From: Alex Williamson <alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> To: "Liu, Yi L" <yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> Cc: tianyu.lan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org, "Liu, Yi L" <yi.l.liu-VuQAYsv1563Yd54FQh9/CA@public.gmane.org>, kevin.tian-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org, kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, jasowang-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org, qemu-devel-qX2TKyscuCcdnm+yROfE0A@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org, jacob.jun.pan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org Subject: Re: [RFC PATCH 1/8] iommu: Introduce bind_pasid_table API function Date: Fri, 12 May 2017 15:59:14 -0600 [thread overview] Message-ID: <20170512155914.73bad777@t450s.home> (raw) In-Reply-To: <1493201525-14418-2-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> On Wed, 26 Apr 2017 18:11:58 +0800 "Liu, Yi L" <yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote: > From: Jacob Pan <jacob.jun.pan-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > > Virtual IOMMU was proposed to support Shared Virtual Memory (SVM) use > case in the guest: > https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05311.html > > As part of the proposed architecture, when a SVM capable PCI > device is assigned to a guest, nested mode is turned on. Guest owns the > first level page tables (request with PASID) and performs GVA->GPA > translation. Second level page tables are owned by the host for GPA->HPA > translation for both request with and without PASID. > > A new IOMMU driver interface is therefore needed to perform tasks as > follows: > * Enable nested translation and appropriate translation type > * Assign guest PASID table pointer (in GPA) and size to host IOMMU > > This patch introduces new functions called iommu_(un)bind_pasid_table() > to IOMMU APIs. Architecture specific IOMMU function can be added later > to perform the specific steps for binding pasid table of assigned devices. > > This patch also adds model definition in iommu.h. It would be used to > check if the bind request is from a compatible entity. e.g. a bind > request from an intel_iommu emulator may not be supported by an ARM SMMU > driver. > > Signed-off-by: Jacob Pan <jacob.jun.pan-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > Signed-off-by: Liu, Yi L <yi.l.liu-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > --- > drivers/iommu/iommu.c | 19 +++++++++++++++++++ > include/linux/iommu.h | 31 +++++++++++++++++++++++++++++++ > 2 files changed, 50 insertions(+) > > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index dbe7f65..f2da636 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -1134,6 +1134,25 @@ int iommu_attach_device(struct iommu_domain *domain, struct device *dev) > } > EXPORT_SYMBOL_GPL(iommu_attach_device); > > +int iommu_bind_pasid_table(struct iommu_domain *domain, struct device *dev, > + struct pasid_table_info *pasidt_binfo) > +{ > + if (unlikely(!domain->ops->bind_pasid_table)) > + return -EINVAL; > + > + return domain->ops->bind_pasid_table(domain, dev, pasidt_binfo); > +} > +EXPORT_SYMBOL_GPL(iommu_bind_pasid_table); > + > +int iommu_unbind_pasid_table(struct iommu_domain *domain, struct device *dev) > +{ > + if (unlikely(!domain->ops->unbind_pasid_table)) > + return -EINVAL; > + > + return domain->ops->unbind_pasid_table(domain, dev); > +} > +EXPORT_SYMBOL_GPL(iommu_unbind_pasid_table); > + > static void __iommu_detach_device(struct iommu_domain *domain, > struct device *dev) > { > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > index 0ff5111..491a011 100644 > --- a/include/linux/iommu.h > +++ b/include/linux/iommu.h > @@ -131,6 +131,15 @@ struct iommu_dm_region { > int prot; > }; > > +struct pasid_table_info { > + __u64 ptr; /* PASID table ptr */ > + __u64 size; /* PASID table size*/ > + __u32 