[{"id":3681635,"web_url":"http://patchwork.ozlabs.org/comment/3681635/","msgid":"<d688d21cf54121be934c8792c95d20b60be964e1.camel@linux.ibm.com>","list_archive_url":null,"date":"2026-04-23T19:04:25","subject":"Re: [PATCH v2] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":78856,"url":"http://patchwork.ozlabs.org/api/people/78856/","name":"Niklas Schnelle","email":"schnelle@linux.ibm.com"},"content":"On Thu, 2026-04-23 at 10:30 -0700, Matt Evans wrote:\n> Extend the checks in pcim_p2pdma_init() and pcim_p2pdma_provider() to\n> exclude functions that have pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> Signed-off-by: Matt Evans <mattev@meta.com>\n> ---\n> \n> This arises from Alex Williamson's suggestion to test\n> non_mappable_bars when getting the provider, with discussion here:\n> \n>  https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n> \n> The goal was to prevent a hole where VFIO could export DMABUFs for\n> BARs marked non-mappable, and to fix for all users of the provider\n> rather than just VFIO.  Alex observed that non_mappable_bars should be\n> taken to mean BARs weren't usable by the CPU _or_ peers and,\n> considering that, its comment about userspace access wasn't quite\n> right.\n> \n> == Changes ==\n> \n> v2:\n>  - Also test non_mappable_bars in pcim_p2pdma_init(), as\n>    otherwise pci_p2pdma_add_resource() will WARN_ON\n>    pcim_p2pdma_provider() failing.\n> \n> Niklas and Logan, I didn't re-add your R-B from v1 as (splitting\n> hairs...) the code's changed.\n> \n\nMakes sense, now feel free to re-add ;)\n\nReviewed-by: Niklas Schnelle <schnelle@linux.ibm.com> \n\nThanks,\nNiklas","headers":{"Return-Path":"\n <linux-pci+bounces-53063-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=ibm.com header.i=@ibm.com header.a=rsa-sha256\n header.s=pp1 header.b=mWit9iXd;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=2600:3c09:e001:a7::12fc:5321; helo=sto.lore.kernel.org;\n envelope-from=linux-pci+bounces-53063-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=ibm.com header.i=@ibm.com\n header.b=\"mWit9iXd\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=148.163.158.5","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=linux.ibm.com"],"Received":["from sto.lore.kernel.org (sto.lore.kernel.org\n [IPv6:2600:3c09:e001:a7::12fc:5321])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1ltR5T0bz1y2d\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 05:06:07 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sto.lore.kernel.org (Postfix) with ESMTP id 99C16301C5E3\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 19:05:45 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id B9F401E89C;\n\tThu, 23 Apr 2026 19:05:41 +0000 (UTC)","from mx0b-001b2d01.pphosted.com (mx0b-001b2d01.pphosted.com\n [148.163.158.5])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 2AC37391E51;\n\tThu, 23 Apr 2026 19:05:39 +0000 (UTC)","from pps.filterd (m0353725.ppops.net [127.0.0.1])\n\tby mx0a-001b2d01.pphosted.com (8.18.1.11/8.18.1.11) with ESMTP id\n 63NJ0Mus3944167;\n\tThu, 23 Apr 2026 19:05:30 GMT","from ppma12.dal12v.mail.ibm.com\n (dc.9e.1632.ip4.static.sl-reverse.com [50.22.158.220])\n\tby mx0a-001b2d01.pphosted.com (PPS) with ESMTPS id 4dpeu3sr87-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tThu, 23 Apr 2026 19:05:29 +0000 (GMT)","from pps.filterd (ppma12.dal12v.mail.ibm.com [127.0.0.1])\n\tby ppma12.dal12v.mail.ibm.com (8.18.1.7/8.18.1.7) with ESMTP id\n 63NIoXB5032393;\n\tThu, 23 Apr 2026 19:05:28 GMT","from smtprelay04.wdc07v.mail.ibm.com ([172.16.1.71])\n\tby ppma12.dal12v.mail.ibm.com (PPS) with ESMTPS id 4dpjkxyxav-1\n\t(version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT);\n\tThu, 23 Apr 2026 19:05:28 +0000 (GMT)","from smtpav05.dal12v.mail.ibm.com (smtpav05.dal12v.mail.ibm.com\n [10.241.53.104])\n\tby smtprelay04.wdc07v.mail.ibm.com (8.14.9/8.14.9/NCO v10.0) with