IYrcSWb8nS8Cj51TbGCZl3UnFo1zomcpH86UlDU=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776849676; c=relaxed/simple;\n\tbh=m8d+hWHOrlwp1zfk8VnyaGsSLiFqVDfS09cITAkuYQw=;\n\th=Message-ID:Subject:From:To:Cc:In-Reply-To:References:Content-Type:\n\t Date:MIME-Version;\n b=Su63Y2caC9pM4FwF+A7qrBJNR5uolPJ5uLQHYVs+vAZw9FxnEpg1AqZjtlZEUZxnIakvvb+/RPKZVxjJUdKjwom/ITretdzSh011mSLTQXOXhvrvEvKGvV4ex7dEZcl3HjlywgPGA0+cejTQOm0C1v9yVSXoGl7PdarQgH3SYVc=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com;\n spf=pass smtp.mailfrom=linux.ibm.com;\n dkim=pass (2048-bit key) header.d=ibm.com header.i=@ibm.com\n header.b=aOXcjhxM; arc=none smtp.client-ip=148.163.158.5","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=pp1; bh=EG2bkp\n\t34DF+E5AoBOOEU8TRmQ1Q7aJxQLR1xkPD3mM0=; b=aOXcjhxMKsI2s3HHdGLIrj\n\tm7BUOXFH76bodclCDVH42MplE8vnEZcRf9zZJNbbLFWs8/0fA2+6jziYBDSS3toF\n\tRPRTIppbguMw1gVLxAFaTPFpdSnOm1ymW8La6YsT2v82F/p5JS9ka87ZRoN9EikB\n\tXbzhyv3o9YPRIzvYtFpmeGgl0bJ8ftSZjcyeUmX4WMi32jiyJprhCnELyMeCCms8\n\tviK7bIWg+Xh5WWqfJNbJXlE9hj97X/KSmdLi9yy1abfm/ckTNpBVEikodgGYiAg0\n\tN2aCsMvMDD4BqKIIaioABUtJL+Lp7uLam9bOPS1UXfHvfqrUT9v/9ZlQFaMXFjOw\n\t==","Message-ID":"<8de7b03f58c53bf40933f1afa5833419a58cef7c.camel@linux.ibm.com>","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","From":"Niklas Schnelle <schnelle@linux.ibm.com>","To":"Matt Evans <mattev@meta.com>, Bjorn Helgaas <bhelgaas@google.com>,\n        Logan Gunthorpe <logang@deltatee.com>,\n        Ankit Agrawal <ankita@nvidia.com>, Leon Romanovsky <leon@kernel.org>,\n        Alex Williamson\t <alex@shazbot.org>","Cc":"linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org","In-Reply-To":"<20260421174351.3897842-1-mattev@meta.com>","References":"<20260421174351.3897842-1-mattev@meta.com>","Autocrypt":"addr=schnelle@linux.ibm.com; prefer-encrypt=mutual;\n keydata=mQINBGHm3M8BEAC+MIQkfoPIAKdjjk84OSQ8erd2OICj98+GdhMQpIjHXn/RJdCZLa58k\n /ay5x0xIHkWzx1JJOm4Lki7WEzRbYDexQEJP0xUia0U+4Yg7PJL4Dg/W4Ho28dRBROoJjgJSLSHwc\n 3/1pjpNlSaX/qg3ZM8+/EiSGc7uEPklLYu3gRGxcWV/944HdUyLcnjrZwCn2+gg9ncVJjsimS0ro/\n 2wU2RPE4ju6NMBn5Go26sAj1owdYQQv9t0d71CmZS9Bh+2+cLjC7HvyTHKFxVGOznUL+j1a45VrVS\n XQ+nhTVjvgvXR84z10bOvLiwxJZ/00pwNi7uCdSYnZFLQ4S/JGMs4lhOiCGJhJ/9FR7JVw/1t1G9a\n UlqVp23AXwzbcoV2fxyE/CsVpHcyOWGDahGLcH7QeitN6cjltf9ymw2spBzpRnfFn80nVxgSYVG1d\n w75ksBAuQ/3e+oTQk4GAa2ShoNVsvR9GYn7rnsDN5pVILDhdPO3J2PGIXa5ipQnvwb3EHvPXyzakY\n tK50fBUPKk3XnkRwRYEbbPEB7YT+ccF/HioCryqDPWUivXF8qf6Jw5T1mhwukUV1i+QyJzJxGPh19\n /N2/GK7/yS5wrt0Lwxzevc5g+jX8RyjzywOZGHTVu9KIQiG8Pqx33UxZvykjaqTMjo7kaAdGEkrHZ\n dVHqoPZwhCsgQARAQABtChOaWtsYXMgU2NobmVsbGUgPHNjaG5lbGxlQGxpbnV4LmlibS5jb20+iQ\n JXBBMBCABBAhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAhkBFiEEnbAAstJ1IDCl9y3cr+Q/Fej\n CYJAFAmmAWs8FCQl6sYAACgkQr+Q/FejCYJAn2g//UKzlXOgizdk0wudLooRbGzDo23ktGSPK5Oj9\n 9o5z6v4Jz5+qOHo5835683cqkMLM9//udA1ZcKV88LVwyfmoHChPW24cWBmOEy7RJOWCR4WeEINaO\n pZUGF5YOx7oKTkPs511ky2FR0Heg35754pgTuTMEpYzRXr5pNMPS8mHXcXSARFPDPaCF+uBJ9BafO\n L7XbpSwKRttePsWAlPHbSbloeDApBfHUhcF/pbuM9GNs+c/8V9NK+SwwqNK214t7jaSq9k+19/hfE\n jvU45nbiYQM4VqGCelxVFRWol93JnwPFp/JaMgxgV1VYFH9Ijtgh+qNVVBqO8bbTjioFKy1bHdprN\n 9GyPLDxoaI/lBg+5CwKewzazUjFd0xaqZbTXSgNK4ev/IuNI3qZV8tpvZZWwIgZU1K0Bhplt8Sku+\n O9Yl2H54erq9zuzwXjqBJtoW0+MaKbe+1gZ/v2/AVE2VeQMugPUWDg+2bpJaApRkeA4xQ9XfeW6Bp\n It7xYrwwbVhQtWRC0sRh+QNlU9HI28wPSnLWn7HFBeWupaIrxSp4IEL3eHUn8xv4aA8lpdNsHXD/X\n vqOSUwy5jlTPTlemvwaC9mNHagNdVXng8C6+hxiDLhZ6xH2P4qNHTKmjW61NsdF6Y/HfWP+lmbi8/\n 474UNCltDt/fP01ajqogfWZKFymoH0O0KU5pa2xhcyBTY2huZWxsZSA8bmlrbGFzLnNjaG5lbGxlQ\n GlibS5jb20+iQJUBBMBCAA+AhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEnbAAstJ1IDCl9y\n 3cr+Q/FejCYJAFAmmAWusFCQl6sYAACgkQr+Q/FejCYJAtIw//WmQW/Z+SLdfrlDH5J2bvixzFNnO\n TOvp8uM8vcNZsxZwPXem4AeCXHayCqipxpa0iXWufEIvdMxkBxWvvM//V+rTUgQnJe6nhDxfLGklx\n 5Mb2H+K/ndS73ElCuA30MPYq7mHr8i3gEmi2ZFX1W47JecJ8hno/DQxhHRG7bd+GFsiKCbsjLWXNq\n s/VaAK9uyOTQx7m6/2nR8L+Mvl1BrRXwkj7Qp0qxfQSd4r+IVNBzNFOcrGagBqsyHrN7Is7IICktH\n 9VFl/G8P+hfviHQLnlxw9ltzpM1Dy6N1+BM3kbqD59gX+L6wqiLJI42eh+SHCiy35FvD3AFlYx4jZ\n MWE6qIgFnbwcL1kvcA7nnwfr3ZizCYPm8e334xXxslXBoRGsvjXSbAeAyZo2dvJXffNHdcDdUbJSl\n CfOixNGGKiQvs00X9ekfq9WmmRFvmYHu/m3lg1OXnMjFFIO41O51ZdhbEYJiqZEki7jA8Hd9xuWwQ\n nFDHhacU3xxivZ4BKQGQc+4XZ3yp/q6+7ux9prepRy/LeRyoaAmE67oxEsAgj+qyA3Tfy5nRTDdRQ\n E//gpaIt9H1VEx+68dRWHroxBQeozpnFPi25AlX3k4/EtVZjcItPWgE9iru1qT4DH3BBrz7Kd1zUw\n NnQC77zDJyZD2WUj1E+5bftO0aeE+7HZXj3tM/ea0K05pa2xhcyBTY2huZWxsZSA8bmlrbGFzLnNj\n aG5lbGxlQGdtYWlsLmNvbT6JAlQEEwEIAD4CGwEFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AWIQSds\n ACy0nUgMKX3Ldyv5D8V6MJgkAUCaYBa6wUJCXqxgAAKCRCv5D8V6MJgkF/TEACOY2kL4NGFIbWeM5\n TUhatxqe8c3RT6jvNjq32CkvaK/cSZzBkS0smddyOzxt2WnsvMgkr9cM7P+CevoMwhT3e0lgQbqBD\n /vXZJjWKddC+iKXeqWkjMVcgCOsWNZ7PWEzRUT5X1AEFq2zzxQAQ/bCWEYNqIbHN4b6G1Wk+2Y598\n +KypZ3FS0bwiItnPQOWzOOqJCGxDxaEUuXFx4ah8HtVdtIev8jPS/5uzQO9iG2vZQUWeMEYZtfMHW\n sbFWqo2A3lxB+KPzNIYFhul4Lyx1CwvKUAGSHOx7FZuc2xI5DYt/Wdh2QyKFYr7xVzv3uwJjeS1+3\n 6gvyB7DJaQuY+PziNPv4GPr5wy0cRkJ6Ps15fgC6y6wNwoNdNXKlwiuclIsBzJKa7A0pZMIfpCpIJ\n bEHP7oy3drBRAhIrBx7Lx1lyqqodDqc+ok5IQ5WcKG/TOrH732mTmJX6fxYTiCVxcU4WLJSNZbrZ/\n pjF0AWXs7E+onAkQy6RLg/XU1iiU5QdMvug+fTA6TpPSUMdujWtGWUt3/4nC+69AVc8tXtRQTZ7gP\n t7uIcQFwPqUuJGS26vl0w/6dIABQAyU9acvE3adCZra+/PBKFZi/yxT1WgV1T2mexKSWwQgLcR57J\n Yp5oWnQRgi/S6fAoskIWkp9UVcfAQPY0p45NwO5cZR9/g06JZmyrQhTmlrbGFzIFNjaG5lbGxlIDx\n uaWtzQGtlcm5lbC5vcmc+iQJUBBMBCAA+AhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEnbAA\n stJ1IDCl9y3cr+Q/FejCYJAFAmmAWusFCQl6sYAACgkQr+Q/FejCYJAz4A/9F+dMhzu7YonagL4qh\n WDz5IpRD4vzYKOBZ+qwYp1ugJz1BIUppN9i68HKoS4ARfgP97Sv9GpOy9g7L0lymH2MPF8hRPK0Yn\n 7DKIkeu/r28YWEoWfoVm5reC+gpxMgmxBz4JScE4f6xfa7+Nw0bbTDl+nxftJD7lf/dTiruNJsXph\n HQnZ5wPXmxeH6XVJikfpyrGe8iJZALbtHtjlx6Omu7NvRGikenB8trrWS5W0F60ZdbqH1HdmDDcrZ\n pDq6LtAARHK5tGRm0SK6sZpKe3nULFeeCt7T/edk2FC6KVh4sL1jw1kyceX4DjiMffqYBPrhK5gz5\n cDIixLBF9C6Wt1ObvuDBrIQf1/3q6EZrUrUuf6qtaXDMuC6cSlShm47qaPEvVYh67O9JZQ7vzvaea\n UI74DJUb8Pjnz7mTOmMOzsS1gUhCue4n2YSSM6ythioCGb/3bgMGTpuer3JhvZG5s5uKD9yyj8s8x\n 35qJkCFfjmjVx9s3vSUS48X+cUpYcMispErKzFu7C0YgKoxvJ4XTfXlDBiMFMPYcN67hsb2jeYHVJ\n wzE+fIZiDx9JLh1oQW2krwjweisE+3glOaKXZKi0fBtkxyH41iemLtLNYZRJopv6ykdl3hiI+Nh+a\n 3FZJPTo/OpqchMm8XIeDxC4NFFiPMpyLeYzIxO7eZpiGrAjVTE=","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable","Date":"Wed, 22 Apr 2026 11:19:52 +0200","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Evolution 3.58.3 (3.58.3-1.fc43) ","X-TM-AS-GCONF":"00","X-Proofpoint-Reinject":"loops=2 maxloops=12","X-Proofpoint-ORIG-GUID":"qAd29RjgHtMCGDtl7JMvERW9lwz0z0wL","X-Authority-Analysis":"v=2.4 cv=Ksp9H2WN c=1 sm=1 tr=0 ts=69e892f8 cx=c_pps\n a=GFwsV6G8L6GxiO2Y/PsHdQ==:117 a=GFwsV6G8L6GxiO2Y/PsHdQ==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=RnoormkPH1_aCDwRdu11:22 a=Y2IxJ9c9Rs8Kov3niI8_:22 a=VwQbUJbxAAAA:8\n a=VabnemYjAAAA:8 a=VnNF1IyMAAAA:8 a=_dJdq47d6hiFVcz4INMA:9 a=QEXdDO2ut3YA:10\n a=gKebqoRLp9LExxC7YDUY:22","X-Proofpoint-GUID":"-eOgB84tUtr3Qt4eAXc8AFBJcS0Eet52","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIyMDA4OCBTYWx0ZWRfXx6qdu6HwQBGf\n MHjmrxFLn4ma0AUNZSKBbyLPVxsanhuWlpqOKZFBV3V9ju5YApLCb86Qo500r3xFSjRhNWuU4ue\n UwwMdAaRdt3hCntwSSm6M5mC3VGAQ4IAranAQCpheTuxTW1S51KN7SnNfgeBHJOL4pWFsnt6BJM\n EVV/XXGRkSY5JxOg2wrI2mqorWlrIooqfWhSe7KksHBJWPUIur4ijoDF7dq+Ko5mT6dEdUh5Fe1\n fXGqjrA7FeELoVk0QJ5e3HK5fy0CXMQ6fMLgzQXMKkIpFK3/DZVrZ3WeX39mRsYts5JYPGvTTb/\n kIO9sR/aurbtb8i30DnBT1YgbJ0SgfgD1CHQ4tYLTRgwIsyTlMkgBWSrtFGubw6HBQT3UzrVRkV\n 8IMo2pZ15w1vNw8RbOhLKUDZv54Ba9dOwKI/R0VpumLQRdBVTZe9O6QhMaJxOZJauvQL4wmcvrO\n +Ajf62xo//Y/oaKt+Xw==","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-22_01,2026-04-21_02,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n bulkscore=0 impostorscore=0 malwarescore=0 phishscore=0 priorityscore=1501\n lowpriorityscore=0 clxscore=1011 adultscore=0 suspectscore=0 spamscore=0\n classifier=typeunknown authscore=0 authtc= authcc= route=outbound adjust=0\n reason=mlx scancount=1 engine=8.22.0-2604200000 definitions=main-2604220088"}},{"id":3680650,"web_url":"http://patchwork.ozlabs.org/comment/3680650/","msgid":"<a42eff69-e31e-4f99-a63a-5db2402154eb@meta.com>","list_archive_url":null,"date":"2026-04-22T14:22:53","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":93208,"url":"http://patchwork.ozlabs.org/api/people/93208/","name":"Matt Evans","email":"mattev@meta.com"},"content":"Hi Leon,\n\nOn 21/04/2026 20:49, Leon Romanovsky wrote:\n> \n> On Tue, Apr 21, 2026 at 10:43:51AM -0700, Matt Evans wrote:\n>> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n>> pdev->non_mappable_bars set.