From: "Liu, Yi L" <yi.l.liu-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> To: Alex Williamson <alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> Cc: tianyu.lan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org, kevin.tian-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org, kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org, jasowang-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org, qemu-devel-qX2TKyscuCcdnm+yROfE0A@public.gmane.org, iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org, jacob.jun.pan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org Subject: Re: [RFC PATCH 4/8] iommu/vt-d: Add iommu do invalidate function Date: Wed, 17 May 2017 18:24:39 +0800 [thread overview] Message-ID: <20170517102439.GE22110@gmail.com> (raw) In-Reply-To: <20170512155918.5251fb94-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> On Fri, May 12, 2017 at 03:59:18PM -0600, Alex Williamson wrote: > On Wed, 26 Apr 2017 18:12:01 +0800 > "Liu, Yi L" <yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> wrote: > > > From: Jacob Pan <jacob.jun.pan-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > > > > This patch adds Intel VT-d specific function to implement > > iommu_do_invalidate API. > > > > The use case is for supporting caching structure invalidation > > of assigned SVM capable devices. Emulated IOMMU exposes queue > > invalidation capability and passes down all descriptors from the guest > > to the physical IOMMU. > > > > The assumption is that guest to host device ID mapping should be > > resolved prior to calling IOMMU driver. Based on the device handle, > > host IOMMU driver can replace certain fields before submit to the > > invalidation queue. > > > > Signed-off-by: Liu, Yi L <yi.l.liu-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > > Signed-off-by: Jacob Pan <jacob.jun.pan-VuQAYsv1563Yd54FQh9/CA@public.gmane.org> > > --- > > drivers/iommu/intel-iommu.c | 43 +++++++++++++++++++++++++++++++++++++++++++ > > include/linux/intel-iommu.h | 11 +++++++++++ > > 2 files changed, 54 insertions(+) > > > > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c > > index 6d5b939..0b098ad 100644 > > --- a/drivers/iommu/intel-iommu.c > > +++ b/drivers/iommu/intel-iommu.c > > @@ -5042,6 +5042,48 @@ static void intel_iommu_detach_device(struct iommu_domain *domain, > > dmar_remove_one_dev_info(to_dmar_domain(domain), dev); > > } > > > > +static int intel_iommu_do_invalidate(struct iommu_domain *domain, > > + struct device *dev, struct tlb_invalidate_info *inv_info) > > +{ > > + int ret = 0; > > + struct intel_iommu *iommu; > > + struct dmar_domain *dmar_domain = to_dmar_domain(domain); > > + struct intel_invalidate_data *inv_data; > > + struct qi_desc *qi; > > + u16 did; > > + u8 bus, devfn; > > + > > + if (!inv_info || !dmar_domain || (inv_info->model != INTEL_IOMMU)) > > + return -EINVAL; > > + > > + iommu = device_to_iommu(dev, &bus, &devfn); > > + if (!iommu) > > + return -ENODEV; > > + > > + inv_data = (struct intel_invalidate_data *)&inv_info->opaque; > > + > > + /* check SID */ > > + if (PCI_DEVID(bus, devfn) != inv_data->sid) > > + return 0; > > + > > + qi = &inv_data->inv_desc; > > + > > + switch (qi->low & QI_TYPE_MASK) { > > + case QI_DIOTLB_TYPE: > > + case QI_DEIOTLB_TYPE: > > + /* for device IOTLB, we just let it pass through */ > > + break; > > + default: > > + did = dmar_domain->iommu_did[iommu->seq_id]; > > + set_mask_bits(&qi->low, QI_DID_MASK, QI_DID(did)); > > + break; > > + } > > + > > + ret = qi_submit_sync(qi, iommu); > > + > > + return ret; > > nit, ret variable is unnecessary. yes, would remove it. > > +} > > + > > static int