ESMTP id\n 63NJ5RZw32309798\n\t(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK);\n\tThu, 23 Apr 2026 19:05:27 GMT","from smtpav05.dal12v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 74D8F58052;\n\tThu, 23 Apr 2026 19:05:27 +0000 (GMT)","from smtpav05.dal12v.mail.ibm.com (unknown [127.0.0.1])\n\tby IMSVA (Postfix) with ESMTP id 18F4B58056;\n\tThu, 23 Apr 2026 19:05:26 +0000 (GMT)","from [9.111.33.102] (unknown [9.111.33.102])\n\tby smtpav05.dal12v.mail.ibm.com (Postfix) with ESMTP;\n\tThu, 23 Apr 2026 19:05:25 +0000 (GMT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776971141; cv=none;\n b=aCL5UDl1K/Ws6InC/6scFZvJqDHdhCQWu4QHrmhF6qX0bFgQm+zP1/u1sH8wnP2+wMfwrQvdUfBCiaGCGSSZgO8VMMULIFw3RNc6u7XchbB6bLNyHX5SgZQexktRCE0PdsR0UySs1DBNzAbxDCgA7tS+TSqdfE74Roz+vwMnE/E=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776971141; c=relaxed/simple;\n\tbh=RpXKe+YBGoCd47oqpfyaE0yTqgAH7G0D4ZyvBcqyNCk=;\n\th=Message-ID:Subject:From:To:Cc:In-Reply-To:References:Content-Type:\n\t Date:MIME-Version;\n b=MRVclb/SDDXnhMuBTyiMkUrcgyf6Yp8JLnqaS+2yRlxItCV7eLk2ijjlPxY2Hc56t4HcXurjO5NRRuWDTktqZQnd6hALaWa5dfZTCNTWu3Gyt8fsgs+gtjoQH7GzKF2atOptkUIYFnB7AcgRNIvvVWy6AbXfD/RsLDVWhP7fAGY=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=linux.ibm.com;\n spf=pass smtp.mailfrom=linux.ibm.com;\n dkim=pass (2048-bit key) header.d=ibm.com header.i=@ibm.com\n header.b=mWit9iXd; arc=none smtp.client-ip=148.163.158.5","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=ibm.com; h=cc\n\t:content-transfer-encoding:content-type:date:from:in-reply-to\n\t:message-id:mime-version:references:subject:to; s=pp1; bh=bA0iud\n\tz3R11ohsRV+dD2NaMHi6tqeGF/TwO81YdQyUM=; b=mWit9iXdX3HUSOINDJCJKv\n\ta6dMq2QlrGDcuuZ0u2+1snxfa7ATM8iAr0T2R3OAyQrrlhgCaMl6/I+x1zl620+l\n\tiHiPJs+OE4FLjkvrv59aE289mLJzkAwfL5jw6zvuyrqMpo/1VjaL/9WyvtlFWWNu\n\tezLsCZpzXLLajDY2pZ9THgqqRrUqoAmK/UVFfFyjCpzVcgpK2zDoSECBZ575FI0z\n\tMlpvLqnQhBICM+K4jmMP5eMX/rx/vadaKFB76KkQUWmnudgs4mDz1ye3+uyXPP7S\n\t+pt+SMk5Ahj/HOXvvggpzWCB2BmnOQ5aYNFnjx6R1MaVKeDJwcVtZveEmYAWHIYw\n\t==","Message-ID":"<d688d21cf54121be934c8792c95d20b60be964e1.camel@linux.ibm.com>","Subject":"Re: [PATCH v2] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","From":"Niklas Schnelle <schnelle@linux.ibm.com>","To":"Matt Evans <mattev@meta.com>, Bjorn Helgaas <bhelgaas@google.com>,\n        Logan Gunthorpe <logang@deltatee.com>,\n        Ankit Agrawal <ankita@nvidia.com>, Leon Romanovsky <leon@kernel.org>,\n        Alex Williamson\t <alex@shazbot.org>","Cc":"linux-pci@vger.kernel.org, linux-kernel@vger.kernel.org","In-Reply-To":"<20260423173051.1999679-1-mattev@meta.com>","References":"<20260423173051.1999679-1-mattev@meta.com>","Autocrypt":"addr=schnelle@linux.ibm.com; prefer-encrypt=mutual;\n keydata=mQINBGHm3M8BEAC+MIQkfoPIAKdjjk84OSQ8erd2OICj98+GdhMQpIjHXn/RJdCZLa58k\n /ay5x0xIHkWzx1JJOm4Lki7WEzRbYDexQEJP0xUia0U+4Yg7PJL4Dg/W4Ho28dRBROoJjgJSLSHwc\n 3/1pjpNlSaX/qg3ZM8+/EiSGc7uEPklLYu3gRGxcWV/944HdUyLcnjrZwCn2+gg9ncVJjsimS0ro/\n 2wU2RPE4ju6NMBn5Go26sAj1owdYQQv9t0d71CmZS9Bh+2+cLjC7HvyTHKFxVGOznUL+j1a45VrVS\n XQ+nhTVjvgvXR84z10bOvLiwxJZ/00pwNi7uCdSYnZFLQ4S/JGMs4lhOiCGJhJ/9FR7JVw/1t1G9a\n UlqVp23AXwzbcoV2fxyE/CsVpHcyOWGDahGLcH7QeitN6cjltf9ymw2spBzpRnfFn80nVxgSYVG1d\n w75ksBAuQ/3e+oTQk4GAa2ShoNVsvR9GYn7rnsDN5pVILDhdPO3J2PGIXa5ipQnvwb3EHvPXyzakY\n tK50fBUPKk3XnkRwRYEbbPEB7YT+ccF/HioCryqDPWUivXF8qf6Jw5T1mhwukUV1i+QyJzJxGPh19\n /N2/GK7/yS5wrt0Lwxzevc5g+jX8RyjzywOZGHTVu9KIQiG8Pqx33UxZvykjaqTMjo7kaAdGEkrHZ\n dVHqoPZwhCsgQARAQABtChOaWtsYXMgU2NobmVsbGUgPHNjaG5lbGxlQGxpbnV4LmlibS5jb20+iQ\n JXBBMBCABBAhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAAhkBFiEEnbAAstJ1IDCl9y3cr+Q/Fej\n CYJAFAmmAWs8FCQl6sYAACgkQr+Q/FejCYJAn2g//UKzlXOgizdk0wudLooRbGzDo23ktGSPK5Oj9\n 9o5z6v4Jz5+qOHo5835683cqkMLM9//udA1ZcKV88LVwyfmoHChPW24cWBmOEy7RJOWCR4WeEINaO\n pZUGF5YOx7oKTkPs511ky2FR0Heg35754pgTuTMEpYzRXr5pNMPS8mHXcXSARFPDPaCF+uBJ9BafO\n