Received: by 2002:a25:1985:0:0:0:0:0 with SMTP id 127csp425242ybz; Wed, 29 Apr 2020 02:46:22 -0700 (PDT) X-Google-Smtp-Source: APiQypJtC7Zp3Fj0aYAQFmobHslubxAWRC6clBvfEtqq4++br6sWh5RRv835jS1Lob5sjMMUOBjB X-Received: by 2002:a17:906:e210:: with SMTP id gf16mr1854519ejb.214.1588153582559; Wed, 29 Apr 2020 02:46:22 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1588153582; cv=none; d=google.com; s=arc-20160816; b=tvLBAPUOrCtedGJLITAPWeWsrDPw+aXjl3FOU0oSDYJNQPMQGlyU8B8HktS/f+wFNZ vtZAL9KIImAAnrd+tfvOzRipLZrrva/XQgDrfPkBiea3VaU6+tKHsVKJAuw3ace+iOgI OuiW4vNVegA3VPzMLkA2hTu2TxCqzzqLdDrvQKw/fU1EXXoLD1Bx7QMVON53Z3Z5SLBg 2k108uWSbpVovMgR3dkTKMMuTFB9Eq3j1U8DnbdrV5g6pjITtzB2psUiQ39OUF22Q28Y dr9JIinL7PX7WK7pNie9H8EeOVRuW07+a8mW0yR+74O5vJ1YtKHJBViSWEqjNYdcCwwW /n5g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:reply-to:message-id :subject:cc:to:from:date:dmarc-filter:dkim-signature; bh=xeoQ4Rw3CrXOQCQ/sgEZvG+//pNvDfL8fDquz8JatMw=; b=ZJPrNXD9ux/TNaEz2pDem1XyyRHOSdPro0dTquHewr6BZJRILFADbGyvzg4LBJf3tK mDn4iXZZAWqDkf23B9bKttV/Mo3c7sgf3UM0OiMBnmIkaZfIVdw28m9SWcTfH9DYUt5f aOj/DojG5QFOA1BODJcbDnDQ9YVcEkDpJFYrwZjJYTlkPpfcpuLTlWoPvuyXbGP//W+o sKQ+AJILd6Q7tZTvrEAR8k7ZB2HQGQWmmle/1VtpFZc+gx/eUuPMwhKR0/Oaun5dyIqe XEVFjvSzZJbhCacVJrfnS5P03ZRMd5bdPMit7YfqDJZ2R1bl0eBtJSUjaiq6rTfn7BST 69iA== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=tUZqRnj+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b21si2942182edj.146.2020.04.29.02.45.58; Wed, 29 Apr 2020 02:46:22 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=fail header.i=@mg.codeaurora.org header.s=smtp header.b=tUZqRnj+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726580AbgD2Jod (ORCPT + 99 others); Wed, 29 Apr 2020 05:44:33 -0400 Received: from mail27.static.mailgun.info ([104.130.122.27]:52989 "EHLO mail27.static.mailgun.info" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726493AbgD2Joc (ORCPT ); Wed, 29 Apr 2020 05:44:32 -0400 DKIM-Signature: a=rsa-sha256; v=1; c=relaxed/relaxed; d=mg.codeaurora.org; q=dns/txt; s=smtp; t=1588153472; h=In-Reply-To: Content-Type: MIME-Version: References: Reply-To: Message-ID: Subject: Cc: To: From: Date: Sender; bh=xeoQ4Rw3CrXOQCQ/sgEZvG+//pNvDfL8fDquz8JatMw=; b=tUZqRnj+QYVZfUmaupkZ8i6/d2abRCmwPidZ/vQCW0UEF2iV11LFkPOkghTpCCtf3iw0ymQH jrROORpKyHxjrLKzkyvZs9HJAxTfTamKE1HBHolPwEcGcg+HGPJxQBj2BG1z+r6w+asU9WHP 0NMdg2wqymfPvqaxRj1GmPDWWZQ= X-Mailgun-Sending-Ip: 104.130.122.27 X-Mailgun-Sid: WyI0MWYwYSIsICJsaW51eC1rZXJuZWxAdmdlci5rZXJuZWwub3JnIiwgImJlOWU0YSJd Received: from smtp.codeaurora.org (ec2-35-166-182-171.us-west-2.compute.amazonaws.com [35.166.182.171]) by mxa.mailgun.org with ESMTP id 5ea94c74.7ff0eebd0880-smtp-out-n03; Wed, 29 Apr 2020 09:44:20 -0000 (UTC) Received: by smtp.codeaurora.org (Postfix, from userid 1001) id DA51AC4478C; Wed, 29 Apr 2020 09:44:18 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-caf-mail-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=ALL_TRUSTED,SPF_NONE autolearn=unavailable autolearn_force=no version=3.4.0 Received: from quicinc.com (blr-bdr-fw-01_GlobalNAT_AllZones-Outside.qualcomm.com [103.229.18.19]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) (Authenticated sender: svaddagi) by smtp.codeaurora.org (Postfix) with ESMTPSA id E1190C433CB; Wed, 29 Apr 2020 09:44:13 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 smtp.codeaurora.org E1190C433CB Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; dmarc=none (p=none dis=none) header.from=codeaurora.org Authentication-Results: aws-us-west-2-caf-mail-1.web.codeaurora.org; spf=none smtp.mailfrom=vatsa@codeaurora.org Date: Wed, 29 Apr 2020 15:14:10 +0530 From: Srivatsa Vaddagiri To: "Michael S. Tsirkin" Cc: Lu Baolu , tsoni@codeaurora.org, virtio-dev@lists.oasis-open.org, konrad.wilk@oracle.com, jan.kiszka@siemens.com, jasowang@redhat.com, christoffer.dall@arm.com, virtualization@lists.linux-foundation.org, alex.bennee@linaro.org, iommu@lists.linux-foundation.org, stefano.stabellini@xilinx.com, will@kernel.org, linux-kernel@vger.kernel.org, pratikp@codeaurora.org Subject: Re: [PATCH 5/5] virtio: Add bounce DMA ops Message-ID: <20200429094410.GD5097@quicinc.com> Reply-To: Srivatsa Vaddagiri References: <1588073958-1793-1-git-send-email-vatsa@codeaurora.org> <1588073958-1793-6-git-send-email-vatsa@codeaurora.org> <20200428121232-mutt-send-email-mst@kernel.org> <20200428174952.GA5097@quicinc.com> <20200428163448-mutt-send-email-mst@kernel.org> <275eba4b-dd35-aa95-b2e3-9c5cbf7c6d71@linux.intel.com> <20200429004531-mutt-send-email-mst@kernel.org> <20200429023842-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=iso-8859-1 Content-Disposition: inline In-Reply-To: <20200429023842-mutt-send-email-mst@kernel.org> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org * Michael S. Tsirkin [2020-04-29 02:50:41]: > So it seems that with modern Linux, all one needs > to do on x86 is mark the device as untrusted. > It's already possible to do this with ACPI and with OF - would that be > sufficient for achieving what this patchset is trying to do? In my case, its not sufficient to just mark virtio device untrusted and thus activate the use of swiotlb. All of the secondary VM memory, including those allocate by swiotlb driver, is private to it. An additional piece of memory is available to secondary VM which is shared between VMs and which is where I need swiotlb driver to do its work. -- QUALCOMM INDIA, on behalf of Qualcomm Innovation Center, Inc. is a member of Code Aurora Forum, hosted by The Linux Foundation