Hi David,
> From: David Gibson [mailto:da...@gibson.dropbear.id.au]
> Sent: Thursday, April 12, 2018 10:36 AM
> On Tue, Mar 06, 2018 at 06:33:52PM +0800, Liu, Yi L wrote:
> > On Mon, Mar 05, 2018 at 02:31:44PM +1100, David Gibson wrote:
> > > On Thu, Mar 01, 2018 at 06:31:55PM +0800, Liu, Yi L
On Tue, Mar 06, 2018 at 06:33:52PM +0800, Liu, Yi L wrote:
> On Mon, Mar 05, 2018 at 02:31:44PM +1100, David Gibson wrote:
> > On Thu, Mar 01, 2018 at 06:31:55PM +0800, Liu, Yi L wrote:
> > > This patch intoduces PCISVAOps for virt-SVA.
> > >
> > > So far, to setup virt-SVA for assigned SVA
On Mon, Mar 05, 2018 at 02:31:44PM +1100, David Gibson wrote:
> On Thu, Mar 01, 2018 at 06:31:55PM +0800, Liu, Yi L wrote:
> > This patch intoduces PCISVAOps for virt-SVA.
> >
> > So far, to setup virt-SVA for assigned SVA capable device, needs to
> > config host translation structures. e.g. for
On Fri, Mar 02, 2018 at 04:10:48PM +0100, Paolo Bonzini wrote:
> On 01/03/2018 11:33, Liu, Yi L wrote:
> > +void pci_setup_sva_ops(PCIDevice *dev, PCISVAOps *ops)
> > +{
> > +if (dev) {
> > +dev->sva_ops = ops;
> > +}
> > +return;
> > +}
> > +
>
> Better:
>
> {
>
On Thu, Mar 01, 2018 at 06:31:55PM +0800, Liu, Yi L wrote:
> This patch intoduces PCISVAOps for virt-SVA.
>
> So far, to setup virt-SVA for assigned SVA capable device, needs to
> config host translation structures. e.g. for VT-d, needs to set the
> guest pasid table to host and enable nested
On 01/03/2018 11:33, Liu, Yi L wrote:
> +void pci_setup_sva_ops(PCIDevice *dev, PCISVAOps *ops)
> +{
> +if (dev) {
> +dev->sva_ops = ops;
> +}
> +return;
> +}
> +
Better:
{
assert(ops && !dev->sva_ops);
dev->sva_ops = ops;
}
This patch intoduces PCISVAOps for virt-SVA.
So far, to setup virt-SVA for assigned SVA capable device, needs to
config host translation structures. e.g. for VT-d, needs to set the
guest pasid table to host and enable nested translation. Besides,
vIOMMU emulator needs to forward guest's cache
This patch intoduces PCISVAOps for virt-SVA.
So far, to setup virt-SVA for assigned SVA capable device, needs to
config host translation structures. e.g. for VT-d, needs to set the
guest pasid table to host and enable nested translation. Besides,
vIOMMU emulator needs to forward guest's cache