\n>>\n>> Consumers such as VFIO were previously able to map these for access by\n>> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n>> refers to any access, not just userspace CPU access.\n>>\n>> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> \n> I don't object to the patch, but this Fixes line doesn't look correct.\n> non_mappable_bars applies only to s390, which doesn't support p2p. That\n> wasn't prevented before 372d6d1b8ae3c refactoring too.\n\nThanks; I'd chosen that commit as it adds the function that the \nadditional test is being added to.\n\nAs an example consumer, vfio_pci_core_get_dmabuf_phys() added in \n5d74781ebc86 (\"vfio/pci: Add dma-buf export support for MMIO regions\") \ncould do an export when it shouldn't.  (And with my other mmap series, a \nCPU could then access it, not even P2P.)  I suppose this patch could \npoint to 5d74781ebc86 instead (which allows the naughty DMABUF export), \nbut I couldn't prove VFIO DMABUF export was the only thing using \npcim_p2pdma_provider() added in 372d6d1b8ae3c (especially as that \nsymbol's exported).\n\nIt still seems most watertight to treat this as a fix for anything \ncontaining 372d6d1b8ae3c, but if you feel it's not right what would be a \nbetter one?\n\nAlso, in the other thread (linked above) Alex made the point that whilst \n_today_ non_mappable_bars is only set by one s390 device, he expects \nfuture quirks or reasons to exclude mappings would also use \nnon_mappable_bars so we shouldn't consider it a s390-specific thing.\n\n\nCheers,\n\n\nMatt","headers":{"Return-Path":"\n <linux-pci+bounces-52977-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=meta.com header.i=@meta.com header.a=rsa-sha256\n header.s=s2048-2025-q2 header.b=NlYNgjcL;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52977-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com\n header.b=\"NlYNgjcL\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=67.231.145.42","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=meta.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=meta.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g11fz3Dbrz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 00:23:39 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 6F3AF300914C\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 14:23:01 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 9C37A2147E5;\n\tWed, 22 Apr 2026 14:23:00 +0000 (UTC)","from mx0a-00082601.pphosted.com (mx0a-00082601.pphosted.com\n [67.231.145.42])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 5226B27467F\n\tfor <linux-pci@vger.kernel.org>; Wed, 22 Apr 2026 14:22:59 +0000 (UTC)","from pps.filterd (m0528009.ppops.net [127.0.0.1])\n\tby mx0a-00082601.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63LIbfZS710935\n\tfor <linux-pci@vger.kernel.org>; Wed, 22 Apr 2026 07:22:58 -0700","from mail-dy1-f198.google.com (mail-dy1-f198.google.com\n [74.125.82.198])\n\tby mx0a-00082601.pphosted.com (PPS) with ESMTPS id 4dpepc5j67-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <linux-pci@vger.kernel.org>; Wed, 22 Apr 2026 07:22:58 -0700 (PDT)","by mail-dy1-f198.google.com with SMTP id\n 5a478bee46e88-2ddd8ef5343so5121536eec.1\n        for <linux-pci@vger.kernel.org>; Wed, 22 Apr 2026 07:22:58 -0700 (PDT)","from [10.0.40.30] ([51.52.155.79])\n        by smtp.gmail.com with ESMTPSA id\n 5a478bee46e88-2e53a4a8018sm29466650eec.8.2026.04.22.07.22.55\n        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n        Wed, 22 Apr 2026 07:22:56 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776867780; cv=none;\n b=FmPS4wttzZ9C6yXBSFgilOPJSiJ3ZQDTRRVrjZdXpmTEe/XUr2PLIkCPwB/JEyL+uLSga2af05/QFXCOuBQ3PzBbebo+O37Cs6o1J9+CAT8Gqi3xr5ezRgqrcpVI1SXZWRSSamjsZZcJCXMtj43D/VS3qt6DXd8YkiZxhD4L/Is=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776867780; c=relaxed/simple;\n\tbh=gbI4kKCuIVYd3slz/BDdKsHR65y7lB9h+f5cJIu4c7U=;\n\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n\t In-Reply-To:Content-Type;\n b=JNbPAWywdUxlgoq6bVK04tpuqqjwqu08I0/6th6iBcHwf0lJFrYOEZ7288DakQsIoyoeCZZalE+qXCKWFJVpN5xOSf41RIISLAu33FeiuVDXPOfBdaAJHqFZ/az+XICU1/svuYAGSV28iIJh2R3YRiKlI54qNdoXNodfPP4Rj44=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=meta.com;\n spf=pass smtp.mailfrom=meta.com;\n dkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com\n header.b=NlYNgjcL; arc=none smtp.client-ip=67.231.145.42","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=s2048-2025-q2;\n\t bh=G31TJF0EZFmPxGyRVjY8ZspmC4oSoYUwBfQ/uR97foo=; b=NlYNgjcLYCes\n\tOfg/4s0/n1XRiQWeLRIjzd6QVkk0OpCbGHal/Ge0Jq2cDLPCZfNOVmhF011TZ9Ku\n\tqWmn44NJ03a02wgldm+nKd72cnaC8EzCV0FstiknCv3GVafEAg+zZn1cksANpvAW\n\txQerZGEDIv5nxlrVAifESLIC9SyrHmWBgiLFk243IVUbRIy2mD3FEKG3yi4LTpQ3\n\tv5a9UT8jXq5ZrfGrVN60QLe/F6EQf3bxT9bdGDjld4SyBvMblRoPdfEKvCyqeaOP\n\tRW28GyDZju9LxLjHcv5jXTWAl2/dBPRuqZRSq+u/HPlSH7K1C62oyaV6kSO7h1QJ\n\tzqu9lHMtYw==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776867778; x=1777472578;\n        h=content-transfer-encoding:in-reply-to:from:references:cc:to\n         :content-language:subject:user-agent:mime-version:date:message-id\n         :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n         :reply-to;\n        bh=G31TJF0EZFmPxGyRVjY8ZspmC4oSoYUwBfQ/uR97foo=;\n        b=ey6yg+IE8MM+h3+jcRoalwhsMS5TaqngXFd3MSBvnEZ6kBW0Hx0SDXAhvU0b9PIvLD\n         /Ke5upRoOwxG3I75eL2LT5znNpqwcmTYcXl/oBP5dvL14pz32QZ1XU4DcaX8udWxkc9r\n         jGXX+ojKd7GFyDWDNjplC1p4pao1PkxM1KzkKX1l2CRl8Sl3yedvRje4pzatk07jcJWC\n         U60LnCk64u8O99KnQrB/8IPfZmU51KJaJd4naN9LbmrhtycQdCoIS23xJORWgM2iaadK\n         Y3nr13+e13kW9LlJvdr6nt6QvaL0Lkl6PrtB3ynsp65stRbYf6rW/7q7U6+zRScAlrOi\n         VBTw==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8WoQ1Vb9f9JUAzLCJnmyGgFb+m4LB2z3tO7OOC4kHkzU9SIH5Z3uIS0v4Qx/2y8n3dCKw5WyLTQOE=@vger.kernel.org","X-Gm-Message-State":"AOJu0YyrbRYryNL3DScs2O4c83LaqgpavFYagDy2vzYvBwJkEbemq47f\n\tPEXQJV/il+UoHMP/otcCGO9IHm9MT0BxgZ09OUoyiQXU2aeQp1mEGIA5dOHK7VnA5nULoRVUk2z\n\tCSk2gKbZezrbw2LNUVhypHR98aK4kkz474a3GGfX5VjEct92JlI6yJUMhA4q8","X-Gm-Gg":"AeBDiev2zGYFolsNuJrMINtIznsI7MLKznLiOH2Mdy/NFCIoMr4sEIHBlhZ1698zz+G\n\twxFJYBS4qnbtCqTt7u8dQfTnhdzKSRHGXmEAJpXrxpNeQc0I64+YTTNlTZ8Wn+TLVfV3WgyxLc1\n\t8OJTuQ0go2lS2DmhgNN5qY4RNE5q8HosdFROsjlw7MAytkR23Zm3FlO67YvKR2ZCYxCZPoiY26b\n\tn26StX8uOE8sUyN/COgIfLMSkLBqHcDAlC8a/adJSkWkfI0wycjZB+N9IZh4dLYUBWgzisbyRut\n\tLFHGPFhRG6BfjugOQ4rnac7AqqAqYdrxhDZwn6cQQ3v8VLKXc2qhzBFim5TsIkcHQ+Rg1CbXyrW\n\tnygDEFAfmmSaggvJSCA5GnpxHdwlxFWzOlU49L6LO","X-Received":["by 2002:a05:7300:fb94:b0:2c5:220c:5670 with SMTP id\n 5a478bee46e88-2e4646ccd74mr11096508eec.2.1776867777856;\n        Wed, 22 Apr 2026 07:22:57 -0700 (PDT)","by 2002:a05:7300:fb94:b0:2c5:220c:5670 with SMTP id\n 5a478bee46e88-2e4646ccd74mr11096470eec.2.1776867777092;\n        Wed, 22 Apr 2026 07:22:57 -0700 (PDT)"],"Message-ID":"<a42eff69-e31e-4f99-a63a-5db2402154eb@meta.com>","Date":"Wed, 22 Apr 2026 15:22:53 +0100","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Content-Language":"en-GB","To":"Leon Romanovsky <leon@kernel.org>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n        Logan Gunthorpe\n <logang@deltatee.com>,\n        Ankit Agrawal <ankita@nvidia.com>, Alex Williamson <alex@shazbot.org>,\n        Niklas Schnelle\n <schnelle@linux.ibm.com>, linux-pci@vger.kernel.org,\n        linux-kernel@vger.kernel.org","References":"<20260421174351.3897842-1-mattev@meta.com>\n <20260421194954.GA28413@unreal>","From":"Matt Evans <mattev@meta.com>","In-Reply-To":"<20260421194954.GA28413@unreal>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"7bit","X-Authority-Analysis":"v=2.4 cv=NInlPU6g c=1 sm=1 tr=0 ts=69e8d9c2 cx=c_pps\n a=wEP8DlPgTf/vqF+yE6f9lg==:117 a=2UbFsIa4v//lIgRL4kGwwA==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=7x6HtfJdh03M6CCDgxCd:22 a=U_y8lYiYyhHBU5rMqhb2:22 