L7XbpSwKRttePsWAlPHbSbloeDApBfHUhcF/pbuM9GNs+c/8V9NK+SwwqNK214t7jaSq9k+19/hfE\n jvU45nbiYQM4VqGCelxVFRWol93JnwPFp/JaMgxgV1VYFH9Ijtgh+qNVVBqO8bbTjioFKy1bHdprN\n 9GyPLDxoaI/lBg+5CwKewzazUjFd0xaqZbTXSgNK4ev/IuNI3qZV8tpvZZWwIgZU1K0Bhplt8Sku+\n O9Yl2H54erq9zuzwXjqBJtoW0+MaKbe+1gZ/v2/AVE2VeQMugPUWDg+2bpJaApRkeA4xQ9XfeW6Bp\n It7xYrwwbVhQtWRC0sRh+QNlU9HI28wPSnLWn7HFBeWupaIrxSp4IEL3eHUn8xv4aA8lpdNsHXD/X\n vqOSUwy5jlTPTlemvwaC9mNHagNdVXng8C6+hxiDLhZ6xH2P4qNHTKmjW61NsdF6Y/HfWP+lmbi8/\n 474UNCltDt/fP01ajqogfWZKFymoH0O0KU5pa2xhcyBTY2huZWxsZSA8bmlrbGFzLnNjaG5lbGxlQ\n GlibS5jb20+iQJUBBMBCAA+AhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEnbAAstJ1IDCl9y\n 3cr+Q/FejCYJAFAmmAWusFCQl6sYAACgkQr+Q/FejCYJAtIw//WmQW/Z+SLdfrlDH5J2bvixzFNnO\n TOvp8uM8vcNZsxZwPXem4AeCXHayCqipxpa0iXWufEIvdMxkBxWvvM//V+rTUgQnJe6nhDxfLGklx\n 5Mb2H+K/ndS73ElCuA30MPYq7mHr8i3gEmi2ZFX1W47JecJ8hno/DQxhHRG7bd+GFsiKCbsjLWXNq\n s/VaAK9uyOTQx7m6/2nR8L+Mvl1BrRXwkj7Qp0qxfQSd4r+IVNBzNFOcrGagBqsyHrN7Is7IICktH\n 9VFl/G8P+hfviHQLnlxw9ltzpM1Dy6N1+BM3kbqD59gX+L6wqiLJI42eh+SHCiy35FvD3AFlYx4jZ\n MWE6qIgFnbwcL1kvcA7nnwfr3ZizCYPm8e334xXxslXBoRGsvjXSbAeAyZo2dvJXffNHdcDdUbJSl\n CfOixNGGKiQvs00X9ekfq9WmmRFvmYHu/m3lg1OXnMjFFIO41O51ZdhbEYJiqZEki7jA8Hd9xuWwQ\n nFDHhacU3xxivZ4BKQGQc+4XZ3yp/q6+7ux9prepRy/LeRyoaAmE67oxEsAgj+qyA3Tfy5nRTDdRQ\n E//gpaIt9H1VEx+68dRWHroxBQeozpnFPi25AlX3k4/EtVZjcItPWgE9iru1qT4DH3BBrz7Kd1zUw\n NnQC77zDJyZD2WUj1E+5bftO0aeE+7HZXj3tM/ea0K05pa2xhcyBTY2huZWxsZSA8bmlrbGFzLnNj\n aG5lbGxlQGdtYWlsLmNvbT6JAlQEEwEIAD4CGwEFCwkIBwIGFQoJCAsCBBYCAwECHgECF4AWIQSds\n ACy0nUgMKX3Ldyv5D8V6MJgkAUCaYBa6wUJCXqxgAAKCRCv5D8V6MJgkF/TEACOY2kL4NGFIbWeM5\n TUhatxqe8c3RT6jvNjq32CkvaK/cSZzBkS0smddyOzxt2WnsvMgkr9cM7P+CevoMwhT3e0lgQbqBD\n /vXZJjWKddC+iKXeqWkjMVcgCOsWNZ7PWEzRUT5X1AEFq2zzxQAQ/bCWEYNqIbHN4b6G1Wk+2Y598\n +KypZ3FS0bwiItnPQOWzOOqJCGxDxaEUuXFx4ah8HtVdtIev8jPS/5uzQO9iG2vZQUWeMEYZtfMHW\n sbFWqo2A3lxB+KPzNIYFhul4Lyx1CwvKUAGSHOx7FZuc2xI5DYt/Wdh2QyKFYr7xVzv3uwJjeS1+3\n 6gvyB7DJaQuY+PziNPv4GPr5wy0cRkJ6Ps15fgC6y6wNwoNdNXKlwiuclIsBzJKa7A0pZMIfpCpIJ\n bEHP7oy3drBRAhIrBx7Lx1lyqqodDqc+ok5IQ5WcKG/TOrH732mTmJX6fxYTiCVxcU4WLJSNZbrZ/\n pjF0AWXs7E+onAkQy6RLg/XU1iiU5QdMvug+fTA6TpPSUMdujWtGWUt3/4nC+69AVc8tXtRQTZ7gP\n t7uIcQFwPqUuJGS26vl0w/6dIABQAyU9acvE3adCZra+/PBKFZi/yxT1WgV1T2mexKSWwQgLcR57J\n Yp5oWnQRgi/S6fAoskIWkp9UVcfAQPY0p45NwO5cZR9/g06JZmyrQhTmlrbGFzIFNjaG5lbGxlIDx\n uaWtzQGtlcm5lbC5vcmc+iQJUBBMBCAA+AhsBBQsJCAcCBhUKCQgLAgQWAgMBAh4BAheAFiEEnbAA\n stJ1IDCl9y3cr+Q/FejCYJAFAmmAWusFCQl6sYAACgkQr+Q/FejCYJAz4A/9F+dMhzu7YonagL4qh\n WDz5IpRD4vzYKOBZ+qwYp1ugJz1BIUppN9i68HKoS4ARfgP97Sv9GpOy9g7L0lymH2MPF8hRPK0Yn\n 7DKIkeu/r28YWEoWfoVm5reC+gpxMgmxBz4JScE4f6xfa7+Nw0bbTDl+nxftJD7lf/dTiruNJsXph\n HQnZ5wPXmxeH6XVJikfpyrGe8iJZALbtHtjlx6Omu7NvRGikenB8trrWS5W0F60ZdbqH1HdmDDcrZ\n pDq6LtAARHK5tGRm0SK6sZpKe3nULFeeCt7T/edk2FC6KVh4sL1jw1kyceX4DjiMffqYBPrhK5gz5\n cDIixLBF9C6Wt1ObvuDBrIQf1/3q6EZrUrUuf6qtaXDMuC6cSlShm47qaPEvVYh67O9JZQ7vzvaea\n UI74DJUb8Pjnz7mTOmMOzsS1gUhCue4n2YSSM6ythioCGb/3bgMGTpuer3JhvZG5s5uKD9yyj8s8x\n 35qJkCFfjmjVx9s3vSUS48X+cUpYcMispErKzFu7C0YgKoxvJ4XTfXlDBiMFMPYcN67hsb2jeYHVJ\n wzE+fIZiDx9JLh1oQW2krwjweisE+3glOaKXZKi0fBtkxyH41iemLtLNYZRJopv6ykdl3hiI+Nh+a\n 3FZJPTo/OpqchMm8XIeDxC4NFFiPMpyLeYzIxO7eZpiGrAjVTE=","Content-Type":"text/plain; charset=\"UTF-8\"","Content-Transfer-Encoding":"quoted-printable","Date":"Thu, 23 Apr 2026 21:04:25 +0200","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","User-Agent":"Evolution 3.58.3 (3.58.3-1.fc43) ","X-TM-AS-GCONF":"00","X-Proofpoint-Reinject":"loops=2 maxloops=12","X-Proofpoint-GUID":"4AgvFRtSjGI8rQmNSXteRbPifdrTHJvy","X-Proofpoint-Spam-Details-Enc":"AW1haW4tMjYwNDIzMDE4MyBTYWx0ZWRfX1X8fbM12GOpD\n 231eTKlsu9csx89VGXcVyZSOyOXky8tfWW0PiGJQsg66EmcNa2SCImyvzheV33ga61yusfKH/L7\n yHcpLqgM+QXTRRpXGemIe/Jcjkl6sFbdBJ4HxMQ2B/BfuwkucBTMEEGjZSCyEij4GnADFaTFL5p\n ux+8bl5vro3aLwGnnxkVGqvBsmtBmvi4Ip+MLBAB2hydKYJf6H93l8QrlznDifk9wM3WwfWko37\n vJrv1LjY51xxEda52zK6a+in6QOHJP1e1sCY/GT+DF1usgoluBEtYUa7UQrW7C6SKCmqNLY67wk\n