intel_iommu_map(struct iommu_domain *domain, > > unsigned long iova, phys_addr_t hpa, > > size_t size, int iommu_prot) > > @@ -5416,6 +5458,7 @@ static int intel_iommu_unbind_pasid_table(struct iommu_domain *domain, > > #ifdef CONFIG_INTEL_IOMMU_SVM > > .bind_pasid_table = intel_iommu_bind_pasid_table, > > .unbind_pasid_table = intel_iommu_unbind_pasid_table, > > + .do_invalidate = intel_iommu_do_invalidate, > > #endif > > .map = intel_iommu_map, > > .unmap = intel_iommu_unmap, > > diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h > > index ac04f28..9d6562c 100644 > > --- a/include/linux/intel-iommu.h > > +++ b/include/linux/intel-iommu.h > > @@ -29,6 +29,7 @@ > > #include <linux/dma_remapping.h> > > #include <linux/mmu_notifier.h> > > #include <linux/list.h> > > +#include <linux/bitops.h> > > #include <asm/cacheflush.h> > > #include <asm/iommu.h> > > > > @@ -271,6 +272,10 @@ enum { > > #define QI_PGRP_RESP_TYPE 0x9 > > #define QI_PSTRM_RESP_TYPE 0xa > > > > +#define QI_DID(did) (((u64)did & 0xffff) << 16) > > +#define QI_DID_MASK GENMASK(31, 16) > > +#define QI_TYPE_MASK GENMASK(3, 0) > > + > > #define QI_IEC_SELECTIVE (((u64)1) << 4) > > #define QI_IEC_IIDEX(idx) (((u64)(idx & 0xffff) << 32)) > > #define QI_IEC_IM(m) (((u64)(m & 0x1f) << 27)) > > @@ -529,6 +534,12 @@ struct intel_svm { > > extern struct intel_iommu *intel_svm_device_to_iommu(struct device *dev); > > #endif > > > > +struct intel_invalidate_data { > > + u16 sid; > > + u32 pasid; > > + struct qi_desc inv_desc; > > +}; > > This needs to be uapi since the vfio user is expected to create it, so > we need a uapi version of qi_desc too. > yes, would do it. Thx, Yi L > > + > > extern const struct attribute_group *intel_iommu_groups[]; > > extern void intel_iommu_debugfs_init(void); > > extern struct context_entry *iommu_context_addr(struct intel_iommu *iommu, >
WARNING: multiple messages have this Message-ID (diff)
From: "Liu, Yi L" <yi.l.liu@linux.intel.com> To: Alex Williamson <alex.williamson@redhat.com> Cc: "Liu, Yi L" <yi.l.liu@intel.com>, kvm@vger.kernel.org, iommu@lists.linux-foundation.org, peterx@redhat.com, jasowang@redhat.com, qemu-devel@nongnu.org, kevin.tian@intel.com, ashok.raj@intel.com, jacob.jun.pan@intel.com, tianyu.lan@intel.com, jean-philippe.brucker@arm.com, Jacob Pan <jacob.jun.pan@linux.intel.com> Subject: Re: [Qemu-devel] [RFC PATCH 4/8] iommu/vt-d: Add iommu do invalidate function Date: Wed, 17 May 2017 18:24:39 +0800 [thread overview] Message-ID: <20170517102439.GE22110@gmail.com> (raw) In-Reply-To: <20170512155918.5251fb94@t450s.home> On Fri, May 12, 2017 at 03:59:18PM -0600, Alex Williamson wrote: > On Wed, 26 Apr 2017 18:12:01 +0800 > "Liu, Yi L" <yi.l.liu@intel.com> wrote: > > > From: Jacob Pan <jacob.jun.pan@linux.intel.com> > > > > This patch adds Intel VT-d specific function to implement > > iommu_do_invalidate API. > > > > The use case is for supporting caching structure invalidation > > of assigned SVM capable devices. Emulated IOMMU exposes queue > > invalidation capability and passes down all descriptors from the guest > > to the physical IOMMU. > > > > The assumption is that guest to host device ID mapping should be > > resolved prior to calling IOMMU driver. Based on the device handle, > > host IOMMU driver can replace certain fields before submit to the > > invalidation queue. > > > > Signed-off-by: Liu, Yi L <yi.l.liu@linux.intel.com> > > Signed-off-by: Jacob Pan <jacob.jun.pan@linux.intel.com> > > --- > > drivers/iommu/intel-iommu.c | 43 +++++++++++++++++++++++++++++++++++++++++++ > > include/linux/intel-iommu.h | 11 +++++++++++ > > 2 files changed, 54 insertions(+) > > > > diff --git a/drivers/iommu/intel-iommu.c