From: "Tian, Kevin" <kevin.tian@intel.com> To: Jean-Philippe Brucker <jean-philippe.brucker@arm.com>, valmiki <valmikibow@gmail.com>, Alex Williamson <alex.williamson@redhat.com> Cc: "iommu@lists.linux-foundation.org" <iommu@lists.linux-foundation.org>, "kvm@vger.kernel.org" <kvm@vger.kernel.org>, "linux-pci@vger.kernel.org" <linux-pci@vger.kernel.org>, "Lan, Tianyu" <tianyu.lan@intel.com>, "Pan, Jacob jun" <jacob.jun.pan@intel.com> Subject: RE: Support SVM without PASID Date: Fri, 4 Aug 2017 01:49:38 +0000 [thread overview] Message-ID: <AADFC41AFE54684AB9EE6CBC0274A5D190D57191@SHSMSX101.ccr.corp.intel.com> (raw) In-Reply-To: <564ba70b-db95-7fe0-86bb-bb4eefcd87ec@arm.com> PiBGcm9tOiBKZWFuLVBoaWxpcHBlIEJydWNrZXINCj4gU2VudDogVHVlc2RheSwgQXVndXN0IDEs IDIwMTcgNDoyNiBQTQ0KPiANCj4gSXQgZGVwZW5kcyB3aGF0IHR5cGUgeW91IHVzZSB3aGVuIHJl Z2lzdGVyaW5nIHRoZSBJT01NVSB3aXRoDQo+IFZGSU9fU0VUX0lPTU1VOg0KPiANCj4gKiBJZiB0 aGUgdHlwZSBpcyBWRklPX1RZUEUxdjJfSU9NTVUsIHRoZW4NCj4gVkZJT19JT01NVV9NQVAvVU5N QVBfRE1BDQo+ICAgYWZmZWN0cyB0aGUgc3RhZ2UtMSBub24tUEFTSUQgY29udGV4dCAoYWxyZWFk eSB0aGUgY2FzZSBpbiBtYWlubGluZSkuDQo+ICAgSW4gYWRkaXRpb24sIHdpdGggbXkgcGF0Y2gg dGhlIEJJTkQgaW9jdGwgd2lsbCBhZmZlY3Qgc3RhZ2UtMSBQQVNJRA0KPiAgIGNvbnRleHRzLCBh bmQgYmluZCBwcm9jZXNzIHBhZ2UgZGlyZWN0b3JpZXMgdG8gdGhlIGRldmljZSAoaG9zdCBTVk0p Lg0KPiANCj4gKiBJZiB0aGUgdHlwZSBpcyBWRklPX1RZUEUxX05FU1RJTkdfSU9NTVUsIHRoZW4N Cj4gVkZJT19JT01NVV9NQVAvVU5NQVBfRE1BDQo+ICAgd2lsbCBhZmZlY3Qgc3RhZ2UtMiBtYXBw aW5ncyAoYWxyZWFkeSBpbiBtYWlubGluZSkuDQo+ICAgV2l0aCBteSBTTU1VIHBhdGNoIHNlcmll cywgdGhlIEJJTkQgaW9jdGwgaXMgbm90IHN1cHBvcnRlZCBpbiB0aGlzIG1vZGUuDQo+ICAgQnV0 IGluIHRoZSBmdXR1cmUsIEJJTkQgd291bGQgYWxsb3cgdG8gbWFuYWdlIHN0YWdlLTEgYXMgd2Vs bDoNCj4gICAtIGJpbmQgYSBwcm9jZXNzIHBhZ2UgZGlyZWN0b3J5IChob3N0IFNWTSB3aXRoIGFk ZGVkIHN0YWdlLTIpLCBvcg0KDQpJIHRob3VnaHQgaG9zdCBTVk0gd2lsbCBvbmx5IGdvIHRocm91 Z2ggVkZJT19UWVBFMXYyX0lPTU1VLA0Kc2luY2UgeW91IHNhaWQgc3RhZ2UtMiBpbiBBUk0gU01N VSBpcyBvbmx5IGZvciBHUEEtPkhQQSB1c2FnZQ0KaW4gcHJldmlvdXMgZXhwbGFuYXRpb24uIHRo ZW4gd2hhdCBkb2VzICJob3N0IFNWTSB3aXRoIGFkZGVkIA0Kc3RhZ2UtMiIgbWVhbiBoZXJlPw0K DQo+ICAgLSBiaW5kIGEgZ3Vlc3QgcGFnZSBkaXJlY3RvcnkgKHZpb21tdSksIG9yDQo+ICAgLSBi aW5kIHRoZSBmdWxsIHN0YWdlLTEgY29udGV4dCB0YWJsZSAodmlvbW11KS4NCj4gDQo+IFRoYW5r cywNCj4gSmVhbg0K
WARNING: multiple messages have this Message-ID (diff)
From: "Tian, Kevin" <kevin.tian-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org> To: Jean-Philippe Brucker <jean-philippe.brucker-5wv7dgnIgG8@public.gmane.org>, valmiki <valmikibow-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>, Alex Williamson <alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org> Cc: "Lan, Tianyu" <tianyu.lan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>, "linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" <linux-pci-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>, "iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org" <iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>, "Pan, Jacob jun" <jacob.jun.pan-ral2JQCrhuEAvxtiuMwx3w@public.gmane.org>, "kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org" <kvm-u79uwXL29TY76Z2rM5mHXA@public.gmane.org> Subject: RE: Support SVM without PASID Date: Fri, 4 Aug 2017 01:49:38 +0000 [thread overview] Message-ID: <AADFC41AFE54684AB9EE6CBC0274A5D190D57191@SHSMSX101.ccr.corp.intel.com> (raw) In-Reply-To: <564ba70b-db95-7fe0-86bb-bb4eefcd87ec-5wv7dgnIgG8@public.gmane.org> > From: Jean-Philippe Brucker > Sent: Tuesday, August 1, 2017 4:26 PM > > It depends what type you use when registering the IOMMU with > VFIO_SET_IOMMU: > > * If the type is VFIO_TYPE1v2_IOMMU, then > VFIO_IOMMU_MAP/UNMAP_DMA > affects the stage-1 non-PASID context (already the case in mainline). > In addition, with my patch the BIND ioctl will affect stage-1 PASID > contexts, and bind process page directories to the device (host SVM). > > * If the type is VFIO_TYPE1_NESTING_IOMMU, then > VFIO_IOMMU_MAP/UNMAP_DMA > will affect stage-2 mappings (already in mainline). > With my SMMU patch series, the BIND ioctl is not supported in this mode. > But in the future, BIND would allow to manage stage-1 as well: > - bind a process page directory (host SVM with added stage-2), or I thought host SVM will only go through VFIO_TYPE1v2_IOMMU, since you said stage-2 in ARM SMMU is only for GPA->HPA usage in previous explanation. then what does "host SVM with added stage-2" mean here? > - bind a guest page directory (viommu), or > - bind the full stage-1 context table (viommu). > > Thanks, > Jean
next prev parent reply other threads:[~2017-08-04 1:49 UTC|newest] Thread overview: 48+ messages / expand[flat|nested] mbox.gz Atom feed top 2017-07-08 17:03 Support SVM without PASID valmiki 2017-07-08 17:03 ` valmiki 2017-07-08 20:02 ` Alex Williamson 2017-07-08 20:02 ` Alex Williamson 2017-07-09 3:15 ` valmiki 2017-07-09 9:29 ` Liu, Yi L 2017-07-10 0:14 ` Bob Liu 2017-07-10 0:14 ` Bob Liu 2017-07-10 19:31 ` Jerome Glisse 2017-07-12 16:23 ` valmiki 2017-07-12 16:23 ` valmiki 2017-07-11 10:56 ` Jean-Philippe Brucker 2017-07-11 10:56 ` Jean-Philippe Brucker 2017-07-12 16:27 ` valmiki 2017-07-12 16:27 ` valmiki 2017-07-12 16:48 ` Jean-Philippe Brucker 2017-07-22 2:05 ` valmiki 2017-08-01 8:26 ` Jean-Philippe Brucker 2017-08-01 8:26 ` Jean-Philippe Brucker 2017-08-01 17:38 ` valmiki 2017-08-01 17:38 ` valmiki 2017-08-01 18:40 ` Jean-Philippe Brucker 2017-08-05 5:14 ` valmiki 2017-08-07 10:31 ` Jean-Philippe Brucker 2017-08-07 12:18 ` Bob Liu 2017-08-07 12:18 ` Bob Liu 2017-08-07 12:52 ` Jean-Philippe Brucker 2017-08-08 0:51 ` Bob Liu 2017-08-08 0:51 ` Bob Liu 2017-08-09 15:01 ` Jean-Philippe Brucker 2017-08-11 6:41 ` Tian, Kevin 2017-08-11 9:25 ` Jean-Philippe Brucker 2017-08-11 9:25 ` Jean-Philippe Brucker 2017-08-11 9:36 ` Bob Liu 2017-08-12 12:10 ` valmiki 2017-08-14 7:49 ` Tian, Kevin 2017-08-28 13:10 ` Bharat Kumar Gogada 2017-08-28 13:10 ` Bharat Kumar Gogada 2017-08-29 1:32 ` Tian, Kevin 2017-08-04 1:49 ` Tian, Kevin [this message] 2017-08-04 1:49 ` Tian, Kevin 2017-08-04 9:42 ` Jean-Philippe Brucker 2017-08-11 6:29 ` Tian, Kevin 2017-08-11 6:29 ` Tian, Kevin 2017-08-11 16:25 ` Raj, Ashok 2017-08-14 8:00 ` Tian, Kevin 2017-08-14 8:00 ` Tian, Kevin 2017-08-14 9:07 ` Jean-Philippe Brucker
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=AADFC41AFE54684AB9EE6CBC0274A5D190D57191@SHSMSX101.ccr.corp.intel.com \ --to=kevin.tian@intel.com \ --cc=alex.williamson@redhat.com \ --cc=iommu@lists.linux-foundation.org \ --cc=jacob.jun.pan@intel.com \ --cc=jean-philippe.brucker@arm.com \ --cc=kvm@vger.kernel.org \ --cc=linux-pci@vger.kernel.org \ --cc=tianyu.lan@intel.com \ --cc=valmikibow@gmail.com \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: linkBe sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes, see mirroring instructions on how to clone and mirror all data and code used by this external index.