Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp867374pxf; Wed, 7 Apr 2021 13:41:44 -0700 (PDT) X-Google-Smtp-Source: ABdhPJwfUBsysdgM9T5+m4qswCPrNIBZKUp838zRAv3612yh46V4GGu+ANFZCl26kmp8RDwf8Orf X-Received: by 2002:a05:6402:2552:: with SMTP id l18mr6650639edb.71.1617828103887; Wed, 07 Apr 2021 13:41:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617828103; cv=none; d=google.com; s=arc-20160816; b=fTwsHkE4oHg9HrElvb1CGSvQGsnQbZJgjOUS8nS5t34TyLTkqOJykZwhc9xE4mGo5e 3HgMKv+jmfK6ekUwo4Mld7LAjy7dXNNd554nOoOBhL/HJbwyJ27GWR8IeUKyJ0b9eBbK 3NEHEG4I+4VWDNSLx7eN7x5//FI/REBTOv6PWi5l4LOUzEHJZWUsq/mlbpxtro6tdOYl 5A9yG/JdGueqeDAiBKzWosHElrOl68rsuTDWd047ljMaTRkeC579zn7O958XYQFmQ601 OzfPSA1Oa2wO33g+oFD/EMQFPi3TCWoy0SgtoMXC3/WolqBL2/QKfQAzVylFjodU49ch SxWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=kwdSkaXHeoQMQsbaGfQnQWL5p4RH+n6OH9qq8M9rcfQ=; b=nnWIyCqc3DoH29NQRuKnwDoIFrgavS1aHMTMANjJa2qZboRRja01JmTdtOwel6JYW1 22z+Ue61i3CHTvjXXIysORzMTqcPsC+SnM6PUCjza6xrESQK5rJMQ495mxyamK3uI1SP uOtctXIb5qM+l89ezdGx353PFXj3LYrwVjxYuajCBIGkjeVoEIplne4thRmkRuSW3KWW axOAVlTklsHrA/JctEfnLJ5nZ3AeShhPg52isQ98dVA5L6Os36+Ryyf2RtTuSOS377Ea S3t0+2RuIh3Ag1qhn9ZtL5bhNTlLBixhDepJVwC8mY3VI/ThDhAcemUbiH5XMKkqmyM9 ihhQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id k16si19519833ejb.318.2021.04.07.13.41.21; Wed, 07 Apr 2021 13:41:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1350157AbhDGJdv (ORCPT + 99 others); Wed, 7 Apr 2021 05:33:51 -0400 Received: from szxga05-in.huawei.com ([45.249.212.191]:16009 "EHLO szxga05-in.huawei.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233469AbhDGJdt (ORCPT ); Wed, 7 Apr 2021 05:33:49 -0400 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by szxga05-in.huawei.com (SkyGuard) with ESMTP id 4FFfJs2YhXzPnwK; Wed, 7 Apr 2021 17:30:53 +0800 (CST) Received: from [10.174.185.179] (10.174.185.179) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.498.0; Wed, 7 Apr 2021 17:33:28 +0800 Subject: Re: [PATCH v12 01/13] vfio: VFIO_IOMMU_SET_PASID_TABLE To: Eric Auger CC: , , , , , , , , , , , , , , , , , , , , , , , , References: <20210223210625.604517-1-eric.auger@redhat.com> <20210223210625.604517-2-eric.auger@redhat.com> From: Zenghui Yu Message-ID: Date: Wed, 7 Apr 2021 17:33:23 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:68.0) Gecko/20100101 Thunderbird/68.9.0 MIME-Version: 1.0 In-Reply-To: <20210223210625.604517-2-eric.auger@redhat.com> Content-Type: text/plain; charset="utf-8"; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Originating-IP: [10.174.185.179] X-CFilter-Loop: Reflected Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Eric, On 2021/2/24 5:06, Eric Auger wrote: > +/* > + * VFIO_IOMMU_SET_PASID_TABLE - _IOWR(VFIO_TYPE, VFIO_BASE + 18, > + * struct vfio_iommu_type1_set_pasid_table) > + * > + * The SET operation passes a PASID table to the host while the > + * UNSET operation detaches the one currently programmed. Setting > + * a table while another is already programmed replaces the old table. It looks to me that this description doesn't match the IOMMU part. [v14,05/13] iommu/smmuv3: Implement attach/detach_pasid_table | case IOMMU_PASID_CONFIG_TRANSLATE: | /* we do not support S1 <-> S1 transitions */ | if (smmu_domain->s1_cfg.set) | goto out; Maybe I've misread something? Thanks, Zenghui