b/drivers/iommu/intel-iommu.c > > index 6d5b939..0b098ad 100644 > > --- a/drivers/iommu/intel-iommu.c > > +++ b/drivers/iommu/intel-iommu.c > > @@ -5042,6 +5042,48 @@ static void intel_iommu_detach_device(struct iommu_domain *domain, > > dmar_remove_one_dev_info(to_dmar_domain(domain), dev); > > } > > > > +static int intel_iommu_do_invalidate(struct iommu_domain *domain, > > + struct device *dev, struct tlb_invalidate_info *inv_info) > > +{ > > + int ret = 0; > > + struct intel_iommu *iommu; > > + struct dmar_domain *dmar_domain = to_dmar_domain(domain); > > + struct intel_invalidate_data *inv_data; > > + struct qi_desc *qi; > > + u16 did; > > + u8 bus, devfn; > > + > > + if (!inv_info || !dmar_domain || (inv_info->model != INTEL_IOMMU)) > > + return -EINVAL; > > + > > + iommu = device_to_iommu(dev, &bus, &devfn); > > + if (!iommu) > > + return -ENODEV; > > + > > + inv_data = (struct intel_invalidate_data *)&inv_info->opaque; > > + > > + /* check SID */ > > + if (PCI_DEVID(bus, devfn) != inv_data->sid) > > + return 0; > > + > > + qi = &inv_data->inv_desc; > > + > > + switch (qi->low & QI_TYPE_MASK) { > > + case QI_DIOTLB_TYPE: > > + case QI_DEIOTLB_TYPE: > > + /* for device IOTLB, we just let it pass through */ > > + break; > > + default: > > + did = dmar_domain->iommu_did[iommu->seq_id]; > > + set_mask_bits(&qi->low, QI_DID_MASK, QI_DID(did)); > > + break; > > + } > > + > > + ret = qi_submit_sync(qi, iommu); > > + > > + return ret; > > nit, ret variable is unnecessary. yes, would remove it. > > +} > > + > > static int intel_iommu_map(struct iommu_domain *domain, > > unsigned long iova, phys_addr_t hpa, > > size_t size, int iommu_prot) > > @@ -5416,6 +5458,7 @@ static int intel_iommu_unbind_pasid_table(struct iommu_domain *domain, > > #ifdef CONFIG_INTEL_IOMMU_SVM > > .bind_pasid_table = intel_iommu_bind_pasid_table, > > .unbind_pasid_table = intel_iommu_unbind_pasid_table, > > + .do_invalidate = intel_iommu_do_invalidate, > > #endif > > .map = intel_iommu_map, > > .unmap = intel_iommu_unmap, > > diff --git a/include/linux/intel-iommu.h b/include/linux/intel-iommu.h > > index ac04f28..9d6562c 100644 > > --- a/include/linux/intel-iommu.h > > +++ b/include/linux/intel-iommu.h > > @@ -29,6 +29,7 @@ > > #include <linux/dma_remapping.h> > > #include <linux/mmu_notifier.h> > > #include <linux/list.h> > > +#include <linux/bitops.h> > > #include <asm/cacheflush.h> > > #include <asm/iommu.h> > > > > @@ -271,6 +272,10 @@ enum { > > #define QI_PGRP_RESP_TYPE 0x9 > > #define QI_PSTRM_RESP_TYPE 0xa > > > > +#define QI_DID(did) (((u64)did & 0xffff) << 16) > > +#define QI_DID_MASK GENMASK(31, 16) > > +#define QI_TYPE_MASK GENMASK(3, 0) > > + > > #define QI_IEC_SELECTIVE (((u64)1) << 4) > > #define QI_IEC_IIDEX(idx) (((u64)(idx & 0xffff) << 32)) > > #define QI_IEC_IM(m) (((u64)(m & 0x1f) << 27)) > > @@ -529,6 +534,12 @@ struct intel_svm { > > extern struct intel_iommu *intel_svm_device_to_iommu(struct device *dev); > > #endif > > > > +struct intel_invalidate_data { > > + u16 sid; > > + u32 pasid; > > + struct qi_desc inv_desc; > > +}; > > This needs to be uapi since the vfio user is expected to create it, so > we need a uapi version of qi_desc too. > yes, would do it. Thx, Yi L > > + > > extern const struct attribute_group *intel_iommu_groups[]; > > extern void intel_iommu_debugfs_init(void); > > extern struct context_entry *iommu_context_addr(struct intel_iommu *iommu, >
