[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [PATCH v16 00/10] VIRTIO-IOMMU device
From: |
Tian, Kevin |
Subject: |
RE: [PATCH v16 00/10] VIRTIO-IOMMU device |
Date: |
Thu, 5 Mar 2020 02:56:20 +0000 |
> From: Jean-Philippe Brucker <address@hidden>
> Sent: Thursday, March 5, 2020 12:47 AM
>
[...]
> > >
> > > * We can't use DVM in nested mode unless the VMID is shared with the
> > > CPU. For that we'll need the host SMMU driver to hook into the KVM
> VMID
> > > allocator, just like we do for the ASID allocator. I haven't yet
> > > investigated how to do that. It's possible to do vSVA without DVM
> > > though, by sending all TLB invalidations through the SMMU command
> queue.
> > > "
>
> Hm we're already mandating DVM for host SVA, so I'd say mandate it for
> vSVA as well. We'd avoid a ton of context switches, especially for the zip
> accelerator which doesn't require ATC invalidations. The host needs to pin
> the VMID allocated by KVM and write it in the endpoint's STE.
>
Curious... what is DVM and how is it related to SVA? Is it SMMU specific?
- Re: [PATCH v16 00/10] VIRTIO-IOMMU device, Zhangfei Gao, 2020/03/02
- Re: [PATCH v16 00/10] VIRTIO-IOMMU device, Auger Eric, 2020/03/03
- Re: [PATCH v16 00/10] VIRTIO-IOMMU device, Zhangfei Gao, 2020/03/04
- Re: [PATCH v16 00/10] VIRTIO-IOMMU device, Auger Eric, 2020/03/04
- Re: [PATCH v16 00/10] VIRTIO-IOMMU device, Jean-Philippe Brucker, 2020/03/04
- RE: [PATCH v16 00/10] VIRTIO-IOMMU device,
Tian, Kevin <=
- Re: [PATCH v16 00/10] VIRTIO-IOMMU device, Jean-Philippe Brucker, 2020/03/05
- RE: [PATCH v16 00/10] VIRTIO-IOMMU device, Tian, Kevin, 2020/03/05