a=A9ac8u1S9ebtMFDS4YIA:9\n a=QEXdDO2ut3YA:10 a=bBxd6f-gb0O0v-kibOvt:22","X-Proofpoint-GUID":"vk61F0ax3pCnbmfZa7oZTq8dywNpF-N-","X-Proofpoint-ORIG-GUID":"vk61F0ax3pCnbmfZa7oZTq8dywNpF-N-","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIyMDEzOSBTYWx0ZWRfX5Cxi+gjyqnIa\n FN6xC0OVnlvzLyhcFXcTYgGVvw7zI1tIv7CyU/FOpEUQWHTQDGF1MXaWTV3lgRpRdMXttAteROo\n 52pMfZkUYGFJAIxMjZtADEQpQ7cpClNbl/07op74Z2wyhCViLOeOVp1eEH7GV15ut7KPDcuRhnK\n FL1iCRB93zguU097gigYlVWAHPv6WM3zB6MovSgUA5kVLrjHvBeg2NuIndmGvv/WbiDYgwYmLsv\n Dd4vg7T1lo7gvtOzbQRO4KZMfk3IJ58vdjBpxvG4A/bY/FCuAUc+UXSAKkzTZoUSuOsJu8WAEkC\n N7NcYnNsCmTxIAk2W67FqBuO45/3OTwbGbq6WLUUzo2GgSuJ/EaWgjiUKEHQwi2WoTlCEKZGHrI\n eC/Hu4AsPifexVL313+7PrGhxGnYJHLtqqf0A3Tw8hyLwfi0OW6yYLTtPbFbzJMJmuBJUyok1h6\n VnaloN5kfGc7OoUBCWg==","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-22_01,2026-04-21_02,2025-10-01_01"}},{"id":3680663,"web_url":"http://patchwork.ozlabs.org/comment/3680663/","msgid":"<20260422090146.6faf00f8@shazbot.org>","list_archive_url":null,"date":"2026-04-22T15:01:46","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":91887,"url":"http://patchwork.ozlabs.org/api/people/91887/","name":"Alex Williamson","email":"alex@shazbot.org"},"content":"On Tue, 21 Apr 2026 10:43:51 -0700\nMatt Evans <mattev@meta.com> wrote:\n\n> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n> pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> Signed-off-by: Matt Evans <mattev@meta.com>\n> ---\n> \n> This arises from Alex Williamson's suggestion to test\n> non_mappable_bars when getting the provider, with discussion here:\n> \n>  https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n> \n> The goal was to prevent a hole where VFIO could export DMABUFs for\n> BARs marked non-mappable, and to fix for all users of the provider\n> rather than just VFIO.  Alex observed that non_mappable_bars should be\n> taken to mean BARs weren't usable by the CPU _or_ peers and,\n> considering that, its comment about userspace access wasn't quite\n> right.\n> \n> \n>  drivers/pci/p2pdma.c | 3 ++-\n>  include/linux/pci.h  | 2 +-\n>  2 files changed, 3 insertions(+), 2 deletions(-)\n> \n> diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c\n> index 7c898542af8d..4a783413f466 100644\n> --- a/drivers/pci/p2pdma.c\n> +++ b/drivers/pci/p2pdma.c\n> @@ -318,7 +318,8 @@ struct p2pdma_provider *pcim_p2pdma_provider(struct pci_dev *pdev, int bar)\n>  {\n>  \tstruct pci_p2pdma *p2p;\n>  \n> -\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM))\n> +\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM) ||\n> +\t    pdev->non_mappable_bars)\n>  \t\treturn NULL;\n>  \n>  \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n> diff --git a/include/linux/pci.h b/include/linux/pci.h\n> index 2c4454583c11..1e6802017d6b 100644\n> --- a/include/linux/pci.h\n> +++ b/include/linux/pci.h\n> @@ -508,7 +508,7 @@ struct pci_dev {\n>  \tunsigned int\tno_command_memory:1;\t/* No PCI_COMMAND_MEMORY */\n>  \tunsigned int\trom_bar_overlap:1;\t/* ROM BAR disable broken */\n>  \tunsigned int\trom_attr_enabled:1;\t/* Display of ROM attribute enabled? */\n> -\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped to user-space  */\n> +\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped by CPU or peers */\n>  \tpci_dev_flags_t dev_flags;\n>  \tatomic_t\tenable_cnt;\t/* pci_enable_device has been called */\n>  \n\nShould pcim_p2pdma_init() separately test pdev->non_mappable_bars\nbefore the rcu-deref/kzalloc of the pci_p2pdma object and return\n-EOPNOTSUPP?\n\nThat then invokes the same error paths we'd see if we simply don't have\np2pdma in the kernel and handles the pci_p2pdma_add_resource() path\nautomatically as well.\n\nThis pcim_p2pdma_provider() test is really then just suppressing the\nWARN_ON that we'd otherwise see by not finding the p2p object on the\ndevice.  Thanks,\n\nAlex","headers":{"Return-Path":"\n <linux-pci+bounces-52983-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=shazbot.org header.i=@shazbot.org header.a=rsa-sha256\n header.s=fm1 header.b=Wa+WHRfs;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=messagingengine.com header.i=@messagingengine.com\n header.a=rsa-sha256 header.s=fm2 header.b=eCbT5UeV;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=linux-pci+bounces-52983-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=shazbot.org header.i=@shazbot.org\n header.b=\"Wa+WHRfs\";\n\tdkim=pass (2048-bit key) header.d=messagingengine.com\n header.i=@messagingengine.com header.b=\"eCbT5UeV\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=103.168.172.152","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=shazbot.org","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=shazbot.org"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g12WX0jngz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 01:02:16 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id 864C0300D726\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 15:01:54 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 248F0288C96;\n\tWed, 22 Apr 2026 15:01:53 +0000 (UTC)","from fhigh-a1-smtp.messagingengine.com\n (fhigh-a1-smtp.messagingengine.com [103.168.172.152])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 07120267B05;\n\tWed, 22 Apr 2026 15:01:49 +0000 (UTC)","from phl-compute-01.internal (phl-compute-01.internal [10.202.2.41])\n\tby mailfhigh.phl.internal (Postfix) with ESMTP id 1BEFF140001E;\n\tWed, 22 Apr 2026 11:01:49 -0400 (EDT)","from phl-frontend-03 ([10.202.2.162])\n  by phl-compute-01.internal (MEProxy); Wed, 22 Apr 2026 11:01:49 -0400","by mail.messagingengine.com (Postfix) with ESMTPA; Wed,\n 22 Apr 2026 11:01:47 -0400 (EDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776870113; cv=none;\n b=CvAzh6vrosi8aAg6qQrLUwrDbQO2FTJ4+KQtjgiI3jY7JTvUhhpbOnPozG6Rx7NEhBDkBmtz2fJXApQCuxtkd+tzTLuIwbgSja7Dqe2bHGf8IM6To8BzSCxCrZi5NCmYc8aiYtixhnaGCvk71CwG8gDI7i1Bi+GVCX8JG79MxdA=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776870113; c=relaxed/simple;\n\tbh=5za1Qa2r3jGUXiI+aKKQzUgVUw2yj3ACqVZ6IfmbBkw=;\n\th=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=ZfjSgjo7vk/DT/mzNG1qmypX+BPzlsV286eEmOiaYibSIQmGM20uZ2kLaNVIdqmTrEufywZCFVimukeOSgKffQjs4y1QAMAma19eHbCp9+mgyVgPGKJwKQ0FbEb2hZllfe1OHFFLHFsUN9CrsWQ4/Xb8yuxmS4EM5wu2hvjawxQ=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=shazbot.org;\n spf=pass smtp.mailfrom=shazbot.org;\n dkim=pass (2048-bit key) header.d=shazbot.org header.i=@shazbot.org\n header.b=Wa+WHRfs;\n dkim=pass (2048-bit key) header.d=messagingengine.com header.i=@messagingengine.com\n header.b=eCbT5UeV; arc=none smtp.client-ip=103.168.172.152","DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=shazbot.org; h=\n\tcc:cc:content-transfer-encoding:content-type:content-type:date\n\t:date:from:from:in-reply-to:in-reply-to:message-id:mime-version\n\t:references:reply-to:subject:subject:to:to; s=fm1; t=1776870109;\n\t x=1776956509; bh=3zmVi2LhrzJd3wF1gCVRc/TZgEZBXHF1e7RvIlWo09w=; b=\n\tWa+WHRfsNFZdj6lNH0gxcILd9/7+/hrMG3/H2LZzqc+6KeQJ33f7vo9+9xcUuGpF\n\teGJpfFWUTmP7i0CZ4YBb4BhaHyw/CcATwlDotYDn4GJJ+uDkcbP4dg0m8jPO981t\n\ts440bzzAdN+YwFnFQEOC0MGQIf+vUJH+KLOMwa2rrAybvUuUlPp/qR2bQ8cmtOMR\n\tjq7JLjTW58N97xBRHiyqiI7s6th45iD6THuvL4RadoYN91w9XmavNYVMmeHk6wSD\n\tgr4KhvxSbCz6Co205CdHWyKSOGaOxyG3V/iNH+LnndFOb1u++VvAVli6rl9yEdO+\n\tssupEG3zvmmMYwAJ5w1e0A==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=\n\tmessagingengine.com; h=cc:cc:content-transfer-encoding\n\t:content-type:content-type:date:date:feedback-id:feedback-id\n\t:from:from:in-reply-to:in-reply-to:message-id:mime-version\n\t:references:reply-to:subject:subject:to:to:x-me-proxy\n\t:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; t=1776870109; x=\n\t1776956509; bh=3zmVi2LhrzJd3wF1gCVRc/TZgEZBXHF1e7RvIlWo09w=; b=e\n\tCbT5UeV9LourinI0GRMDRrdVHpks3rt93BBeC7j/vpMk/0kG+5GWMoSAihA1/cSo\n\tmHERi18RuEaqlpzmSamVNf20oQcVaNLCzY3H8H1zVdH51Q780I+k5/HuCwKSbNPg\n\tLuw+636rZdQR9T4HGgCyc6B6uAtsqRP2U0vi4wZqVwQdRu+dq/3YNNw+Xy95ui3T\n\tEGiMLGTTx0Pfbgi8AMzX/KLlxP3S+weuadSbvhpsOOzrqi3mTm1epmeKjgk2Cx58\n\txXo90yM68E0PG9mb4HWazmuShbm2m2h4zvYIzQ48Oz3v3VbyrjvSX6SmS5pJazWU\n\ttURcVPt5g/Gicxg/XtgXA=="],"X-ME-Sender":"<xms:3OLoafN8sN6tJy5KK90N4M0oxvF2EjhyVwlcszLJCASl1rwvx_C09g>\n    <xme:3OLoaaY7DV0_zwRdliSLG0iB2nrc32R-_r9dydEOm0w4epFQ5Fg8E3vloN6vKo6Rc\n    kgv-0_ESnziUNlOeOBIUQRvmN4rumeUsT-uR4PaekLjTLzF5sIbqw>","X-ME-Received":"\n <xmr:3OLoae-FSDwqmxMSB7f2Kt_NR7zJkWNzPIziERyEJZKyqQamRhDI-t19gTE>","X-ME-Proxy-Cause":"\n gggruggvucftvghtrhhoucdtuddrgeefhedrtddtgdeigeehkecutefuodetggdotefrod\n    ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpuffrtefokffrpgfnqfghnecuuegr\n    ihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjug\n    hrpeffhffvvefukfgjfhfogggtgfesthejredtredtvdenucfhrhhomheptehlvgigucgh\n    ihhllhhirghmshhonhcuoegrlhgvgiesshhhrgiisghothdrohhrgheqnecuggftrfgrth\n    htvghrnhepkeehjeeitefffeeuieetjedtjeffvdelledvuedvffdvfeetgefhveekuedv\n    fedvnecuffhomhgrihhnpehkvghrnhgvlhdrohhrghenucevlhhushhtvghrufhiiigvpe\n    dtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegrlhgvgiesshhhrgiisghothdrohhrghdp\n    nhgspghrtghpthhtohepledpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepmhgrth\n    htvghvsehmvghtrgdrtghomhdprhgtphhtthhopegshhgvlhhgrggrshesghhoohhglhgv\n    rdgtohhmpdhrtghpthhtoheplhhoghgrnhhgseguvghlthgrthgvvgdrtghomhdprhgtph\n    htthhopegrnhhkihhtrgesnhhvihguihgrrdgtohhmpdhrtghpthhtoheplhgvohhnsehk\n    vghrnhgvlhdrohhrghdprhgtphhtthhopehstghhnhgvlhhlvgeslhhinhhugidrihgsmh\n    drtghomhdprhgtphhtthhopehlihhnuhigqdhptghisehvghgvrhdrkhgvrhhnvghlrdho\n    rhhgpdhrtghpthhtoheplhhinhhugidqkhgvrhhnvghlsehvghgvrhdrkhgvrhhnvghlrd\n    horhhgpdhrtghpthhtoheprghlvgigsehshhgriigsohhtrdhorhhg","X-ME-Proxy":"<xmx:3OLoabSnVQX1xE5g-QuqofVMW3G2BG9BWTCl1GYdKgn7FeEABgaHOQ>\n    <xmx:3OLoaYdYul9tNQKGUIt9y8w00KGeL_MsvPS0drQYjcDetkqQb6b9AA>\n    <xmx:3OLoadT8yQxaVIaPVv5DkW9UVroe7WDBKIv2ECR0ZvipI40LIOl9dg>\n    <xmx:3OLoaUL2tDJWHF5EhcEnnlvaAynEdtO5tU0Tp6e7mU4o40X2gnLyVA>\n    <xmx:3eLoabCaC6891GpUJnudtg3YMAICpPfMsNPFdyKLv653l-OFXD3iXV4l>","Feedback-ID":"i03f14258:Fastmail","Date":"Wed, 22 Apr 2026 09:01:46 -0600","From":"Alex Williamson <alex@shazbot.org>","To":"Matt Evans <mattev@meta.com>","Cc":"Bjorn Helgaas <bhelgaas@google.com>, Logan Gunthorpe\n <logang@deltatee.com>, Ankit Agrawal <ankita@nvidia.com>, Leon Romanovsky\n <leon@kernel.org>, Niklas Schnelle <schnelle@linux.ibm.com>,\n <linux-pci@vger.kernel.org>, <linux-kernel@vger.kernel.org>,\n alex@shazbot.org","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Message-ID":"<20260422090146.6faf00f8@shazbot.org>","In-Reply-To":"<20260421174351.3897842-1-mattev@meta.com>","References":"<20260421174351.3897842-1-mattev@meta.com>","X-Mailer":"Claws Mail 4.3.1 (GTK 3.24.51; x86_64-pc-linux-gnu)","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=US-ASCII","Content-Transfer-Encoding":"7bit"}},{"id":3680670,"web_url":"http://patchwork.ozlabs.org/comment/3680670/","msgid":"<20260422151906.GB28413@unreal>","list_archive_url":null,"date":"2026-04-22T15:19:06","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":68852,"url":"http://patchwork.ozlabs.org/api/people/68852/","name":"Leon Romanovsky","email":"leon@kernel.org"},"content":"On Wed, Apr 22, 2026 at 03:22:53PM +0100, Matt Evans wrote:\n> Hi Leon,\n> \n> On 21/04/2026 20:49, Leon Romanovsky wrote:\n> > \n> > On Tue, Apr 21, 2026 at 10:43:51AM -0700, Matt Evans wrote:\n> > > Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n> > > pdev->non_mappable_bars set.\n> > > \n> > > Consumers such as VFIO were previously able to map these for access by\n> > > the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> > > refers to any access, not just userspace CPU access.\n> > > \n> > > Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> > \n> > I don't object to the patch, but this Fixes line doesn't look correct.\n> > non_mappable_bars applies only to s390, which doesn't support p2p. That\n> > wasn't prevented before 372d6d1b8ae3c refactoring too.\n> \n> Thanks; I'd chosen that commit as it adds the function that the additional\n> test is being added to.\n\nCan I suggest slightly different solution?\nIf CONFIG_..._S390 is set, we will unset CONFIG_PCI_P2PDMA and pcim_p2pdma_provider()\nwill be compiled to return NULL, without changing non_mappable_bars\ndescription.\n\nThanks","headers":{"Return-Path":"\n <linux-pci+bounces-52984-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=jk2yVjzd;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-52984-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"jk2yVjzd\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g130v3ydYz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 01:24:15 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 7F21A3015C9A\n\tfor <incoming@patchwork.ozlabs.org>; Wed, 22 Apr 2026 15:19:12 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 94F38320393;\n\tWed, 22 Apr 2026 15:19:11 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 727493128B2;\n\tWed, 22 Apr 2026 15:19:11 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id B9CB4C2BCAF;\n\tWed, 22 Apr 2026 15:19:10 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776871151; cv=none;\n b=HubI+Pd8r45U40lba4xCDOcxxAGBQco0+BjqEou+69GL6oa7hpM0uIvHvm5YMstHoWUtQBQuOiVJgNvqPZ/T+k/hslz5PWuyIwTQNpuJXe5jiTgdedb4BLxUE/m84yfasppD8TouxJ8shs9IgGfFyItkuiHeLetlUSiG3pJrBu0=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776871151; c=relaxed/simple;\n\tbh=iEk6as1kJcG0B0J/R9pwwoLMqKKpP+WeDhV8CmuB47I=;\n\th=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version:\n\t Content-Type:Content-Disposition:In-Reply-To;\n b=INpMLmqqtzszWyWjGfJ5erCubavVORP+ad46TnynharFBdCE24JQRk6RvS8YbafL4T+2cxXwg+spauHbI0xdYQ1sFiJW3/LSxGm95/McYDeMB6ii1lUO81oEwHiwQCHwbCQpfiG+nHhWwzSVmZF8fZ7PFte+dp9dv6sSaSN/K+o=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=jk2yVjzd; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1776871151;\n\tbh=iEk6as1kJcG0B0J/R9pwwoLMqKKpP+WeDhV8CmuB47I=;\n\th=Date:From:To:Cc:Subject:References:In-Reply-To:From;\n\tb=jk2yVjzdkhEsYnN+CeiqMbMnlTQ+BzsQmybscOuSGaxni3Ib1TlDBc+diQnGZKWY4\n\t yq8rhIZxfYMXip+TciTwhfo3iPalda827NCOFun0kKp2MZTi80uVL9L2N+XMDswfJu\n\t OqmaX/QwqZ/ugWIDIN9MrQBqmmTbhnlYk/1V+jwfMMG6rVWr9XjA3zW0XVVdRxv8EV\n\t bw5FdE6xsSefoiRv8csapkOHY2e/hASJ+9mB9tMLYsCLnv/P5v4j7P/oFauAsF4n7X\n\t ES65VPVxDxfg2nYvFdvXcqHvRz1s5vRR+PKBGg+qjSBMfFtpno1C1SMNCI7bZ4V12u\n\t v9Vqg3tDkq6SQ==","Date":"Wed, 22 Apr 2026 18:19:06 +0300","From":"Leon Romanovsky <leon@kernel.org>","To":"Matt Evans <mattev@meta.com>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n\tLogan Gunthorpe <logang@deltatee.com>,\n\tAnkit Agrawal <ankita@nvidia.com>,\n\tAlex Williamson <alex@shazbot.org>,\n\tNiklas Schnelle <schnelle@linux.ibm.com>, linux-pci@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Message-ID":"<20260422151906.GB28413@unreal>","References":"<20260421174351.3897842-1-mattev@meta.com>\n <20260421194954.GA28413@unreal>\n <a42eff69-e31e-4f99-a63a-5db2402154eb@meta.com>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","In-Reply-To":"<a42eff69-e31e-4f99-a63a-5db2402154eb@meta.com>"}},{"id":3681515,"web_url":"http://patchwork.ozlabs.org/comment/3681515/","msgid":"<9803c500aead703be8ebbae9d8514d1359784e20.camel@linux.ibm.com>","list_archive_url":null,"date":"2026-04-23T14:55:29","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":78856,"url":"http://patchwork.ozlabs.org/api/people/78856/","name":"Niklas Schnelle","email":"schnelle@linux.ibm.com"},"content":"On Wed, 2026-04-22 at 18:19 +0300, Leon Romanovsky wrote:\n> On Wed, Apr 22, 2026 at 03:22:53PM +0100, Matt Evans wrote:\n> > Hi Leon,\n> > \n> > On 21/04/2026 20:49, Leon Romanovsky wrote:\n> > > \n> > > On Tue, Apr 21, 2026 at 10:43:51AM -0700, Matt Evans wrote:\n> > > > Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n> > > > pdev->non_mappable_bars set.\n> > > > \n> > > > Consumers such as VFIO were previously able to map these for access by\n> > > > the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> > > > refers to any access, not just userspace CPU access.\n> > > > \n> > > > Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> > > \n> > > I don't object to the patch, but this Fixes line doesn't look correct.\n> > > non_mappable_bars applies only to s390, which doesn't support p2p. That\n> > > wasn't prevented before 372d6d1b8ae3c refactoring too.