[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20210518125813.7b8a78f1.alex.williamson@redhat.com>
Date: Tue, 18 May 2021 12:58:13 -0600
From: Alex Williamson <alex.williamson@...hat.com>
To: Shenming Lu <lushenming@...wei.com>
Cc: Cornelia Huck <cohuck@...hat.com>, Will Deacon <will@...nel.org>,
Robin Murphy <robin.murphy@....com>,
Joerg Roedel <joro@...tes.org>,
Jean-Philippe Brucker <jean-philippe@...aro.org>,
Eric Auger <eric.auger@...hat.com>, <kvm@...r.kernel.org>,
<linux-kernel@...r.kernel.org>,
<linux-arm-kernel@...ts.infradead.org>,
<iommu@...ts.linux-foundation.org>, <linux-api@...r.kernel.org>,
Kevin Tian <kevin.tian@...el.com>,
Lu Baolu <baolu.lu@...ux.intel.com>, <yi.l.liu@...el.com>,
Christoph Hellwig <hch@...radead.org>,
Jonathan Cameron <Jonathan.Cameron@...wei.com>,
Barry Song <song.bao.hua@...ilicon.com>,
<wanghaibin.wang@...wei.com>, <yuzenghui@...wei.com>
Subject: Re: [RFC PATCH v3 7/8] vfio/type1: Add selective DMA faulting
support
On Fri, 9 Apr 2021 11:44:19 +0800
Shenming Lu <lushenming@...wei.com> wrote:
> Some devices only allow selective DMA faulting. Similar to the selective
> dirty page tracking, the vendor driver can call vfio_pin_pages() to
> indicate the non-faultable scope, we add a new struct vfio_range to
> record it, then when the IOPF handler receives any page request out
> of the scope, we can directly return with an invalid response.
Seems like this highlights a deficiency in the design, that the user
can't specify mappings as iopf enabled or disabled. Also, if the
vendor driver has pinned pages within the range, shouldn't that prevent
them from faulting in the first place? Why do we need yet more
tracking structures? Pages pinned by the vendor driver need to count
against the user's locked memory limits regardless of iopf. Thanks,
Alex
Powered by blists - more mailing lists