EpJK6ekgjBHt6Ew4dpZdH2JzVssaSE82+GWxLWXTNltDzqA18wMWSRxot0Tq18d0C5YTRPM0o/M\n Oon7wovhqx3ub1+emyL6JhDunBu8LMfVldqbS/IKhEUZxubLLLJrQwDg2vFVkStMPhXCY3QFzza\n 4J1Uw8Uau1Q0pQ2TsoQ==","X-Authority-Analysis":"v=2.4 cv=a6kAM0SF c=1 sm=1 tr=0 ts=69ea6d79 cx=c_pps\n a=bLidbwmWQ0KltjZqbj+ezA==:117 a=bLidbwmWQ0KltjZqbj+ezA==:17\n a=IkcTkHD0fZMA:10 a=A5OVakUREuEA:10 a=VkNPw1HP01LnGYTKEx00:22\n a=RnoormkPH1_aCDwRdu11:22 a=V8glGbnc2Ofi9Qvn3v5h:22 a=VwQbUJbxAAAA:8\n a=VabnemYjAAAA:8 a=VnNF1IyMAAAA:8 a=teCjjoZnVze8JZkblVgA:9 a=QEXdDO2ut3YA:10\n a=gKebqoRLp9LExxC7YDUY:22","X-Proofpoint-ORIG-GUID":"LPm2vYsAhkVaGLjFsbCFuV1L7ANeR68m","X-Proofpoint-Virus-Version":"vendor=baseguard\n engine=ICAP:2.0.293,Aquarius:18.0.1143,Hydra:6.1.51,FMLib:17.12.100.49\n definitions=2026-04-23_03,2026-04-21_02,2025-10-01_01","X-Proofpoint-Spam-Details":"rule=outbound_notspam policy=outbound score=0\n malwarescore=0 suspectscore=0 spamscore=0 adultscore=0 bulkscore=0\n lowpriorityscore=0 impostorscore=0 clxscore=1015 phishscore=0\n priorityscore=1501 classifier=typeunknown authscore=0 authtc= authcc=\n route=outbound adjust=0 reason=mlx scancount=1 engine=8.22.0-2604200000\n definitions=main-2604230183"}},{"id":3681654,"web_url":"http://patchwork.ozlabs.org/comment/3681654/","msgid":"<20260423134052.292e92cf@shazbot.org>","list_archive_url":null,"date":"2026-04-23T19:40:52","subject":"Re: [PATCH v2] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":91887,"url":"http://patchwork.ozlabs.org/api/people/91887/","name":"Alex Williamson","email":"alex@shazbot.org"},"content":"On Thu, 23 Apr 2026 10:30:51 -0700\nMatt Evans <mattev@meta.com> wrote:\n\n> Extend the checks in pcim_p2pdma_init() and pcim_p2pdma_provider() to\n> exclude functions that have pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> Signed-off-by: Matt Evans <mattev@meta.com>\n> ---\n> \n> This arises from Alex Williamson's suggestion to test\n> non_mappable_bars when getting the provider, with discussion here:\n> \n>  https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n> \n> The goal was to prevent a hole where VFIO could export DMABUFs for\n> BARs marked non-mappable, and to fix for all users of the provider\n> rather than just VFIO.  Alex observed that non_mappable_bars should be\n> taken to mean BARs weren't usable by the CPU _or_ peers and,\n> considering that, its comment about userspace access wasn't quite\n> right.\n> \n> == Changes ==\n> \n> v2:\n>  - Also test non_mappable_bars in pcim_p2pdma_init(), as\n>    otherwise pci_p2pdma_add_resource() will WARN_ON\n>    pcim_p2pdma_provider() failing.\n> \n> Niklas and Logan, I didn't re-add your R-B from v1 as (splitting\n> hairs...) the code's changed.\n> \n> v1:\n>  https://lore.kernel.org/linux-pci/20260421174351.3897842-1-mattev@meta.com/\n> \n> \n>  drivers/pci/p2pdma.c | 6 +++++-\n>  include/linux/pci.h  | 2 +-\n>  2 files changed, 6 insertions(+), 2 deletions(-)\n> \n> diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c\n> index 7c898542af8d..adb17a4f6939 100644\n> --- a/drivers/pci/p2pdma.c\n> +++ b/drivers/pci/p2pdma.c\n> @@ -262,6 +262,9 @@ int pcim_p2pdma_init(struct pci_dev *pdev)\n>  \tstruct pci_p2pdma *p2p;\n>  \tint i, ret;\n>  \n> +\tif (pdev->non_mappable_bars)\n> +\t\treturn -EOPNOTSUPP;\n> +\n>  \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n>  \tif (p2p)\n>  \t\treturn 0;\n> @@ -318,7 +321,8 @@ struct p2pdma_provider *pcim_p2pdma_provider(struct pci_dev *pdev, int bar)\n>  {\n>  \tstruct pci_p2pdma *p2p;\n>  \n> -\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM))\n> +\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM) ||\n> +\t    pdev->non_mappable_bars)\n>  \t\treturn NULL;\n>  \n>  \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n> diff --git a/include/linux/pci.h b/include/linux/pci.h\n> index 2c4454583c11..1e6802017d6b 100644\n> --- a/include/linux/pci.h\n> +++ b/include/linux/pci.h\n> @@ -508,7 +508,7 @@ struct pci_dev {\n>  \tunsigned int\tno_command_memory:1;\t/* No PCI_COMMAND_MEMORY */\n>  \tunsigned int\trom_bar_overlap:1;\t/* ROM BAR disable broken */\n>  \tunsigned int\trom_attr_enabled:1;\t/* Display of ROM attribute enabled? */\n> -\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped to user-space  */\n> +\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped by CPU or peers */\n>  \tpci_dev_flags_t dev_flags;\n>  \tatomic_t\tenable_cnt;\t/* pci_enable_device has been called */\n>  \n\nReviewed-by: Alex Williamson <alex@shazbot.org>\nSuggested-by: Alex Williamson <alex@shazbot.org>\n\nThanks,\nAlex","headers":{"Return-Path":"\n <linux-pci+bounces-53065-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=shazbot.org header.i=@shazbot.org header.a=rsa-sha256\n header.s=fm1 header.b=bMhsBi1G;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=messagingengine.com header.i=@messagingengine.com\n header.a=rsa-sha256 header.s=fm2 header.b=tf9/upFY;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-53065-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=shazbot.org header.i=@shazbot.org\n header.b=\"bMhsBi1G\";\n\tdkim=pass (2048-bit key) header.d=messagingengine.com\n header.i=@messagingengine.com header.b=\"tf9/upFY\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=103.168.172.155","smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=shazbot.org","smtp.subspace.kernel.org;\n spf=pass smtp.mailfrom=shazbot.org"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g1mhC1LDCz1yDD\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 05:42:19 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 5A074300B100\n\tfor <incoming@patchwork.ozlabs.org>; Thu, 23 Apr 2026 19:40:58 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id 897B5314B8C;\n\tThu, 23 Apr 2026 19:40:57 +0000 (UTC)","from fhigh-a4-smtp.messagingengine.com\n (fhigh-a4-smtp.messagingengine.com [103.168.172.155])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id 1A1513126B2;\n\tThu, 23 Apr 2026 19:40:54 +0000 (UTC)","from phl-compute-02.internal (phl-compute-02.internal [10.202.2.42])\n\tby mailfhigh.phl.internal (Postfix) with ESMTP id 4A6BE1400129;\n\tThu, 23 Apr 2026 15:40:54 -0400 (EDT)","from phl-frontend-03 ([10.202.2.162])\n  by phl-compute-02.internal (MEProxy); Thu, 23 Apr 2026 15:40:54 -0400","by mail.messagingengine.com (Postfix) with ESMTPA; Thu,\n 23 Apr 2026 15:40:53 -0400 (EDT)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1776973257; cv=none;\n b=ZzDDYbUAA2RoN1WwEkMp6DFF6hmmZZyfpNpO6qJgLMXUxEimIG9jJ7H8/6zTKu7OrGo5TGyzONx1qUMM15jkLQaQxiFFv7jSvHVgrTnvySxUcsuf+Ekr30RQLhBG+g0QI9VMmUboMPLP6cnhXUUDXbaDrXnT4Y7gQMB7ogjD06s=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1776973257; c=relaxed/simple;\n\tbh=nJqu9gsYfYmWAZCaOClg4DaYAEsN+5fB4HjCMJirMPk=;\n\th=Date:From:To:Cc:Subject:Message-ID:In-Reply-To:References:\n\t MIME-Version:Content-Type;\n b=tNYMYKLevyZqAB6QgxRtkd51kgLw13R9fHySce+m0oCsEb5YMKUC3H9K5JzGjiJwvrTZpg6ysUZaToGV4Bu6pqr3V516LcKvCeCWnYg5AmEkoB/572CsQysOQjuPUXlEJFidn2mT9kzCL1xhYuZQ+U6R8iWEOYzSRwMY+9VO8Mc=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dmarc=pass (p=none dis=none) header.from=shazbot.org;\n spf=pass smtp.mailfrom=shazbot.org;\n dkim=pass (2048-bit key) header.d=shazbot.org header.i=@shazbot.org\n header.b=bMhsBi1G;\n dkim=pass (2048-bit key) header.d=messagingengine.com header.i=@messagingengine.com\n header.b=tf9/upFY; arc=none smtp.client-ip=103.168.172.155","DKIM-Signature":["v=1; a=rsa-sha256; c=relaxed/relaxed; d=shazbot.org; h=\n\tcc:cc:content-transfer-encoding:content-type:content-type:date\n\t:date:from:from:in-reply-to:in-reply-to:message-id:mime-version\n\t:references:reply-to:subject:subject:to:to; s=fm1; t=1776973254;\n\t