model; /* magic number */ > +#define INTEL_IOMMU (1 << 0) > +#define ARM_SMMU (1 << 1) > + __u8 opaque[];/* IOMMU-specific details */ > +}; This needs to be in uapi since you're expecting a user to pass it > + > #ifdef CONFIG_IOMMU_API > > /** > @@ -159,6 +168,8 @@ struct iommu_dm_region { > * @domain_get_windows: Return the number of windows for a domain > * @of_xlate: add OF master IDs to iommu grouping > * @pgsize_bitmap: bitmap of all possible supported page sizes > + * @bind_pasid_table: bind pasid table pointer for guest SVM > + * @unbind_pasid_table: unbind pasid table pointer and restore defaults > */ > struct iommu_ops { > bool (*capable)(enum iommu_cap); > @@ -200,6 +211,10 @@ struct iommu_ops { > u32 (*domain_get_windows)(struct iommu_domain *domain); > > int (*of_xlate)(struct device *dev, struct of_phandle_args *args); > + int (*bind_pasid_table)(struct iommu_domain *domain, struct device *dev, > + struct pasid_table_info *pasidt_binfo); > + int (*unbind_pasid_table)(struct iommu_domain *domain, > + struct device *dev); > > unsigned long pgsize_bitmap; > }; > @@ -221,6 +236,10 @@ extern int iommu_attach_device(struct iommu_domain *domain, > struct device *dev); > extern void iommu_detach_device(struct iommu_domain *domain, > struct device *dev); > +extern int iommu_bind_pasid_table(struct iommu_domain *domain, > + struct device *dev, struct pasid_table_info *pasidt_binfo); > +extern int iommu_unbind_pasid_table(struct iommu_domain *domain, > + struct device *dev); > extern struct iommu_domain *iommu_get_domain_for_dev(struct device *dev); > extern int iommu_map(struct iommu_domain *domain, unsigned long iova, > phys_addr_t paddr, size_t size, int prot); > @@ -595,6 +614,18 @@ const struct iommu_ops *iommu_get_instance(struct fwnode_handle *fwnode) > return NULL; > } > > +static inline > +int iommu_bind_pasid_table(struct iommu_domain *domain, struct device *dev, > + struct pasid_table_info *pasidt_binfo) > +{ > + return -EINVAL; > +} > +static inline > +int iommu_unbind_pasid_table(struct iommu_domain *domain, struct device *dev) > +{ > + return -EINVAL; > +} > + > #endif /* CONFIG_IOMMU_API */ > > #endif /* __LINUX_IOMMU_H */
WARNING: multiple messages have this Message-ID (diff)
From: Alex Williamson <alex.williamson@redhat.com> To: "Liu, Yi L" <yi.l.liu@intel.com> Cc: kvm@vger.kernel.org, iommu@lists.linux-foundation.org, peterx@redhat.com, jasowang@redhat.com, qemu-devel@nongnu.org, kevin.tian@intel.com, ashok.raj@intel.com, jacob.jun.pan@intel.com, tianyu.lan@intel.com, jean-philippe.brucker@arm.com, Jacob Pan <jacob.jun.pan@linux.intel.com>, "Liu, Yi L" <yi.l.liu@linux.intel.com> Subject: Re: [Qemu-devel] [RFC PATCH 1/8] iommu: Introduce bind_pasid_table API function Date: Fri, 12 May 2017 15:59:14 -0600 [thread overview] Message-ID: <20170512155914.73bad777@t450s.home> (raw) In-Reply-To: <1493201525-14418-2-git-send-email-yi.l.liu@intel.com> On Wed, 26 Apr 2017 18:11:58 +0800 "Liu, Yi L" <yi.l.liu@intel.com> wrote: > From: Jacob Pan <jacob.jun.pan@linux.intel.com> > > Virtual IOMMU was proposed to support Shared Virtual Memory (SVM) use > case in the guest: > https://lists.gnu.org/archive/html/qemu-devel/2016-11/msg05311.html > > As part of the proposed architecture, when a SVM capable PCI > device is assigned to a guest, nested mode is turned on. Guest owns the > first level page tables (request with PASID) and performs GVA->GPA > translation. Second level page tables are owned by the host for GPA->HPA > translation for both request with and without PASID. > > A new IOMMU driver interface is therefore needed to perform tasks as > follows: > * Enable nested translation and appropriate translation type > * Assign guest PASID table pointer (in GPA) and size to host IOMMU > > This patch introduces new functions called iommu_(un)bind_pasid_table() > to IOMMU APIs. Architecture specific IOMMU function can be added later > to