\n> > \n> > Thanks; I'd chosen that commit as it adds the function that the additional\n> > test is being added to.\n> \n> Can I suggest slightly different solution?\n> If CONFIG_..._S390 is set, we will unset CONFIG_PCI_P2PDMA and pcim_p2pdma_provider()\n> will be compiled to return NULL, without changing non_mappable_bars\n> description.\n> \n> Thanks\n\nHi Leon,\n\nI'm not sure this is an ideal solution for the longer term. While ISM\ndefinitely can't do P2P and is more akin to an emulated PCI device in\nits actual implementation, other PCI devices on the platform such as\nConnectX family NICs, NVMes and the IBM Spyre Accelerator are much more\nrun off the mill. \n\nSo, I'd prefer not to create restrictions unnecessarily. Now there are\nother unusual properties like the fact that all OSs on s390 run\nvirtualized with PCI functions passed-through by a machine level\nhypervisor. That and firmware also control root ports and PCIe\nswitches. Still, I don't believe there is anything fundamentally\npreventing P2P to work in the future. While we could then take this\nrestriction out again, I'd prefer not to introduce it in the first\nplace unless we have to.\n\nThanks,\nNiklas Schnelle","headers":{"Return-Path":"\n <linux-pci+bounces-53047-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=e4t3imk/;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c04:e001:36c::12fc:5321; helo=tor.lore.kernel.org;\n envelope-from=linux-pci+bounces-53047-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=ibm.com header.i=@ibm.com\n header.b=\"e4t3imk/\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=148.163.156.1","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=linux.ibm.com"],"Received":["from tor.lore.kernel.org (tor.lore.kernel.org\n [IPv6:2600:3c04:e001:36c::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1fN64mSTz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 00:57:58 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby tor.lore.kernel.org (Postfix) with ESMTP id BBF213053895\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 14:56:47 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id D52D7242D9B;\n\tThu, 23 Apr 2026 14:56:46 +0000 (UTC)","from mx0a-001b2d01.pphosted.com (mx0a-001b2d01.pphosted.com\n [148.163.156.1])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 05B6C3559F5;\n\tThu, 23 Apr 2026 14:56:44 +0000 (UTC)","from pps.filterd (m0356517.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63N85u4o3229003;\n\tThu, 23 Apr 2026 14:56:35 GMT","from ppma21.wdc07v.mail.ibm.com\n (5b.69.3da9.ip4.static.sl-reverse.com [169.61.105.91])\n\tby mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4dpeu298rh-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tThu, 23 Apr 2026 14:56:34 +0000 (GMT)","from pps.filterd (ppma21.wdc07v.mail.ibm.com [127.0.0.1])\n\tby ppma21.wdc07v.mail.ibm.com (8.18.1.7/8.18.1.7) with ESMTP id\n 63NEoT5l016416;\n\tThu, 23 Apr 2026 14:56:33 GMT","from smtprelay07.wdc07v.mail.ibm.com ([172.16.1.74])\n\tby ppma21.wdc07v.mail.ibm.com (PPS) with ESMTPS id 4dpjkyf2fp-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tThu, 23 Apr 2026 14:56:33 +0000 (GMT)","from smtpav06.wdc07v.mail.ibm.com (smtpav06.wdc07v.mail.ibm.com\n [10.39.53.233])\n\tby smtprelay07.wdc07v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 63NEuXnu32899646\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n\tThu, 23 Apr 2026 14:56:33 GMT","from smtpav06.wdc07v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 013DF58054;\n\tThu, 23 Apr 2026 14:56:33 +0000 (GMT)","from smtpav06.wdc07v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 647265803F;\n\tThu, 23 Apr 2026 14:56:31 +0000 (GMT)","from [9.52.215.169] (unknown [9.52.215.169])\n\tby smtpav06.wdc07v.mail.ibm.com (Postfix) with ESMTP;\n\tThu, 23 Apr 2026 14:56:31 +0000 (GMT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776956206; cv=none;\n b=t6OFg7CoHMP/47EXTo5c2FedYHTK/pBKBQcIN/Yx/e4o0RsE4jnUYUzO4XqdtZ+7c8kfsLlTPQIjP9VNmCYsIrPjmASlb+D6RGW7oLNoI66qtqJmbUqLtZLaYPgalyFsu75kw2DJAhfnE2eLI2PwGHe1irJk9+cS7/NXFvH7F4I=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776956206; c=relaxed/simple;\n\tbh=5xWMii+5Z6O29DL0tI4sLc81MDceLrsRIq+u8ap0+7k=;\n\th=Message-ID:Subject:From:To:Cc:In-Reply-To:References:Content-Type:\n\t Date:MIME-Version;\n b=oTOdQOqTCbLao+hWJ5IM4KMEeAZlBo+M9jKGCtGmHQdi5HpJbgdksON1qFr+0j6Vz51dP2U5lJIvFRIEj4BI6bhnPHb4LT6oVR0uI5JjI7Q/vS+7wmwKnfCVLC/BknS/xGnjcBvn4HLumt1CNuvWGJssZb1BXF3cPG9Ysr+H0qo=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com;\n spf=pass smtp.mailfrom=linux.ibm.com;\n dkim=pass (2048-bit key) header.d=ibm.com header.i=@ibm.com\n header.b=e4t3imk/; arc=none smtp.client-ip=148.163.156.1","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=pp1; bh=4Uqvia\n\tKuJqsLd82JGYjxTDRIiaN+9C4d6MFkdJYFk20=; b=e4t3imk/gA7Eu+HvDj9y/D\n\tvDYj6i/+cYcg5uigT7kmOmSXYNSoNCZlSSZOrFMQ32Oy3x1jXNBl3xF7BQ+5YQo5\n\tdwZSc7XUcsIidLkM6OohzE6hB0E39SytzonssQBk3csqHj7FZJL3ycNNMyH/t7i0\n\tFz4CT6wEgzk9OZ65QAYwZehqP/gjB4hJnCjobR0Eti21scCu38SCyrQvjgd08Vwm\n\t2Fydy+BR4H/cLrsZr6+JDLUwNVoB84YiR/Qu5d2skc1f/4z1ONcdJAjLJhwCtVZl\n\tjIsbvLxF3TO/l75Rrhpzrzugu9o5XWmAdtWX+5/kO64sze01YKC2cDRezII7vUIQ\n\t==","Message-ID":"<9803c500aead703be8ebbae9d8514d1359784e20.camel@linux.ibm.com>","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","From":"Niklas Schnelle <schnelle@linux.ibm.com>","To":"Leon Romanovsky <leon@kernel.org>, Matt Evans <mattev@meta.com>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n        Logan Gunthorpe\n <logang@deltatee.com>,\n        Ankit Agrawal <ankita@nvidia.com>, Alex Williamson\n <alex@shazbot.org>,\n        linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org","In-Reply-To":"<20260422151906.GB28413@unreal>","References":"<20260421174351.3897842-1-mattev@meta.com>\n\t <20260421194954.GA28413@unreal>\n\t <a42eff69-e31e-4f99-a63a-5db2402154eb@meta.com>\n\t <20260422151906.GB28413@unreal>","Autocrypt":"addr=schnelle@linux.ibm.com; prefer-encrypt=mutual;\n keydata=mQINBGHm3M8BEAC+MIQkfoPIAKdjjk84OSQ8erd2OICj98+GdhMQpIjHXn/RJdCZLa58k\n /ay5x0xIHkWzx1JJOm4Lki7WEzRbYDexQEJP0xUia0U+4Yg7PJL4Dg/W4Ho28dRBROoJjgJSLSHwc\n 3/1pjpNlSaX/qg3ZM8+/EiSGc7uEPklLYu3gRGxcWV/944HdUyLcnjrZwCn2+gg9ncVJjsimS0ro/\n 2wU2RPE4ju6NMBn5Go26sAj1owdYQQv9t0d71CmZS9Bh+2+cLjC7HvyTHKFxVGOznUL+j1a45VrVS\n XQ+nhTVjvgvXR84z10bOvLiwxJZ/00pwNi7uCdSYnZFLQ4S/JGMs4lhOiCGJhJ/9FR7JVw/1t1G9a\n UlqVp23AXwzbcoV2fxyE/CsVpHcyOWGDahGLcH7QeitN6cjltf9ymw2spBzpRnfFn80nVxgSYVG1d\n w75ksBAuQ/3e+oTQk4GAa2ShoNVsvR9GYn7rnsDN5pVILDhdPO3J2PGIXa5ipQnvwb3EHvPXyzakY\n tK50fBUPKk3XnkRwRYEbbPEB7YT+ccF/HioCryqDPWUivXF8qf6Jw5T1mhwukUV1i+QyJzJxGPh19\n /N2/GK7/yS5wrt0Lwxzevc5g+jX8RyjzywOZGHTVu9KIQiG8Pqx33UxZvykjaqTMjo7kaAdGEkrHZ\n dVHqoPZwhCsgQARAQABtChOaWtsYXMgU2NobmVsbGUgPHNjaG5lbGxlQGxpbnV4LmlibS5jb20+iQ\n JXBBMBCABBAhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAhkBFiEEnbAAstJ1IDCl9y3cr+Q/Fej\n CYJAFAmmAWs8FCQl6sYAACgkQr+Q/FejCYJAn2g//UKzlXOgizdk0wudLooRbGzDo23ktGSPK5Oj9\n 9o5z6v4Jz5+qOHo5835683cqkMLM9//udA1ZcKV88LVwyfmoHChPW24cWBmOEy7RJOWCR4WeEINaO\n pZUGF5YOx7oKTkPs511ky2FR0Heg35754pgTuTMEpYzRXr5pNMPS8mHXcXSARFPDPaCF+uBJ9BafO\n L7XbpSwKRttePsWAlPHbSbloeDApBfHUhcF/pbuM9GNs+c/8V9NK+SwwqNK214t7jaSq9k+19/hfE\n jvU45nbiYQM4VqGCelxVFRWol93JnwPFp/JaMgxgV1VYFH9Ijtgh+qNVVBqO8bbTjioFKy1bHdprN\n 9GyPLDxoaI/lBg+5CwKewzazUjFd0xaqZbTXSgNK4ev/IuNI3qZV8tpvZZWwIgZU1K0Bhplt8Sku+\n O9Yl2H54erq9zuzwXjqBJtoW0+MaKbe+1gZ/v2/AVE2VeQMugPUWDg+2bpJaApRkeA4xQ9XfeW6Bp\n It7xYrwwbVhQtWRC0sRh+QNlU9HI28wPSnLWn7HFBeWupaIrxSp4IEL3eHUn8xv4aA8lpdNsHXD/X\n vqOSUwy5jlTPTlemvwaC9mNHagNdVXng8C6+hxiDLhZ6xH2P4qNHTKmjW61NsdF6Y/HfWP+lmbi8/\n 474UNCltDt/fP01ajqogfWZKFymoH0O0KU5pa2xhcyBTY2huZWxsZSA8bmlrbGFzLnNjaG5lbGxlQ\n GlibS5jb20+iQJUBBMBCAA+AhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEnbAAstJ1IDCl9y\n 3cr+Q/FejCYJAFAmmAWusFCQl6sYAACgkQr+Q/FejCYJAtIw//WmQW/Z+SLdfrlDH5J2bvixzFNnO\n TOvp8uM8vcNZsxZwPXem4AeCXHayCqipxpa0iXWufEIvdMxkBxWvvM//V+rTUgQnJe6nhDxfLGklx\n 5Mb2H+K/ndS73ElCuA30MPYq7mHr8i3gEmi2ZFX1W47JecJ8hno/DQxhHRG7bd+GFsiKCbsjLWXNq\n s/VaAK9uyOTQx7m6/2nR8L+Mvl1BrRXwkj7Qp0qxfQSd4r+IVNBzNFOcrGagBqsyHrN7Is7IICktH\n 9VFl/G8P+hfviHQLnlxw9ltzpM1Dy6N1+BM3kbqD59gX+L6wqiLJI42eh+SHCiy35FvD3AFlYx4jZ\n