x=1777059654; bh=zCMKY/sFtkVHt3K1ICDRla4xyL9PgUE/tI3XoOzsjn0=; b=\n\tbMhsBi1GN3q8l5XGbogOetqMo+BRjAzz6IacIhj2YVmZSEieNGdwoRGcOGQGSG/i\n\tBv00lurSNJpMGG/ZuVjn/g9sJeWjOQi4MynhupmN4hLhH/GPjmZ+IcLM48MMDVaj\n\tCBzxJKgK1ExEHdOoP1147Ik+G217lJTWpd3ZbhI8vDJ6rhDRrWPieItDQ2QEN68b\n\tdHae2r18qMVXtcpGViOegIFuqD91gzZ4S7Wzqc7BV4USNtmq2IqjDM5ZkDjMra+W\n\tAjCbMBmIVfkSkRtMYBDVJUlJWD3/lbb1Wb4HCRqqy1VeBVyoG+5fe8vO5Mdj37y0\n\tWoJ0kCv5RJLHdzhZ4U5stA==","v=1; a=rsa-sha256; c=relaxed/relaxed; d=\n\tmessagingengine.com; h=cc:cc:content-transfer-encoding\n\t:content-type:content-type:date:date:feedback-id:feedback-id\n\t:from:from:in-reply-to:in-reply-to:message-id:mime-version\n\t:references:reply-to:subject:subject:to:to:x-me-proxy\n\t:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; t=1776973254; x=\n\t1777059654; bh=zCMKY/sFtkVHt3K1ICDRla4xyL9PgUE/tI3XoOzsjn0=; b=t\n\tf9/upFYtKwbmyq+uqH0URbBKSoHWyUoRxe3X0qiwPREwo1JBqLlY9EZbfiZRhn2/\n\t+YvlrZ2qCpYq1lpN85TtoJa9Fk7n+dxGCqjK7F0059VK9LyXehhqEdovd65094CT\n\tUUztqogRgUNvWAg4XYG5XX+r/HL3fXCsh7kixrbkRQw8X8A+ZyL8AHjVZgY+cl4Q\n\tO0VFv8DZsCev8mPxTbSe0CtOwUnRgIyLcQ3sAnAIIsSk+hTRQL+BPdbwNvtfh1w+\n\tVdKyDc2y6Y/S/mzTiIT8lZGIbj5GS6KseDoDr2nGlSC4bc6q99OhKuekQZJYlLHf\n\tamINU9pXdTFH+X23yZGYg=="],"X-ME-Sender":"<xms:xXXqaYtoVo2jQWEhVg0-yOE-RPB6vSIgJBbkiMrjzJKjK63sYCM1Bw>\n    <xme:xXXqaV4bfcuEy4cz38ZdFGxgZrQRX7uWvgBltup1LWnmBJrk9W1awdl7-dSvwXZvd\n    Z9usdty4iTuMS2v_kiYnNNhNN8LmhQJPby3EnAO2rKZsJ1yVV7AmA>","X-ME-Received":"\n <xmr:xXXqaUcXipK7mk-kF36CDBRlp4A6e42HlvVpfQQvj4pRRBjRIXu4DUKvNGA>","X-ME-Proxy-Cause":"\n gggruggvucftvghtrhhoucdtuddrgeefhedrtddtgdeikedtvdcutefuodetggdotefrod\n    ftvfcurfhrohhfihhlvgemucfhrghsthforghilhdpuffrtefokffrpgfnqfghnecuuegr\n    ihhlohhuthemuceftddtnecusecvtfgvtghiphhivghnthhsucdlqddutddtmdenucfjug\n    hrpeffhffvvefukfgjfhfogggtgfesthejredtredtvdenucfhrhhomheptehlvgigucgh\n    ihhllhhirghmshhonhcuoegrlhgvgiesshhhrgiisghothdrohhrgheqnecuggftrfgrth\n    htvghrnhepkeehjeeitefffeeuieetjedtjeffvdelledvuedvffdvfeetgefhveekuedv\n    fedvnecuffhomhgrihhnpehkvghrnhgvlhdrohhrghenucevlhhushhtvghrufhiiigvpe\n    dtnecurfgrrhgrmhepmhgrihhlfhhrohhmpegrlhgvgiesshhhrgiisghothdrohhrghdp\n    nhgspghrtghpthhtohepledpmhhouggvpehsmhhtphhouhhtpdhrtghpthhtohepmhgrth\n    htvghvsehmvghtrgdrtghomhdprhgtphhtthhopegshhgvlhhgrggrshesghhoohhglhgv\n    rdgtohhmpdhrtghpthhtoheplhhoghgrnhhgseguvghlthgrthgvvgdrtghomhdprhgtph\n    htthhopegrnhhkihhtrgesnhhvihguihgrrdgtohhmpdhrtghpthhtoheplhgvohhnsehk\n    vghrnhgvlhdrohhrghdprhgtphhtthhopehstghhnhgvlhhlvgeslhhinhhugidrihgsmh\n    drtghomhdprhgtphhtthhopehlihhnuhigqdhptghisehvghgvrhdrkhgvrhhnvghlrdho\n    rhhgpdhrtghpthhtoheplhhinhhugidqkhgvrhhnvghlsehvghgvrhdrkhgvrhhnvghlrd\n    horhhgpdhrtghpthhtoheprghlvgigsehshhgriigsohhtrdhorhhg","X-ME-Proxy":"<xmx:xXXqaSya9fSwqrh-kHVS8u6HIlFlJY93bJ6sdEwGnusUPqMSQShrJw>\n    <xmx:xXXqaZ9lTLHnpcF0ey3EI6jsG11W-5Ym1q-ME6JZc0tYQdLE67v5wg>\n    <xmx:xXXqaQwg3eE6kC0JHAPWp00G-LVsHyov87zJQAxNlo9XxBlVO0eVIw>\n    <xmx:xXXqaRpFHyW_cIIVSQ8YpKZLOBuF0WkNWgjxUkybYCNHUOVbuN4mNA>\n    <xmx:xnXqaQjWGeyZAycgGqfhdRsm5W14wge_nUifTWWjz07oXGcoHQbq5vrs>","Feedback-ID":"i03f14258:Fastmail","Date":"Thu, 23 Apr 2026 13:40:52 -0600","From":"Alex Williamson <alex@shazbot.org>","To":"Matt Evans <mattev@meta.com>","Cc":"Bjorn Helgaas <bhelgaas@google.com>, Logan Gunthorpe\n <logang@deltatee.com>, Ankit Agrawal <ankita@nvidia.com>, Leon Romanovsky\n <leon@kernel.org>, Niklas Schnelle <schnelle@linux.ibm.com>,\n <linux-pci@vger.kernel.org>, <linux-kernel@vger.kernel.org>,\n alex@shazbot.org","Subject":"Re: [PATCH v2] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Message-ID":"<20260423134052.292e92cf@shazbot.org>","In-Reply-To":"<20260423173051.1999679-1-mattev@meta.com>","References":"<20260423173051.1999679-1-mattev@meta.com>","X-Mailer":"Claws Mail 4.3.1 (GTK 3.24.51; x86_64-pc-linux-gnu)","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=US-ASCII","Content-Transfer-Encoding":"7bit"}},{"id":3682094,"web_url":"http://patchwork.ozlabs.org/comment/3682094/","msgid":"<20260424160823.GA11106@bhelgaas>","list_archive_url":null,"date":"2026-04-24T16:08:23","subject":"Re: [PATCH v2] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","submitter":{"id":67298,"url":"http://patchwork.ozlabs.org/api/people/67298/","name":"Bjorn Helgaas","email":"helgaas@kernel.org"},"content":"On Thu, Apr 23, 2026 at 10:30:51AM -0700, Matt Evans wrote:\n> Extend the checks in pcim_p2pdma_init() and pcim_p2pdma_provider() to\n> exclude functions that have pdev->non_mappable_bars set.\n> \n> Consumers such as VFIO were previously able to map these for access by\n> the CPU or P2P.  Update the comment on non_mappable_bars to show it\n> refers to any access, not just userspace CPU access.\n> \n> Fixes: 372d6d1b8ae3c (\"PCI/P2PDMA: Refactor to separate core P2P functionality from memory allocation\")\n> Signed-off-by: Matt Evans <mattev@meta.com>\n\nApplied to pci/p2pdma for v7.2, thanks!  Will be rebased after\nv7.1-rc1.\n\n> ---\n> \n> This arises from Alex Williamson's suggestion to test\n> non_mappable_bars when getting the provider, with discussion here:\n> \n>  https://lore.kernel.org/kvm/20260415181623.1021090-1-mattev@meta.com/\n> \n> The goal was to prevent a hole where VFIO could export DMABUFs for\n> BARs marked non-mappable, and to fix for all users of the provider\n> rather than just VFIO.  Alex observed that non_mappable_bars should be\n> taken to mean BARs weren't usable by the CPU _or_ peers and,\n> considering that, its comment about userspace access wasn't quite\n> right.\n> \n> == Changes ==\n> \n> v2:\n>  - Also test non_mappable_bars in pcim_p2pdma_init(), as\n>    otherwise pci_p2pdma_add_resource() will WARN_ON\n>    pcim_p2pdma_provider() failing.\n> \n> Niklas and Logan, I didn't re-add your R-B from v1 as (splitting\n> hairs...) the code's changed.\n> \n> v1:\n>  https://lore.kernel.org/linux-pci/20260421174351.3897842-1-mattev@meta.com/\n> \n> \n>  drivers/pci/p2pdma.c | 6 +++++-\n>  include/linux/pci.h  | 2 +-\n>  2 files changed, 6 insertions(+), 2 deletions(-)\n> \n> diff --git a/drivers/pci/p2pdma.c b/drivers/pci/p2pdma.c\n> index 7c898542af8d..adb17a4f6939 100644\n> --- a/drivers/pci/p2pdma.c\n> +++ b/drivers/pci/p2pdma.c\n> @@ -262,6 +262,9 @@ int pcim_p2pdma_init(struct pci_dev *pdev)\n>  \tstruct pci_p2pdma *p2p;\n>  \tint i, ret;\n>  \n> +\tif (pdev->non_mappable_bars)\n> +\t\treturn -EOPNOTSUPP;\n> +\n>  \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n>  \tif (p2p)\n>  \t\treturn 0;\n> @@ -318,7 +321,8 @@ struct p2pdma_provider *pcim_p2pdma_provider(struct pci_dev *pdev, int bar)\n>  {\n>  \tstruct pci_p2pdma *p2p;\n>  \n> -\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM))\n> +\tif (!(pci_resource_flags(pdev, bar) & IORESOURCE_MEM) ||\n> +\t    pdev->non_mappable_bars)\n>  \t\treturn NULL;\n>  \n>  \tp2p = rcu_dereference_protected(pdev->p2pdma, 1);\n> diff --git a/include/linux/pci.h b/include/linux/pci.h\n> index 2c4454583c11..1e6802017d6b 100644\n> --- a/include/linux/pci.h\n> +++ b/include/linux/pci.h\n> @@ -508,7 +508,7 @@ struct pci_dev {\n>  \tunsigned int\tno_command_memory:1;\t/* No PCI_COMMAND_MEMORY */\n>  \tunsigned int\trom_bar_overlap:1;\t/* ROM BAR disable broken */\n>  \tunsigned int\trom_attr_enabled:1;\t/* Display of ROM attribute enabled? */\n> -\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped to user-space  */\n> +\tunsigned int\tnon_mappable_bars:1;\t/* BARs can't be mapped by CPU or peers */\n>  \tpci_dev_flags_t dev_flags;\n>  \tatomic_t\tenable_cnt;\t/* pci_enable_device has been called */\n>  \n> -- \n> 2.47.3\n>","headers":{"Return-Path":"\n <linux-pci+bounces-53147-incoming=patchwork.ozlabs.org@vger.kernel.org>","X-Original-To":["incoming@patchwork.ozlabs.org","linux-pci@vger.kernel.org"],"Delivered-To":"patchwork-incoming@legolas.ozlabs.org","Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=kernel.org header.i=@kernel.org header.a=rsa-sha256\n