next prev parent reply other threads:[~2017-05-17 10:24 UTC|newest] Thread overview: 116+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-04-26 10:11 [RFC PATCH 0/8] Shared Virtual Memory virtualization for VT-d Liu, Yi L 2017-04-26 10:11 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:11 ` [RFC PATCH 1/8] iommu: Introduce bind_pasid_table API function Liu, Yi L 2017-04-26 10:11 ` [Qemu-devel] " Liu, Yi L 2017-04-26 16:56 ` Jean-Philippe Brucker 2017-04-26 16:56 ` [Qemu-devel] " Jean-Philippe Brucker 2017-04-27 6:36 ` Liu, Yi L 2017-04-27 6:36 ` [Qemu-devel] " Liu, Yi L 2017-04-27 10:12 ` Jean-Philippe Brucker 2017-04-27 10:12 ` [Qemu-devel] " Jean-Philippe Brucker [not found] ` <772ca9de-50ba-a379-002d-5ff1f6a2e297-5wv7dgnIgG8@public.gmane.org> 2017-04-28 7:59 ` Liu, Yi L 2017-04-28 7:59 ` Liu, Yi L [not found] ` <c042bf90-d48b-4ebf-c01a-fca7c4875277-5wv7dgnIgG8@public.gmane.org> 2017-04-26 18:29 ` jacob pan 2017-04-26 18:29 ` [Qemu-devel] " jacob pan [not found] ` <20170426112948.00004520-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-04-26 18:59 ` Jean-Philippe Brucker 2017-04-26 18:59 ` [Qemu-devel] " Jean-Philippe Brucker 2017-04-28 9:04 ` Liu, Yi L 2017-04-28 9:04 ` Liu, Yi L 2017-04-28 12:51 ` Jean-Philippe Brucker 2017-04-28 12:51 ` Jean-Philippe Brucker [not found] ` <3adb4e33-db96-4133-0510-412c3bfb24fe-5wv7dgnIgG8@public.gmane.org> 2017-05-23 7:50 ` Liu, Yi L 2017-05-23 7:50 ` Liu, Yi L 2017-05-25 12:33 ` Jean-Philippe Brucker 2017-05-25 12:33 ` Jean-Philippe Brucker [not found] ` <1493201525-14418-2-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155914.73bad777-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-14 10:56 ` Liu, Yi L 2017-05-14 10:56 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:11 ` [RFC PATCH 2/8] iommu/vt-d: add bind_pasid_table function Liu, Yi L 2017-04-26 10:11 ` [Qemu-devel] " Liu, Yi L [not found] ` <1493201525-14418-3-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155929.66809113-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-15 13:14 ` jacob pan 2017-05-15 13:14 ` [Qemu-devel] " jacob pan 2017-04-26 10:12 ` [RFC PATCH 3/8] iommu: Introduce iommu do invalidate API function Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L [not found] ` <1493201525-14418-4-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155924.755ee17f-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-17 10:23 ` Liu, Yi L 2017-05-17 10:23 ` [Qemu-devel] " Liu, Yi L 2017-04-26 10:12 ` [RFC PATCH 4/8] iommu/vt-d: Add iommu do invalidate function Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L [not found] ` <1493201525-14418-5-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155918.5251fb94-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-17 10:24 ` Liu, Yi L [this message] 2017-05-17 10:24 ` Liu, Yi L 2017-04-26 10:12 ` [RFC PATCH 5/8] VFIO: Add new IOTCL for PASID Table bind propagation Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-04-26 16:56 ` Jean-Philippe Brucker 2017-04-26 16:56 ` [Qemu-devel] " Jean-Philippe Brucker 2017-04-27 5:43 ` Liu, Yi L [not found] ` <1493201525-14418-6-git-send-email-yi.l.liu-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> 2017-05-11 10:29 ` Liu, Yi L 2017-05-11 10:29 ` Liu, Yi L 2017-05-12 21:58 ` Alex Williamson 2017-05-12 21:58 ` [Qemu-devel] " Alex Williamson [not found] ` <20170512155851.627409ed-1yVPhWWZRC1BDLzU/O5InQ@public.gmane.org> 2017-05-17 10:27 ` Liu, Yi L 2017-05-17 10:27 ` Liu, Yi L [not found] ` <20170517102759.GF22110-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-05-18 11:29 ` Jean-Philippe Brucker 2017-05-18 11:29 ` Jean-Philippe Brucker 2017-04-26 10:12 ` [RFC PATCH 6/8] VFIO: do pasid table binding Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-09 7:55 ` Xiao Guangrong 2017-05-09 7:55 ` [Qemu-devel] " Xiao Guangrong 2017-05-11 10:29 ` Liu, Yi L 2017-05-12 21:59 ` Alex Williamson 2017-05-12 