MWE6qIgFnbwcL1kvcA7nnwfr3ZizCYPm8e334xXxslXBoRGsvjXSbAeAyZo2dvJXffNHdcDdUbJSl\n CfOixNGGKiQvs00X9ekfq9WmmRFvmYHu/m3lg1OXnMjFFIO41O51ZdhbEYJiqZEki7jA8Hd9xuWwQ\n nFDHhacU3xxivZ4BKQGQc+4XZ3yp/q6+7ux9prepRy/LeRyoaAmE67oxEsAgj+qyA3Tfy5nRTDdRQ\n E//gpaIt9H1VEx+68dRWHroxBQeozpnFPi25AlX3k4/EtVZjcItPWgE9iru1qT4DH3BBrz7Kd1zUw\n NnQC77zDJyZD2WUj1E+5bftO0aeE+7HZXj3tM/ea0K05pa2xhcyBTY2huZWxsZSA8bmlrbGFzLnNj\n aG5lbGxlQGdtYWlsLmNvbT6JAlQEEwEIAD4CGwEFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AWIQSds\n ACy0nUgMKX3Ldyv5D8V6MJgkAUCaYBa6wUJCXqxgAAKCRCv5D8V6MJgkF/TEACOY2kL4NGFIbWeM5\n TUhatxqe8c3RT6jvNjq32CkvaK/cSZzBkS0smddyOzxt2WnsvMgkr9cM7P+CevoMwhT3e0lgQbqBD\n /vXZJjWKddC+iKXeqWkjMVcgCOsWNZ7PWEzRUT5X1AEFq2zzxQAQ/bCWEYNqIbHN4b6G1Wk+2Y598\n +KypZ3FS0bwiItnPQOWzOOqJCGxDxaEUuXFx4ah8HtVdtIev8jPS/5uzQO9iG2vZQUWeMEYZtfMHW\n sbFWqo2A3lxB+KPzNIYFhul4Lyx1CwvKUAGSHOx7FZuc2xI5DYt/Wdh2QyKFYr7xVzv3uwJjeS1+3\n 6gvyB7DJaQuY+PziNPv4GPr5wy0cRkJ6Ps15fgC6y6wNwoNdNXKlwiuclIsBzJKa7A0pZMIfpCpIJ\n bEHP7oy3drBRAhIrBx7Lx1lyqqodDqc+ok5IQ5WcKG/TOrH732mTmJX6fxYTiCVxcU4WLJSNZbrZ/\n pjF0AWXs7E+onAkQy6RLg/XU1iiU5QdMvug+fTA6TpPSUMdujWtGWUt3/4nC+69AVc8tXtRQTZ7gP\n t7uIcQFwPqUuJGS26vl0w/6dIABQAyU9acvE3adCZra+/PBKFZi/yxT1WgV1T2mexKSWwQgLcR57J\n Yp5oWnQRgi/S6fAoskIWkp9UVcfAQPY0p45NwO5cZR9/g06JZmyrQhTmlrbGFzIFNjaG5lbGxlIDx\n uaWtzQGtlcm5lbC5vcmc+iQJUBBMBCAA+AhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEnbAA\n stJ1IDCl9y3cr+Q/FejCYJAFAmmAWusFCQl6sYAACgkQr+Q/FejCYJAz4A/9F+dMhzu7YonagL4qh\n WDz5IpRD4vzYKOBZ+qwYp1ugJz1BIUppN9i68HKoS4ARfgP97Sv9GpOy9g7L0lymH2MPF8hRPK0Yn\n 7DKIkeu/r28YWEoWfoVm5reC+gpxMgmxBz4JScE4f6xfa7+Nw0bbTDl+nxftJD7lf/dTiruNJsXph\n HQnZ5wPXmxeH6XVJikfpyrGe8iJZALbtHtjlx6Omu7NvRGikenB8trrWS5W0F60ZdbqH1HdmDDcrZ\n pDq6LtAARHK5tGRm0SK6sZpKe3nULFeeCt7T/edk2FC6KVh4sL1jw1kyceX4DjiMffqYBPrhK5gz5\n cDIixLBF9C6Wt1ObvuDBrIQf1/3q6EZrUrUuf6qtaXDMuC6cSlShm47qaPEvVYh67O9JZQ7vzvaea\n UI74DJUb8Pjnz7mTOmMOzsS1gUhCue4n2YSSM6ythioCGb/3bgMGTpuer3JhvZG5s5uKD9yyj8s8x\n 35qJkCFfjmjVx9s3vSUS48X+cUpYcMispErKzFu7C0YgKoxvJ4XTfXlDBiMFMPYcN67hsb2jeYHVJ\n wzE+fIZiDx9JLh1oQW2krwjweisE+3glOaKXZKi0fBtkxyH41iemLtLNYZRJopv6ykdl3hiI+Nh+a\n 3FZJPTo/OpqchMm8XIeDxC4NFFiPMpyLeYzIxO7eZpiGrAjVTE=","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable","Date":"Thu, 23 Apr 2026 16:55:29 +0200","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Evolution 3.58.3 (3.58.3-1.fc43) ","X-TM-AS-GCONF":"00","X-Proofpoint-Reinject":"loops=2 maxloops=12","X-Proofpoint-GUID":"0cmBSsbFJcSNz14z4SlFVe-xcpTlEpuH","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIzMDE0OCBTYWx0ZWRfX/Vt1JU5GYUs4\n j2gM4cZwvoLJDdh8jGjpN1+6l27twLpWwWqVCcYVf+LFo3kNSotfL+BMy6qmSnSeRE34+aeEkSn\n hrw71TvQL5c71y75Xd+qdHqAx3uKDRvcCZq3tIjpmWc9nv+BNZSIdMvFAZZM7WSJjjELPlo23/Z\n aXMzTEh3SUyWSTLWAz6jClqX+Ptc5mp2xt4aJiAcfiDg+poZ02ipfs91Qo6LBvwRFXuF7R6XNhs\n CjIr2XgO1cdIw2ZbWb2SV7/eSpmhNlpeJUU78cQzLK2WcpAm7eFnin7XY9Lxh/k/JmwaojStX2u\n iKMMbWNlsUyh/WUkKzQ8oKa9gMkJsOpV6Ykhtwpm137ODm/8aqbm4eFxjlG5zw+HB8t2tAxY7IV\n kJZ6GHAqXh9KhmDuBwgSt969eMdHgUXNpiYCA1iv5qE2eBRMATSqqxgrpXLIC3/D1VQ39ieonEo\n dpveVva1A/ZVPrNZ5Fg==","X-Authority-Analysis":"v=2.4 cv=C8LZDwP+ c=1 sm=1 tr=0 ts=69ea3322 cx=c_pps\n a=GFwsV6G8L6GxiO2Y/PsHdQ==:117 a=GFwsV6G8L6GxiO2Y/PsHdQ==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=RnoormkPH1_aCDwRdu11:22 a=U7nrCbtTmkRpXpFmAIza:22 a=LQvJE2i9nHpm6XaOmtEA:9\n a=QEXdDO2ut3YA:10","X-Proofpoint-ORIG-GUID":"ye574-iU3Iev19Ib485Mt-TFCoNQW-5B","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-23_03,2026-04-21_02,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n adultscore=0 suspectscore=0 priorityscore=1501 malwarescore=0\n lowpriorityscore=0 clxscore=1015 bulkscore=0 impostorscore=0 spamscore=0\n phishscore=0 classifier=typeunknown authscore=0 authtc= authcc=\n route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2604200000\n definitions=main-2604230148"}},{"id":3681545,"web_url":"http://patchwork.ozlabs.org/comment/3681545/","msgid":"<46ba7198-c5fd-44ca-9b35-b9970f400fdd@meta.com>","list_archive_url":null,"date":"2026-04-23T15:48:56","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":93208,"url":"http://patchwork.ozlabs.org/api/people/93208/","name":"Matt Evans","email":"mattev@meta.com"},"content":"Hi Leon,\n\nOn 22/04/2026 16:19, Leon Romanovsky wrote:\n> \n> On Wed, Apr 22, 2026 at 03:22:53PM +0100, Matt Evans wrote:\n>> Hi Leon,\n>>\n>> On 21/04/2026 20:49, Leon Romanovsky wrote:\n>>>\n>>> On Tue, Apr 21, 2026 at 10:43:51AM -0700, Matt Evans wrote:\n>>>> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n>>>> pdev->non_mappable_bars set.\n>>>>\n>>>> Consumers such as VFIO were previously able to map these for access by\n>>>> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n>>>> refers to any access, not just userspace CPU access.\n>>>>\n>>>> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n>>>\n>>> I don't object to the patch, but this Fixes line doesn't look correct.\n>>> non_mappable_bars applies only to s390, which doesn't support p2p. That\n>>> wasn't prevented before 372d6d1b8ae3c refactoring too.\n>>\n>> Thanks; I'd chosen that commit as it adds the function that the additional\n>> test is being added to.\n> \n> Can I suggest slightly different solution?\n> If CONFIG_..._S390 is set, we will unset CONFIG_PCI_P2PDMA and pcim_p2pdma_provider()\n> will be compiled to return NULL, without changing non_mappable_bars\n> description.\n\nWhere we got to in\n\n    https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n\nwas that non_mappable_bars could be used in future for non-s390 quirks, \ni.e. s390 is the current (but potentially not only) user.  Secondly, it \nisn't a P2P-specific issue because in\n\n    https://lore.kernel.org/kvm/20260416131815.2729131-1-mattev@meta.com/\n\nI'm aiming to add mmap() support to VFIO DMABUFs, which (without a fix \nlike this) would allow CPU access too.\n\n\nThanks,\n\n\nMatt","headers":{"Return-Path":"\n <linux-pci+bounces-53051-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=meta.com header.i=@meta.com header.a=rsa-sha256\n header.s=s2048-2025-q2 header.b=NxYyTXuo;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-53051-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com\n header.b=\"NxYyTXuo\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=67.231.153.30","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=meta.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=meta.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1gXV4gSnz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 01:50:18 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 6527B3007AF6\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 15:49:06 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 11DFF366561;\n\tThu, 23 Apr 2026 15:49:05 +0000 (UTC)","from mx0a-00082601.pphosted.com (mx0b-00082601.pphosted.com\n [67.231.153.30])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id A2350230BDB\n\tfor <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 15:49:03 +0000 (UTC)","from pps.filterd (m0001303.ppops.net [127.0.0.1])\n\tby m0001303.ppops.net (8.18.1.11/8.18.1.11) with ESMTP id 63MJigaI3336647\n\tfor <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 08:49:02 -0700","from mail-dy1-f200.google.com (mail-dy1-f200.google.com\n [74.125.82.200])\n\tby m0001303.ppops.net (PPS) with ESMTPS id 4dpepb594b-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 08:49:02 -0700 (PDT)","by mail-dy1-f200.google.com with SMTP id\n 5a478bee46e88-2bdd327d970so4281159eec.1\n        for <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 08:49:02 -0700 (PDT)","from [10.0.40.30] ([51.52.155.79])\n        by smtp.gmail.com with ESMTPSA id\n 5a478bee46e88-2e53ccce460sm28587165eec.19.2026.04.23.08.48.58\n        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n        Thu, 23 Apr 2026 08:48:59 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776959345; cv=none;\n b=B304svIyiyqK5iuhp5BJYEwT47ltBwAQrZbuGfoqTv18ZEXkFBDhS4UY3jRJVqK2cBvHn5B1YsPi0kI0itpqt3I94JeItH86MltPc0G/VApvR7v9Dy6FNQdS2Wl8Gg6k6Vt+1W89wZn5eNxo6RfJGpf+MWqj9s83c5dPl6nKTV8=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776959345; c=relaxed/simple;\n\tbh=80eSES/iMbAO9OuT/7JX5Lx9NP9r7mOfkvygcvQBRSw=;\n\th=Message-ID:Date:MIME-Version:From:Subject:To:Cc:References:\n\t