On Sun, Aug 28, 2022 at 09:57:21PM +0800, Baolu Lu wrote:
On 2022/8/26 22:56, Jason Gunthorpe wrote:It may be interesting for something like DPDK type applications where
On Fri, Aug 26, 2022 at 08:11:36PM +0800, Lu Baolu wrote:Conceptually as long as the page table is compatible and user pages are
+static const struct iommu_domain_ops arm_smmu_sva_domain_ops = {Do we want to permit drivers to not allow a SVA domain to be set on a
+ .set_dev_pasid = arm_smmu_sva_set_dev_pasid,
RID?
It seems like a weird restriction to me
pinned (or I/O page fault is supported), the device drivers are valid to
set SVA domain to a RID. But I don't see a real use case as far as I can
see.
having the entire process address space mapped SVA to the device could
be quite nice.
You, currently, give up interrupts, but perhaps that is solvable in some
way.
So, IDK.. I wouldn't dismiss it entirely but I wouldn't do a bunch of
work to support it either.
A reasonable use case is sharing EPT between KVM and IOMMU. That demandsNot everything is virtualization:)
a new type of domain and implements its own .set_dev for page table
attachment.