21:59 ` [Qemu-devel] " Alex Williamson 2017-04-26 10:12 ` [RFC PATCH 7/8] VFIO: Add new IOCTL for IOMMU TLB invalidate propagation Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-12 12:11 ` Jean-Philippe Brucker 2017-05-12 12:11 ` [Qemu-devel] " Jean-Philippe Brucker [not found] ` <cc330a8f-e087-9b6f-2a40-38b58688d300-5wv7dgnIgG8@public.gmane.org> 2017-05-14 10:12 ` Liu, Yi L 2017-05-14 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-15 12:14 ` Jean-Philippe Brucker 2017-05-15 12:14 ` [Qemu-devel] " Jean-Philippe Brucker 2017-07-02 10:06 ` Liu, Yi L 2017-07-02 10:06 ` Liu, Yi L 2017-07-03 11:52 ` Jean-Philippe Brucker [not found] ` <0e4f2dd4-d553-b1b7-7bec-fe0ff5242c54-5wv7dgnIgG8@public.gmane.org> 2017-07-03 10:31 ` Liu, Yi L 2017-07-03 10:31 ` Liu, Yi L [not found] ` <20170703103115.GB22053-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-07-05 6:45 ` Tian, Kevin 2017-07-05 6:45 ` Tian, Kevin [not found] ` <AADFC41AFE54684AB9EE6CBC0274A5D190D25919-0J0gbvR4kThpB2pF5aRoyrfspsVTdybXVpNB7YpNyf8@public.gmane.org> 2017-07-05 12:42 ` Jean-Philippe Brucker 2017-07-05 12:42 ` Jean-Philippe Brucker [not found] ` <1d63c1ae-ca10-0f9d-91de-0d9c9823c104-5wv7dgnIgG8@public.gmane.org> 2017-07-05 17:28 ` Alex Williamson 2017-07-05 17:28 ` Alex Williamson [not found] ` <20170705112816.56554f65-DGNDKt5SQtizQB+pC5nmwQ@public.gmane.org> 2017-07-05 22:26 ` Tian, Kevin 2017-07-05 22:26 ` Tian, Kevin 2017-07-14 8:58 ` Liu, Yi L 2017-07-14 8:58 ` Liu, Yi L [not found] ` <A2975661238FB949B60364EF0F2C2574390A7C4F-E2R4CRU6q/6iAffOGbnezLfspsVTdybXVpNB7YpNyf8@public.gmane.org> 2017-07-14 18:15 ` Alex Williamson 2017-07-14 18:15 ` Alex Williamson [not found] ` <20170714121555.7e64d849-DGNDKt5SQtizQB+pC5nmwQ@public.gmane.org> 2017-07-17 10:58 ` Liu, Yi L 2017-07-17 10:58 ` Liu, Yi L 2017-07-17 22:45 ` Alex Williamson [not found] ` <20170717164515.2491b3bf-DGNDKt5SQtizQB+pC5nmwQ@public.gmane.org> 2017-07-18 9:38 ` Jean-Philippe Brucker 2017-07-18 9:38 ` Jean-Philippe Brucker [not found] ` <d0abeefc-adcf-85c3-f5d9-8c90a18f8011-5wv7dgnIgG8@public.gmane.org> 2017-07-18 14:29 ` Alex Williamson 2017-07-18 14:29 ` Alex Williamson 2017-07-18 15:03 ` Jean-Philippe Brucker 2017-07-19 10:45 ` Liu, Yi L 2017-07-19 10:45 ` Liu, Yi L 2017-07-19 21:50 ` Jacob Pan 2017-07-19 21:50 ` Jacob Pan 2017-07-05 22:31 ` Tian, Kevin 2017-07-05 22:31 ` Tian, Kevin 2017-05-12 21:58 ` Alex Williamson 2017-05-12 21:58 ` [Qemu-devel] " Alex Williamson 2017-05-14 10:55 ` Liu, Yi L 2017-05-14 10:55 ` [Qemu-devel] " Liu, Yi L [not found] ` <20170514105507.GB22110-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org> 2017-07-05 5:32 ` Tian, Kevin 2017-07-05 5:32 ` [Qemu-devel] " Tian, Kevin 2017-04-26 10:12 ` [RFC PATCH 8/8] VFIO: do IOMMU TLB invalidation from guest Liu, Yi L 2017-04-26 10:12 ` [Qemu-devel] " Liu, Yi L 2017-05-08 4:09 ` [RFC PATCH 0/8] Shared Virtual Memory virtualization for VT-d Xiao Guangrong 2017-05-08 4:09 ` [Qemu-devel] " Xiao Guangrong 2017-05-07 7:33 ` Liu, Yi L
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=20170517102439.GE22110@gmail.com \ --to=yi.l.liu-vuqaysv1563yd54fqh9/ca@public.gmane.org \ --cc=alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \ --cc=iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \ --cc=jacob.jun.pan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ --cc=jasowang-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org \ --cc=kevin.tian-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ --cc=kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \ --cc=qemu-devel-qX2TKyscuCcdnm+yROfE0A@public.gmane.org \ --cc=tianyu.lan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.