perform the specific steps for binding pasid table of assigned devices. > > This patch also adds model definition in iommu.h. It would be used to > check if the bind request is from a compatible entity. e.g. a bind > request from an intel_iommu emulator may not be supported by an ARM SMMU > driver. > > Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> > Signed-off-by: Liu, Yi L <yi.l.liu@linux.intel.com> > --- > drivers/iommu/iommu.c | 19 +++++++++++++++++++ > include/linux/iommu.h | 31 +++++++++++++++++++++++++++++++ > 2 files changed, 50 insertions(+) > > diff --git a/drivers/iommu/iommu.c b/drivers/iommu/iommu.c > index dbe7f65..f2da636 100644 > --- a/drivers/iommu/iommu.c > +++ b/drivers/iommu/iommu.c > @@ -1134,6 +1134,25 @@ int iommu_attach_device(struct iommu_domain *domain, struct device *dev) > } > EXPORT_SYMBOL_GPL(iommu_attach_device); > > +int iommu_bind_pasid_table(struct iommu_domain *domain, struct device *dev, > + struct pasid_table_info *pasidt_binfo) > +{ > + if (unlikely(!domain->ops->bind_pasid_table)) > + return -EINVAL; > + > + return domain->ops->bind_pasid_table(domain, dev, pasidt_binfo); > +} > +EXPORT_SYMBOL_GPL(iommu_bind_pasid_table); > + > +int iommu_unbind_pasid_table(struct iommu_domain *domain, struct device *dev) > +{ > + if (unlikely(!domain->ops->unbind_pasid_table)) > + return -EINVAL; > + > + return domain->ops->unbind_pasid_table(domain, dev); > +} > +EXPORT_SYMBOL_GPL(iommu_unbind_pasid_table); > + > static void __iommu_detach_device(struct iommu_domain *domain, > struct device *dev) > { > diff --git a/include/linux/iommu.h b/include/linux/iommu.h > index 0ff5111..491a011 100644 > --- a/include/linux/iommu.h > +++ b/include/linux/iommu.h > @@ -131,6 +131,15 @@ struct iommu_dm_region { > int prot; > }; > > +struct pasid_table_info { > + __u64 ptr; /* PASID table ptr */ > + __u64 size; /* PASID table size*/ > + __u32 model; /* magic number */ > +#define INTEL_IOMMU (1 << 0) > +#define ARM_SMMU (1 << 1) > + __u8 opaque[];/* IOMMU-specific details */ > +}; This needs to be in uapi since you're expecting a user to pass it > + > #ifdef CONFIG_IOMMU_API > > /** > @@ -159,6 +168,8 @@ struct iommu_dm_region { > * @domain_get_windows: Return the number of windows for a domain > * @of_xlate: add OF master IDs to iommu grouping > * @pgsize_bitmap: bitmap of all possible supported page sizes > + * @bind_pasid_table: bind pasid table pointer for guest SVM > + * @unbind_pasid_table: unbind pasid table pointer and restore defaults > */ > struct iommu_ops { > bool (*capable)(enum iommu_cap); > @@ -200,6 +211,10 @@ struct iommu_ops { > u32 (*domain_get_windows)(struct iommu_domain *domain); > > int (*of_xlate)(struct device *dev, struct of_phandle_args *args); > + int (*bind_pasid_table)(struct iommu_domain *domain, struct device *dev, > + struct pasid_table_info *pasidt_binfo); > + int (*unbind_pasid_table)(struct iommu_domain *domain, > + struct device *dev); > > unsigned long pgsize_bitmap; > }; > @@ -221,6 +236,10 @@ extern int iommu_attach_device(struct iommu_domain *domain, > struct device *dev); > extern void iommu_detach_device(struct iommu_domain *domain, > struct device *dev); > +extern int iommu_bind_pasid_table(struct iommu_domain *domain, > + struct device *dev, struct pasid_table_info *pasidt_binfo); > +extern int iommu_unbind_pasid_table(struct iommu_domain *domain, > + struct device *dev); > extern struct iommu_domain *iommu_get_domain_for_dev(struct device *dev); > extern int iommu_map(struct iommu_domain *domain, unsigned long iova, > phys_addr_t paddr, size_t size, int prot); > @@ -595,6 +614,18 @@ const struct iommu_ops *iommu_get_instance(struct fwnode_handle *fwnode) > return NULL; > } > > +static inline > +int iommu_bind_pasid_table(struct iommu_domain *domain, struct device *dev, > + struct pasid_table_info *pasidt_binfo) > +{ > + return -EINVAL; > +} > +static inline > +int iommu_unbind_pasid_table(struct iommu_domain *domain, struct device *dev) > +{ > + return -EINVAL; > +} > + > #endif /* CONFIG_IOMMU_API */ > > #endif /* __LINUX_IOMMU_H */