header.s=k20201202 header.b=hCvGPHa5;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=vger.kernel.org\n (client-ip=172.234.253.10; helo=sea.lore.kernel.org;\n envelope-from=linux-pci+bounces-53147-incoming=patchwork.ozlabs.org@vger.kernel.org;\n receiver=patchwork.ozlabs.org)","smtp.subspace.kernel.org;\n\tdkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=\"hCvGPHa5\"","smtp.subspace.kernel.org;\n arc=none smtp.client-ip=10.30.226.201"],"Received":["from sea.lore.kernel.org (sea.lore.kernel.org [172.234.253.10])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4g2Hw72kWFz1yD5\n\tfor <incoming@patchwork.ozlabs.org>; Sat, 25 Apr 2026 02:09:27 +1000 (AEST)","from smtp.subspace.kernel.org (conduit.subspace.kernel.org\n [100.90.174.1])\n\tby sea.lore.kernel.org (Postfix) with ESMTP id 8547830097F1\n\tfor <incoming@patchwork.ozlabs.org>; Fri, 24 Apr 2026 16:08:25 +0000 (UTC)","from localhost.localdomain (localhost.localdomain [127.0.0.1])\n\tby smtp.subspace.kernel.org (Postfix) with ESMTP id D9A803DC4BD;\n\tFri, 24 Apr 2026 16:08:24 +0000 (UTC)","from smtp.kernel.org (aws-us-west-2-korg-mail-1.web.codeaurora.org\n [10.30.226.201])\n\t(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits))\n\t(No client certificate requested)\n\tby smtp.subspace.kernel.org (Postfix) with ESMTPS id B72F53DBD57;\n\tFri, 24 Apr 2026 16:08:24 +0000 (UTC)","by smtp.kernel.org (Postfix) with ESMTPSA id 42CA8C19425;\n\tFri, 24 Apr 2026 16:08:24 +0000 (UTC)"],"ARC-Seal":"i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116;\n\tt=1777046904; cv=none;\n b=noNIvHZPiX0GCG38FPJqRrYeyNFEo5ykyzGuJJZ1OondCFTkGp0cPeGMAVGpU8+VmtNWRLj9WaxAFhNT41KN17DO3s8qpMjquH++aYFnOQzwu6QdHugdP1Dj5xa+eFHmQu7EgBu/3VtI1m/63suxb0xNIRheEouhj0nAe46rpfU=","ARC-Message-Signature":"i=1; a=rsa-sha256; d=subspace.kernel.org;\n\ts=arc-20240116; t=1777046904; c=relaxed/simple;\n\tbh=hGC9jnHTZV5EtsFQpRo2fI3KRRoZIvzL+Z9bPIl/ziI=;\n\th=Date:From:To:Cc:Subject:Message-ID:MIME-Version:Content-Type:\n\t Content-Disposition:In-Reply-To;\n b=TboDOU4cjv/WYgudDczIdaL+hLBtehj2ByZIIP7xBGt7bAD0iJO/QjreYpFXeMgssMjP/NGhI2gmJBmZU5/Ld8tvWXqMeD/yeHzMmIvljyKhx9U411lXSPXnXAyxsJiUp5Roo7oZrPCbWM1iSeYeLuKBpxOJjUjEGciFF5gWPQE=","ARC-Authentication-Results":"i=1; smtp.subspace.kernel.org;\n dkim=pass (2048-bit key) header.d=kernel.org header.i=@kernel.org\n header.b=hCvGPHa5; arc=none smtp.client-ip=10.30.226.201","DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org;\n\ts=k20201202; t=1777046904;\n\tbh=hGC9jnHTZV5EtsFQpRo2fI3KRRoZIvzL+Z9bPIl/ziI=;\n\th=Date:From:To:Cc:Subject:In-Reply-To:From;\n\tb=hCvGPHa5RcLZR9Zd3hpo0lZutgG3asKWUUJvamKu41u/Fjo4LbsrmW7UoHwRiDHu+\n\t hzFxLRZmfgyPkd83sux0ZbVwlh4LCIsrOb03UzLJ53B4xvrtD3svOB9RUh0z8aYLdY\n\t hx5OC0/J6ZsF9xhIA7vOoTENcGmtyU6t3UtMeB6s/9RnYLhRgmL6Wu9YNZZsmc6Dsw\n\t of2PZtPnjCO6c5cCbASofpSZlR2kQ5OXOV/tIaMoBz0qiHISJnssAWACJ228pNvHl1\n\t K+ZPYNQiHETg7GHsz6vlHilobXpQmTvzcaoH78HfFJ3qcOwqla9HCDoVljUXKS9QPg\n\t psseq8vPM7IYw==","Date":"Fri, 24 Apr 2026 11:08:23 -0500","From":"Bjorn Helgaas <helgaas@kernel.org>","To":"Matt Evans <mattev@meta.com>","Cc":"Bjorn Helgaas <bhelgaas@google.com>,\n\tLogan Gunthorpe <logang@deltatee.com>,\n\tAnkit Agrawal <ankita@nvidia.com>,\n\tLeon Romanovsky <leon@kernel.org>,\n\tAlex Williamson <alex@shazbot.org>,\n\tNiklas Schnelle <schnelle@linux.ibm.com>, linux-pci@vger.kernel.org,\n\tlinux-kernel@vger.kernel.org","Subject":"Re: [PATCH v2] PCI/P2PDMA: Avoid returning a provider for\n non_mappable_bars","Message-ID":"<20260424160823.GA11106@bhelgaas>","Precedence":"bulk","X-Mailing-List":"linux-pci@vger.kernel.org","List-Id":"<linux-pci.vger.kernel.org>","List-Subscribe":"<mailto:linux-pci+subscribe@vger.kernel.org>","List-Unsubscribe":"<mailto:linux-pci+unsubscribe@vger.kernel.org>","MIME-Version":"1.0","Content-Type":"text/plain; charset=us-ascii","Content-Disposition":"inline","In-Reply-To":"<20260423173051.1999679-1-mattev@meta.com>"}}]