In-Reply-To:Content-Type;\n b=byAPcOxg+o10xt95t4cZuyQhCMUz07TtVqzWFaTj9Xkk76BFpJwDtmy6MdqqM7ybT8QA8PwZrCCZ2L6Pj5uYpKc/sLLVn5WrwftTZrSfTvuTOohqv7mH552Ue7Pa2XxLlzfVkeFzqKXyAB1pPt3U6pgKU6jJpnRTfDXh6JE60l8=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=meta.com;\n spf=pass smtp.mailfrom=meta.com;\n dkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com\n header.b=NxYyTXuo; arc=none smtp.client-ip=67.231.153.30","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=s2048-2025-q2;\n\t bh=ktUnuoD8CuSUNuBwVhOJzuNt3VlOsH8SY1Gfl8vm3Z4=; b=NxYyTXuoDGqh\n\tHUIpRba1OxTwsiuK5hAb6P9tDMHrH81yfQVOEVZGe9IWcKaH0TJ7ATIDi9+Wn0/3\n\tD16waw4ltpCWH1/LUvSTWaYK2ljGKgGW1lLMP+OGlrxiethWgjWFfWjmL25aUJ5R\n\t4ElyRGONreBKEYUVLd2/3syO6NofYjDHVv9HJy8ayHavdR4fhXp3hXdsNdL4z+sR\n\tSlbwNnlFUKW/91aabOkiu8WlIIouAXrsn4tghlxgLaVJNghTMR1GCw+0aGeXjRIL\n\tOn+Zmjv4gsFdDYPGZWMsXtggLdXqqT8889Hfd4eVosYfvL9+BGh49m3gOuybOCOf\n\tdmu40kfugQ==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776959341; x=1777564141;\n        h=content-transfer-encoding:in-reply-to:content-language:references\n         :cc:to:subject:from:user-agent:mime-version:date:message-id:x-gm-gg\n         :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to;\n        bh=ktUnuoD8CuSUNuBwVhOJzuNt3VlOsH8SY1Gfl8vm3Z4=;\n        b=WdtB2ZcpncQfsuT3tJTevotMbpYNeEP1kd/WgeNi3YRzLsu9cwgkGW5jH+Qq19UiQ7\n         sejeoxmumWnWDoAW4jpyUvtrOvQO1dyz97NLcK6H+/gKHA+ai6cKrHCg2HRh3XqUj+hW\n         Y2VVLJFEIXdNZevINk3kWZeZH1gbVhjee2yoZkZDl+W8VmXlnfejI7I9yxkrPJQTaDRp\n         s/civJW6lfVy3owTjLJ448Ygt0Xe7Pix30KwE6JOa9+JO0FiSXMBCwshJZrSF6UUOlBn\n         4SjLYyP7oIeo4Pux0DdMl3ozuzZ3Sqqn7QZBQXjSRp0jpJO/O+5DQY205G2+oegt8ajT\n         7zeg==","X-Forwarded-Encrypted":"i=1;\n AFNElJ/7F1YrVCwSAuzRXtrYLlyR2L2KmRiekKi8StcWzFwzvDYgXhXWfNgbREenxCsd4cuLVERw082yYGY=@vger.kernel.org","X-Gm-Message-State":"AOJu0YzL5D2W19v3XNvDG0ejCzrIYHs1bgT7eWAVkFhlniNJeJuqkvyc\n\tdslNf9MwkBW5Ie76KZW8G8Z9WKlfbuaV6C/Z5JGpSYVCaN4ojTdTObb8g2+kiU6dFVo6z8PDazy\n\tn5xGCbnrQHYS6Am+WjOOuC5xzW+g/xKVl2dz+XhqPldJrZZVMe42FxDchQymi","X-Gm-Gg":"AeBDiespHn9vqFflKoaJl62NecB4+KGOOwzj/0Q/UyEgiu0swMPl8EA8yJBVBwMwMV0\n\t1UVVlYkJ7DRyKzTvU/6B5x/EokFHXb36BlWP1IbOnQKSb15pgNaQ8y374rvSqKQNHlttw6RQgzC\n\t8g7rn/yC6bx4+JKYJpoM1372Z65fEwLi6wmCTweqnMRqlUGLRlfhGfcVhs01ceBj6p1/yLFyJam\n\ttvHE8yBWQVunhEffhJu3OmZz7n08wmlW2t6QcpWV5c2YU1D6/azd9ayE2upPqMx/7hpFho8gA2M\n\tXAtl+dOHC0MxQqc3MRvOVwKISuo64MIwPuPfNy91XI1inYys3WC4Cif/LdQ3XMr7vHBpS10KZyq\n\tn2DFPibQRbgVnQzPkD/ynL0RsqgO05CfsoePHcJ63","X-Received":["by 2002:a05:7300:3253:b0:2c0:df3b:ec1e with SMTP id\n 5a478bee46e88-2e42dc0732emr9866568eec.11.1776959341137;\n        Thu, 23 Apr 2026 08:49:01 -0700 (PDT)","by 2002:a05:7300:3253:b0:2c0:df3b:ec1e with SMTP id\n 5a478bee46e88-2e42dc0732emr9866544eec.11.1776959340327;\n        Thu, 23 Apr 2026 08:49:00 -0700 (PDT)"],"Message-ID":"<46ba7198-c5fd-44ca-9b35-b9970f400fdd@meta.com>","Date":"Thu, 23 Apr 2026 16:48:56 +0100","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","From":"Matt Evans <mattev@meta.com>","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","To":"Leon Romanovsky <leon@kernel.org>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n        Logan Gunthorpe\n <logang@deltatee.com>,\n        Ankit Agrawal <ankita@nvidia.com>, Alex Williamson <alex@shazbot.org>,\n        Niklas Schnelle\n <schnelle@linux.ibm.com>, linux-pci@vger.kernel.org,\n        linux-kernel@vger.kernel.org","References":"<20260421174351.3897842-1-mattev@meta.com>\n <20260421194954.GA28413@unreal>\n <a42eff69-e31e-4f99-a63a-5db2402154eb@meta.com>\n <20260422151906.GB28413@unreal>","Content-Language":"en-GB","In-Reply-To":"<20260422151906.GB28413@unreal>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"7bit","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIzMDE1NiBTYWx0ZWRfX/oAMdP4v5qw2\n h4YxTlKdOeaN0OFkjJ9WwHchO8xwJqWfcFUthEqguzfWrCpLzqJ+9FbrpG2V30WMhNGsHkyoH7n\n CysBGTKrU5ot5DyekfH8jOFfdh/ocewh8PNreY3s8ESXW8QOlNRltZq2AhoDlTNKHKGDjQCabbz\n vX/AUJjE+vfZiW8SZRr7nhFyv9h7xObAW2Q7Yf+Ykh2dAwkkr68J82327xAaZd+nHOIZ7eb+VnD\n 9W6vCUEKuRC4uZpZFC5cNcJaHHFPCQIdZ2YqHBjSM5I+Jf3msmx8UU9IJjCJ6PlJu0ICGLNSyEP\n 6hKJuzJEtY2QHVEQtOrw85PeBu86JqPXwYhbVIvyyNt9V74IwpKTrihJs6NCX3VxBTbiV42y1T2\n zeNlRoFP7M1AHRzMffhz5k9/8vffl3IKtEg3Xg6aQssoy//dIxFLSXeXRBwzH1P57gmvuC9hLF2\n iucVp9Cyy88yAELP7ag==","X-Authority-Analysis":"v=2.4 cv=aN3Ab79m c=1 sm=1 tr=0 ts=69ea3f6e cx=c_pps\n a=PfFC4Oe2JQzmKTvty2cRDw==:117 a=2UbFsIa4v//lIgRL4kGwwA==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=7x6HtfJdh03M6CCDgxCd:22 a=_78whYxrdx1mplLwxq1U:22 a=VwQbUJbxAAAA:8\n a=VabnemYjAAAA:8 a=rOgdde6qJ7EhcwaZcN0A:9 a=QEXdDO2ut3YA:10\n a=gKebqoRLp9LExxC7YDUY:22","X-Proofpoint-ORIG-GUID":"3BB1pfR7PBq7IbZ_flB1VxXwy5ToyH3Q","X-Proofpoint-GUID":"3BB1pfR7PBq7IbZ_flB1VxXwy5ToyH3Q","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-23_03,2026-04-21_02,2025-10-01_01"}},{"id":3681571,"web_url":"http://patchwork.ozlabs.org/comment/3681571/","msgid":"<34d884a3-ae25-49b2-9063-8783ff50e095@meta.com>","list_archive_url":null,"date":"2026-04-23T16:46:57","subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":93208,"url":"http://patchwork.ozlabs.org/api/people/93208/","name":"Matt Evans","email":"mattev@meta.com"},"content":"Hi Alex,\n\nOn 22/04/2026 16:01, Alex Williamson wrote:\n> \n> On Tue, 21 Apr 2026 10:43:51 -0700\n> Matt Evans <mattev@meta.com> wrote:\n> \n>> Extend pcim_p2pdma_provider()'s checks to exclude functions that have\n>> pdev->non_mappable_bars set.\n>>\n>> Consumers such as VFIO were previously able to map these for access by\n>> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n>> refers to any access, not just userspace CPU access.\n>>\n>> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n>> Signed-off-by: Matt Evans <mattev@meta.com>\n>> ---\n>>\n>> This arises from Alex Williamson's suggestion to test\n>> non_mappable_bars when getting the provider, with discussion here:\n>>\n>>   https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n>>\n>> The goal was to prevent a hole where VFIO could export DMABUFs for\n>> BARs marked non-mappable, and to fix for all users of the provider\n>> rather than just VFIO.  Alex observed that non_mappable_bars should be\n>> taken to mean BARs weren't usable by the CPU _or_ peers and,\n>> considering that, its comment about userspace access wasn't quite\n>> right.\n>>\n>>\n>>   drivers/pci/p2pdma.c | 3 ++-\n>>   include/linux/pci.h  | 2 +-\n>>   2 files changed, 3 insertions(+), 2 deletions(-)\n>>\n>> diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c\n>> index 7c898542af8d..4a783413f466 100644\n>> --- a/drivers/pci/p2pdma.c\n>> +++ b/drivers/pci/p2pdma.c\n>> @@ -318,7 +318,8 @@ struct p2pdma_provider *pcim_p2pdma_provider(struct pci_dev *pdev, int bar)\n>>   {\n>>   \tstruct pci_p2pdma *p2p;\n>>   \n>> -\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM))\n>> +\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM) ||\n>> +\t    pdev->non_mappable_bars)\n>>   \t\treturn NULL;\n>>   \n>>   \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n>> diff --git a/include/linux/pci.h b/include/linux/pci.h\n>> index 2c4454583c11..1e6802017d6b 100644\n>> --- a/include/linux/pci.h\n>> +++ b/include/linux/pci.h\n>> @@ -508,7 +508,7 @@ struct pci_dev {\n>>   \tunsigned int\tno_command_memory:1;\t/* No PCI_COMMAND_MEMORY */\n>>   \tunsigned int\trom_bar_overlap:1;\t/* ROM BAR disable broken */\n>>   \tunsigned int\trom_attr_enabled:1;\t/* Display of ROM attribute enabled? */\n>> -\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped to user-space  */\n>> +\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped by CPU or peers */\n>>   \tpci_dev_flags_t dev_flags;\n>>   \tatomic_t\tenable_cnt;\t/* pci_enable_device has been called */\n>>   \n> \n> Should pcim_p2pdma_init() separately test pdev->non_mappable_bars\n> before the rcu-deref/kzalloc of the pci_p2pdma object and return\n> -EOPNOTSUPP?\n> \n> That then invokes the same error paths we'd see if we simply don't have\n> p2pdma in the kernel and handles the pci_p2pdma_add_resource() path\n> automatically as well.