From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 09319C433DF for ; Tue, 19 May 2020 09:47:42 +0000 (UTC) Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id B07E820756 for ; Tue, 19 May 2020 09:47:41 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=lists.infradead.org header.i=@lists.infradead.org header.b="bwKEJwkW" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org B07E820756 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=huawei.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20170209; h=Sender: Content-Transfer-Encoding:Content-Type:Cc:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:MIME-Version:Date:Message-ID:Subject: From:To:Reply-To:Content-ID:Content-Description:Resent-Date:Resent-From: Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID:In-Reply-To:References: List-Owner; bh=wSHr38dEtgnZq+U9ifb4+a8rCrRLORGGdNtyM3w3LlM=; b=bwKEJwkWk/Sspz MMXmii4oU0E8O5NCwfzJ7WOZ/ro8Gmf6OThTBFYMG5QdUHgapvrdADaHgVUBP9oieldRbNPgXfmhm D8ptTyxWyQP6+N8PtQ8pNDalyPX9dGiHOLm6qyaALCNXV6bcfimNkE5+vxGM2VodNb6ALqf2/HG97 Rq0RgPPCk7sv1MTUS5fHESl0KRqwI0PuHoLTwoGZ1A9zjzQVgZ3v+vMP+uDeM0jQvKcmXuI6I6qnw KXaNe3TOMpOVeeLn3cQd85JBahJoKGWFcnjCwQUVMYvqc0qrA5ggBIPUD99hH89Me6ZDEQt8oW1a1 RVkAsuKbzVIv9AjfXe1Q==; Received: from localhost ([127.0.0.1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.92.3 #3 (Red Hat Linux)) id 1jayqa-0003nk-50; Tue, 19 May 2020 09:47:40 +0000 Received: from szxga05-in.huawei.com ([45.249.212.191] helo=huawei.com) by bombadil.infradead.org with esmtps (Exim 4.92.3 #3 (Red Hat Linux)) id 1jaymN-0005wu-DZ for linux-arm-kernel@lists.infradead.org; Tue, 19 May 2020 09:43:21 +0000 Received: from DGGEMS403-HUB.china.huawei.com (unknown [172.30.72.58]) by Forcepoint Email with ESMTP id E2957992080CA34DBE1F; Tue, 19 May 2020 17:43:11 +0800 (CST) Received: from [127.0.0.1] (10.173.221.213) by DGGEMS403-HUB.china.huawei.com (10.3.19.203) with Microsoft SMTP Server id 14.3.487.0; Tue, 19 May 2020 17:43:01 +0800 To: , From: Xiang Zheng Subject: [RFC] Use SMMU HTTU for DMA dirty page tracking Message-ID: Date: Tue, 19 May 2020 17:42:55 +0800 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:68.0) Gecko/20100101 Thunderbird/68.1.0 MIME-Version: 1.0 Content-Language: en-US X-Originating-IP: [10.173.221.213] X-CFilter-Loop: Reflected X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20200519_024319_673834_2C12F1F2 X-CRM114-Status: UNSURE ( 7.74 ) X-CRM114-Notice: Please train this message. X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: jean-philippe@linaro.org, Suzuki K Poulose , maz@kernel.org, wangzhou1@hisilicon.com, James Morse , prime.zeng@hisilicon.com, Wang Haibin , Will Deacon , julien.thierry.kdev@gmail.com Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+infradead-linux-arm-kernel=archiver.kernel.org@lists.infradead.org Hi all, Is there any plan for enabling SMMU HTTU? I have seen the patch locates in the SVA series patch, which adds support for HTTU: https://www.spinics.net/lists/arm-kernel/msg798694.html HTTU reduces the number of access faults on SMMU fault queue (permission faults also benifit from it). Besides reducing the faults, HTTU also helps to track dirty pages for device DMA. Is it feasible to utilize HTTU to get dirty pages on device DMA during VFIO live migration? If SMMU can track dirty pages, devices are not required to implement additional dirty pages tracking to support VFIO live migration. -- Thanks, Xiang _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel