From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([2001:4830:134:3::10]:44029) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1cW40z-0006Wv-77 for qemu-devel@nongnu.org; Tue, 24 Jan 2017 11:32:17 -0500 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1cW40v-0005NL-9d for qemu-devel@nongnu.org; Tue, 24 Jan 2017 11:32:13 -0500 Received: from mx1.redhat.com ([209.132.183.28]:43680) by eggs.gnu.org with esmtps (TLS1.0:DHE_RSA_AES_256_CBC_SHA1:32) (Exim 4.71) (envelope-from ) id 1cW40v-0005N5-40 for qemu-devel@nongnu.org; Tue, 24 Jan 2017 11:32:09 -0500 Date: Tue, 24 Jan 2017 09:32:07 -0700 From: Alex Williamson Message-ID: <20170124093207.18444a86@t450s.home> In-Reply-To: <1485253571-19058-4-git-send-email-peterx@redhat.com> References: <1485253571-19058-1-git-send-email-peterx@redhat.com> <1485253571-19058-4-git-send-email-peterx@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [PATCH v5 03/18] vfio: allow to notify unmap for very large region List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: Peter Xu Cc: qemu-devel@nongnu.org, tianyu.lan@intel.com, kevin.tian@intel.com, mst@redhat.com, jan.kiszka@siemens.com, jasowang@redhat.com, bd.aviv@gmail.com, David Gibson On Tue, 24 Jan 2017 18:25:56 +0800 Peter Xu wrote: > Linux vfio driver supports to do VFIO_IOMMU_UNMAP_DMA for a very big > region. This can be leveraged by QEMU IOMMU implementation to cleanup > existing page mappings for an entire iova address space (by notifying > with an IOTLB with extremely huge addr_mask). However current > vfio_iommu_map_notify() does not allow that. It make sure that all the > translated address in IOTLB is falling into RAM range. > > The check makes sense, but it should only be a sensible checker for > mapping operations, and mean little for unmap operations. > > This patch moves this check into map logic only, so that we'll get > faster unmap handling (no need to translate again), and also we can then > better support unmapping a very big region when it covers non-ram ranges > or even not-existing ranges. > > Signed-off-by: Peter Xu > --- > hw/vfio/common.c | 7 +++---- > 1 file changed, 3 insertions(+), 4 deletions(-) > > diff --git a/hw/vfio/common.c b/hw/vfio/common.c > index ce55dff..4d90844 100644 > --- a/hw/vfio/common.c > +++ b/hw/vfio/common.c > @@ -354,11 +354,10 @@ static void vfio_iommu_map_notify(IOMMUNotifier *n, IOMMUTLBEntry *iotlb) > return; > } > > - if (!vfio_get_vaddr(iotlb, &vaddr, &read_only)) { > - return; > - } > - > if ((iotlb->perm & IOMMU_RW) != IOMMU_NONE) { > + if (!vfio_get_vaddr(iotlb, &vaddr, &read_only)) { > + return; > + } David, is SPAPR going to freak out if it sees unmaps to ranges that extend beyond individual mappings, or perhaps include no mappings? This effectively allows unmapping the entire address space of the iommu in one pass, without validating or translating the backing. > ret = vfio_dma_map(container, iova, > iotlb->addr_mask + 1, vaddr, > read_only);