\n> \n> This pcim_p2pdma_provider() test is really then just suppressing the\n> WARN_ON that we'd otherwise see by not finding the p2p object on the\n> device.  Thanks,\n\nThat makes sense, yes, it'll avoid the WARN that'd otherwise occur in \npci_p2pdma_add_resource().\n\nI'll do a v2 adding this check to pcim_p2pdma_init() as well.  Hopefully \nLogan & Niklas's R-B will still apply.\n\n\nThanks,\n\n\nMatt","headers":{"Return-Path":"\n <linux-pci+bounces-53055-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=meta.com header.i=@meta.com header.a=rsa-sha256\n header.s=s2048-2025-q2 header.b=ibVHogOP;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c0a:e001:db::12fc:5321; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-53055-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com\n header.b=\"ibVHogOP\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=67.231.153.30","smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=meta.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=meta.com"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org\n [IPv6:2600:3c0a:e001:db::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1j3H6rrnz1yCv\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 02:58:35 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 8A53030BE1FA\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 16:47:10 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id E913A382F15;\n\tThu, 23 Apr 2026 16:47:05 +0000 (UTC)","from mx0b-00082601.pphosted.com (mx0b-00082601.pphosted.com\n [67.231.153.30])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 4FB7337CD2E\n\tfor <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 16:47:04 +0000 (UTC)","from pps.filterd (m0528005.ppops.net [127.0.0.1])\n\tby mx0a-00082601.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63MJk0Zi4173756\n\tfor <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 09:47:03 -0700","from mail-dy1-f197.google.com (mail-dy1-f197.google.com\n [74.125.82.197])\n\tby mx0a-00082601.pphosted.com (PPS) with ESMTPS id 4dpepadv1s-1\n\t(version=TLSv1.3 cipher=TLS_AES_128_GCM_SHA256 bits=128 verify=NOT)\n\tfor <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 09:47:03 -0700 (PDT)","by mail-dy1-f197.google.com with SMTP id\n 5a478bee46e88-2bda35eab74so6179927eec.0\n        for <linux-pci@vger.kernel.org>; Thu, 23 Apr 2026 09:47:03 -0700 (PDT)","from [10.0.40.30] ([51.52.155.79])\n        by smtp.gmail.com with ESMTPSA id\n 5a478bee46e88-2e53d2cfc1dsm27499552eec.22.2026.04.23.09.46.58\n        (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128);\n        Thu, 23 Apr 2026 09:47:01 -0700 (PDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776962825; cv=none;\n b=bSXG/RSb/T0gs1DYf4mWmZIAfjH+l+PtL/bkF+HBNKsnWxBOOxZ+hdavSx8vsa8Ve1YvGCKE938dIpPfK80/scuRUEuj0CQdskbQ/Bn+/9FlnyDCIHP1PA4dwtEFmcBZ2xUN5eydvu38rzmBFJYDNgiSgr0Q1wt7aDMSdVx/oAQ=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776962825; c=relaxed/simple;\n\tbh=h+lptLSrwl6lS/910QxA/O1c+TuP9Gbsrz1YCOfUQf4=;\n\th=Message-ID:Date:MIME-Version:Subject:To:Cc:References:From:\n\t In-Reply-To:Content-Type;\n b=rOZuzfzpG4xIl77oUanwHfOrSV66SN6sUnYeKQBca5eCRlRBwDHeOjse8kOtklRFdvULlfdCvlh2djuGlQbybnvV7Oue4Axp8lxcylHDFYuqXPXADGGTfdHb1lOrxmGffy8+aU3jsYvhk3RIgk3RL2kobHMdCZEtAyNAuvIcz18=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=reject dis=none) header.from=meta.com;\n spf=pass smtp.mailfrom=meta.com;\n dkim=pass (2048-bit key) header.d=meta.com header.i=@meta.com\n header.b=ibVHogOP; arc=none smtp.client-ip=67.231.153.30","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=meta.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=s2048-2025-q2;\n\t bh=oVfOeV72AOJgq9KjWrZRAnrxVldfcZIMHauJXVMpJ7k=; b=ibVHogOPtzkR\n\tLCyiRdlxlYrnV8iqNCbo1hZCrnPS43Id8IO49FUT2Y9Pps3Ht3aesu1pzVaMkhSC\n\tFcwKOcymJk754TVvCkV39zogrdzIViG/UgSKtGLN9SyDMVhTGgwVW121LwXUEYKl\n\t9dx4/SneEpdMsxmSZEb/cwnk5FYfQj1N9KP10nR8ph3Xwc2NlWQxoHK3iGExkPKH\n\tQRkTbRQaB25omw+8ZYnU5qQJ3yWGYCKr3TAj6IDN13Qbg3wBMEt+UEVkLzCyD6RW\n\trQ9T7iCZsmBYO4vZbrs31ynaMbheuqlgKaIzdc2JtTobsTtIftw88mxc9f30M6ZB\n\tNUGWSyZwag==","X-Google-DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed;\n        d=1e100.net; s=20251104; t=1776962822; x=1777567622;\n        h=content-transfer-encoding:in-reply-to:from:references:cc:to\n         :content-language:subject:user-agent:mime-version:date:message-id\n         :x-gm-gg:x-gm-message-state:from:to:cc:subject:date:message-id\n         :reply-to;\n        bh=oVfOeV72AOJgq9KjWrZRAnrxVldfcZIMHauJXVMpJ7k=;\n        b=QZiQG18+RBI3A22/SAcZzpuUD8L4TFOO5k4zPEGCjMiQOtxL3/OCEyEbFJYSeeGsUn\n         OVhvZr3ZA85tfYKtaqlxUWf42sU1ASLjbABU59u2litUiOqpQcVcj2iTJ/c0C3Y0SOYK\n         TCuDdABI87moRYQUd1SB83IImu8x80OXZdgvshJSXniPrFzx8PDLDchbNdGM9SQRBhW+\n         aUUuFOVM4oBG0LS7NS+i4j2Ze41nGremwsnTVRtQQxDufMng65Z1R1/SnCoHY0tReSjK\n         /lcLJLO65LQ7KWMHyqdhGhm7JwUJzNj+/oCShY3/06r4qLPlE7KgwfVnKFqENeCV6wxq\n         ANnA==","X-Forwarded-Encrypted":"i=1;\n AFNElJ8CugFewVMEIsTqSAfeFFgjukx+qF5GyxcpRZi65qfSzavIG6hea0J6lyBB2JDjwDLVZ/FPk8byj8M=@vger.kernel.org","X-Gm-Message-State":"AOJu0Yzn76CIouto0TvH8hpVCMiLJjBXPBGx7EDX5KBwHvccXCJJhEP6\n\tYD2UOFhqXwdeOUVAPLH7VSfutM8mdKBMV3lgbs8T/Z5ihndtxAVOYzozh1VZTMUMuwGhTujhQi3\n\tks7we9h7Kg3A2Md5fTxv4YygN1ALfW0UFDvN9rFWHhrnA87OshoW+xhx7TedCpLP7UgJ1","X-Gm-Gg":"AeBDieuXQ7JDQkVwAwhH2qd7YuEehxaoNTpcRzBGsPaB221I1hz1CXUePPqyoaI302b\n\tBxXBXj4K5ZXNSodYztyvHy+b5TPniCuAVqHEIJuDO5fflHzQxs3HJt6pdXZqYUuzrxzn684xSEh\n\t8fezja9Cs0Qtv379xUGp4I+ytZAuoJC8B/8XToZAl+1txvoYJVRe8WSFPnTAi0T2U8vYenkxsD2\n\t8X5mfarNe0YqbTWsExFIdmaeymbrWBA4e462XMZgQvDYq5F+VwW3YfnKcQcPd1SD7NPSntd151m\n\tQ8sPjuCxWp3XoAXriAXqdQrnXmsNdty7vGLRTEqKZCg4EYBDmUqhwrFUC0pGx+muOHzn0sURO0c\n\tF6JuJD4ZnhlKT/IDv8P00MAvtjFpTm6/HVqRdwXJm","X-Received":["by 2002:a05:7300:3253:b0:2c0:df3b:ec1e with SMTP id\n 5a478bee46e88-2e42dc0732emr9944356eec.11.1776962822109;\n        Thu, 23 Apr 2026 09:47:02 -0700 (PDT)","by 2002:a05:7300:3253:b0:2c0:df3b:ec1e with SMTP id\n 5a478bee46e88-2e42dc0732emr9944340eec.11.1776962821442;\n        Thu, 23 Apr 2026 09:47:01 -0700 (PDT)"],"Message-ID":"<34d884a3-ae25-49b2-9063-8783ff50e095@meta.com>","Date":"Thu, 23 Apr 2026 17:46:57 +0100","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Mozilla Thunderbird","Subject":"Re: [PATCH] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Content-Language":"en-GB","To":"Alex Williamson <alex@shazbot.org>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n        Logan Gunthorpe\n <logang@deltatee.com>,\n        Ankit Agrawal <ankita@nvidia.com>, Leon Romanovsky <leon@kernel.org>,\n        Niklas Schnelle <schnelle@linux.ibm.com>, linux-pci@vger.kernel.org,\n        linux-kernel@vger.kernel.org","References":"<20260421174351.3897842-1-mattev@meta.com>\n <20260422090146.6faf00f8@shazbot.org>","From":"Matt Evans <mattev@meta.com>","In-Reply-To":"<20260422090146.6faf00f8@shazbot.org>","Content-Type":"text/plain; charset=UTF-8; format=flowed","Content-Transfer-Encoding":"7bit","X-Proofpoint-ORIG-GUID":"Xwj4NvJgEy_mZ0RM7F6DbAwFpv0naiOA","X-Authority-Analysis":"v=2.4 cv=KMxqylFo c=1 sm=1 tr=0 ts=69ea4d07 cx=c_pps\n a=Uww141gWH0fZj/3QKPojxA==:117 a=2UbFsIa4v//lIgRL4kGwwA==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=7x6HtfJdh03M6CCDgxCd:22 a=jCddH8ec0KUNCymVuxII:22 a=VwQbUJbxAAAA:8\n a=VabnemYjAAAA:8 a=CK8SrSYdo2KBgkCwzU4A:9 a=QEXdDO2ut3YA:10\n a=PxkB5W3o20Ba91AHUih5:22 a=gKebqoRLp9LExxC7YDUY:22","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIzMDE2NyBTYWx0ZWRfX2p97VrbD7TLR\n 4C2sAd2T3omrD08cxsUISYWtsd+CzkZvRoIctJF282cTqjpjyrxUcH3prutd4UVH1s5NJtIxVD+\n wgu6L/p/RDRwxw3saG09xlFXlZMq40a0ucV2rTSdS+SiYZX7ZMAT6VBsS9IRWPgnHN5bOQ6dfmU\n LBDgRriepsY1TD27wSkoo6LncPKkBBHy1FxwmEyxUMV+oetcUozVV4LQo4n+3FaK79xWikbdSKC\n Y9QzZQs5YtTDeVOhHkQIQbI8V2u2ClZ0gP/meAWWP16PL2LHQfBE8vgMvApqc3decxXzWGRzNWA\n d6z2mHiI/LRO08aspfv2YQKbgjJsDtbhkOhHz41xyTcxaZsVFkwFFloiMwv5Jbvsd27eefBevBQ\n cpQ8kycSBBWPDA1ElyqD6cS2glM0H2X4VUdAie4k80RBHtFj39VrV2e0HTCIaA7IXo86kcWTxZ8\n CSZp9eLCyNWMLYDKu6A==","X-Proofpoint-GUID":"Xwj4NvJgEy_mZ0RM7F6DbAwFpv0naiOA","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-23_03,2026-04-21_02,2025-10-01_01"}}]