Re: [PATCH] swiotlb: Allow swiotlb to live at pre-defined address

2020-03-28 Thread Dave Young
On 03/26/20 at 05:29pm, Alexander Graf wrote: > The swiotlb is a very convenient fallback mechanism for bounce buffering of > DMAable data. It is usually used for the compatibility case where devices > can only DMA to a "low region". > > However, in some scenarios this "low region" may be bound ev

RE: [PATCH V10 11/11] iommu/vt-d: Add custom allocator for IOASID

2020-03-28 Thread Tian, Kevin
> From: Jacob Pan > Sent: Saturday, March 21, 2020 7:28 AM > > When VT-d driver runs in the guest, PASID allocation must be > performed via virtual command interface. This patch registers a > custom IOASID allocator which takes precedence over the default > XArray based allocator. The resulting I

RE: [PATCH V10 10/11] iommu/vt-d: Enlightened PASID allocation

2020-03-28 Thread Tian, Kevin
> From: Jacob Pan > Sent: Saturday, March 21, 2020 7:28 AM > > From: Lu Baolu > > Enabling IOMMU in a guest requires communication with the host > driver for certain aspects. Use of PASID ID to enable Shared Virtual > Addressing (SVA) requires managing PASID's in the host. VT-d 3.0 spec > provi

RE: [PATCH V10 09/11] iommu/vt-d: Cache virtual command capability register

2020-03-28 Thread Tian, Kevin
> From: Jacob Pan > Sent: Saturday, March 21, 2020 7:28 AM > > Virtual command registers are used in the guest only, to prevent > vmexit cost, we cache the capability and store it during initialization. > > Signed-off-by: Jacob Pan > Reviewed-by: Eric Auger > Reviewed-by: Lu Baolu > > --- >

RE: [PATCH V10 08/11] iommu/vt-d: Add svm/sva invalidate function

2020-03-28 Thread Tian, Kevin
> From: Jacob Pan > Sent: Saturday, March 21, 2020 7:28 AM > > When Shared Virtual Address (SVA) is enabled for a guest OS via > vIOMMU, we need to provide invalidation support at IOMMU API and driver > level. This patch adds Intel VT-d specific function to implement > iommu passdown invalidate A

RE: [PATCH V10 06/11] iommu/vt-d: Add bind guest PASID support

2020-03-28 Thread Tian, Kevin
> From: Jacob Pan > Sent: Saturday, March 21, 2020 7:28 AM > > When supporting guest SVA with emulated IOMMU, the guest PASID > table is shadowed in VMM. Updates to guest vIOMMU PASID table > will result in PASID cache flush which will be passed down to > the host as bind guest PASID calls. > >

Re: [PATCH] iommu/arm-smmu: Demote error messages to debug in shutdown callback

2020-03-28 Thread Sai Prakash Ranjan
Hi Robin, On 2020-03-28 00:32, Robin Murphy wrote: On 2020-03-27 3:09 pm, Sai Prakash Ranjan wrote: Imagine your network driver doesn't implement a .shutdown method (so the hardware is still active regardless of device links), happens to have an Rx buffer or descriptor ring DMA-mapped at an IOV