next prev parent reply other threads:[~2017-05-12 21:59 UTC|newest] Thread overview: 116+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-04-26 10:11 [RFC PATCH 0/8] Shared Virtual Memory virtualization for VT-d Liu, Yi L 2017-04-26 10:11 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:11 ` [RFC PATCH 1/8] iommu: Introduce bind_pasid_table API function Liu, Yi L 2017-04-26 10:11 ` [Qemu-devel] " Liu, Yi L 2017-04-26 16:56 ` Jean-Philippe Brucker 2017-04-26 16:56 ` [Qemu-devel] " Jean-Philippe Brucker 2017-04-27 6:36 ` Liu, Yi L 2017-04-27 6:36 ` [Qemu-devel] " Liu, Yi L 2017-04-27 10:12 ` Jean-Philippe Brucker 2017-04-27 10:12 ` [Qemu-devel] " Jean-Philippe Brucker [not found] ` <772ca9de-50ba-a379-002d-5ff1f6a2e297-5wv7dgnIgG8@public.gmane.org> 2017-04-28 7:59 ` Liu, Yi L 2017-04-28 7:59 ` Liu, Yi L [not found] ` <c042bf90-d48b-4ebf-c01a-fca7c4875277-5wv7dgnIgG8@public.gmane.org> 2017-04-26 18:29 ` jacob pan 2017-04-26 18:29 ` [Qemu-devel] " jacob pan [not found] ` <20170426112948.00004520-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-04-26 18:59 ` Jean-Philippe Brucker 2017-04-26 18:59 ` [Qemu-devel] " Jean-Philippe Brucker 2017-04-28 9:04 ` Liu, Yi L 2017-04-28 9:04 ` Liu, Yi L 2017-04-28 12:51 ` Jean-Philippe Brucker 2017-04-28 12:51 ` Jean-Philippe Brucker [not found] ` <3adb4e33-db96-4133-0510-412c3bfb24fe-5wv7dgnIgG8@public.gmane.org> 2017-05-23 7:50 ` Liu, Yi L 2017-05-23 7:50 ` Liu, Yi L 2017-05-25 12:33 ` Jean-Philippe Brucker 2017-05-25 12:33 ` Jean-Philippe Brucker [not found] ` <1493201525-14418-2-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson [this message] 2017-05-12 21:59 ` Alex Williamson [not found] ` <20170512155914.73bad777-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-14 10:56 ` Liu, Yi L 2017-05-14 10:56 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:11 ` [RFC PATCH 2/8] iommu/vt-d: add bind_pasid_table function Liu, Yi L 2017-04-26 10:11 ` [Qemu-devel] " Liu, Yi L [not found] ` <1493201525-14418-3-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155929.66809113-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-15 13:14 ` jacob pan 2017-05-15 13:14 ` [Qemu-devel] " jacob pan 2017-04-26 10:12 ` [RFC PATCH 3/8] iommu: Introduce iommu do invalidate API function Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L [not found] ` <1493201525-14418-4-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155924.755ee17f-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-17 10:23 ` Liu, Yi L 2017-05-17 10:23 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:12 ` [RFC PATCH 4/8] iommu/vt-d: Add iommu do invalidate function Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L [not found] ` <1493201525-14418-5-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155918.5251fb94-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-17 10:24 ` Liu, Yi L 2017-05-17 10:24 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:12 ` [RFC PATCH 5/8] VFIO: Add new IOTCL for PASID Table bind propagation Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-04-26 16:56 ` Jean-Philippe Brucker 2017-04-26 16:56 ` [Qemu-devel] " Jean-Philippe Brucker 2017-04-27 5:43 ` Liu, Yi L [not found] ` <1493201525-14418-6-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-11 10:29 ` Liu, Yi L 2017-05-11 10:29 ` Liu, Yi L 2017-05-12 21:58 ` Alex Williamson 2017-05-12 21:58 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155851.627409ed-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-17 10:27 ` Liu, Yi L 2017-05-17 10:27 ` Liu, Yi L [not found] ` <20170517102759.GF22110-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-05-18 11:29 ` Jean-Philippe Brucker 2017-05-18 11:29 ` Jean-Philippe Brucker 2017-04-26 10:12 ` [RFC PATCH 6/8] VFIO: do pasid table binding Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-09 7:55 ` Xiao Guangrong 2017-05-09 7:55 ` [Qemu-devel] " Xiao Guangrong 2017-05-11 10:29 ` Liu, Yi L 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson 2017-04-26 10:12 ` [RFC PATCH 7/8] VFIO: Add new IOCTL for IOMMU TLB invalidate propagation Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-12 12:11 ` Jean-Philippe Brucker 2017-05-12 12:11 ` [Qemu-devel] " Jean-Philippe Brucker [not found] ` <cc330a8f-e087-9b6f-2a40-38b58688d300-5wv7dgnIgG8@public.gmane.org> 2017-05-14 10:12 ` Liu, Yi L 2017-05-14 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-15 12:14 ` Jean-Philippe Brucker 2017-05-15 12:14 ` [Qemu-devel] " Jean-Philippe Brucker 2017-07-02 10:06 ` Liu, Yi L 2017-07-02 10:06 ` Liu, Yi L 2017-07-03 11:52 ` Jean-Philippe Brucker [not found] ` <0e4f2dd4-d553-b1b7-7bec-fe0ff5242c54-5wv7dgnIgG8@public.gmane.org> 2017-07-03 10:31 ` Liu, Yi L 2017-07-03 10:31 ` Liu, Yi L [not found] ` <20170703103115.GB22053-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-07-05 6:45 ` Tian, Kevin 2017-07-05 6:45 ` Tian, Kevin [not found] ` <AADFC41AFE54684AB9EE6CBC0274A5D190D25919-0J0gbvR4kThpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org> 2017-07-05 12:42 ` Jean-Philippe Brucker 2017-07-05 12:42 ` Jean-Philippe Brucker [not found] ` <1d63c1ae-ca10-0f9d-91de-0d9c9823c104-5wv7dgnIgG8@public.gmane.org> 2017-07-05 17:28 ` Alex Williamson 2017-07-05 17:28 ` Alex Williamson [not found] ` <20170705112816.56554f65-DGNDKt5SQtizQB+pC5nmwQ@public.gmane.org> 2017-07-05 22:26 ` Tian, Kevin 2017-07-05 22:26 ` Tian, Kevin 2017-07-14 8:58 ` Liu, Yi L 2017-07-14 8:58 ` Liu, Yi L [not found] ` <A2975661238FB949B60364EF0F2C2574390A7C4F-E2R4CRU6q/6iAffOGbnezLfspsVTdybXVpNB7YpNyf8@public.gmane.org> 2017-07-14 18:15 ` Alex Williamson 2017-07-14 18:15 ` Alex Williamson [not found] ` <20170714121555.7e64d849-DGNDKt5SQtizQB+pC5nmwQ@public.gmane.org> 2017-07-17 10:58 ` Liu, Yi L 2017-07-17 10:58 ` Liu, Yi L 2017-07-17 22:45 ` Alex Williamson [not found] ` <20170717164515.2491b3bf-DGNDKt5SQtizQB+pC5nmwQ@public.gmane.org> 2017-07-18 9:38 ` Jean-Philippe Brucker 2017-07-18 9:38 ` Jean-Philippe Brucker [not found] ` <d0abeefc-adcf-85c3-f5d9-8c90a18f8011-5wv7dgnIgG8@public.gmane.org> 2017-07-18 14:29 ` Alex Williamson 2017-07-18 14:29 ` Alex Williamson 2017-07-18 15:03 ` Jean-Philippe Brucker 2017-07-19 10:45 ` Liu, Yi L 2017-07-19 10:45 ` Liu, Yi L 2017-07-19 21:50 ` Jacob Pan 2017-07-19 21:50 ` Jacob Pan 2017-07-05 22:31 ` Tian, Kevin 2017-07-05 22:31 ` Tian, Kevin 2017-05-12 21:58 ` Alex Williamson 2017-05-12 21:58 ` [Qemu-devel] " Alex Williamson 2017-05-14 10:55 ` Liu, Yi L 2017-05-14 10:55 ` [Qemu-devel] " Liu, Yi L [not found] ` <20170514105507.GB22110-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-07-05 5:32 ` Tian, Kevin 2017-07-05 5:32 ` [Qemu-devel] " Tian, Kevin 2017-04-26 10:12 ` [RFC PATCH 8/8] VFIO: do IOMMU TLB invalidation from guest Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-08 4:09 ` [RFC PATCH 0/8] Shared Virtual Memory virtualization for VT-d Xiao Guangrong 2017-05-08 4:09 ` [Qemu-devel] " Xiao Guangrong 2017-05-07 7:33 ` Liu, Yi L
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20170512155914.73bad777@t450s.home \ --to=alex.williamson-h+wxahxf7alqt0dzr+alfa@public.gmane.org \ --cc=iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \ --cc=jacob.jun.pan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ --cc=jasowang-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \ --cc=kevin.tian-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ --cc=kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \ --cc=qemu-devel-qX2TKyscuCcdnm+yROfE0A@public.gmane.org \ --cc=tianyu.lan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ --cc=yi.l.liu-VuQAYsv1563Yd54FQh9/CA@public.gmane.org \ --cc=yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.