From: Eric Auger <eric.auger@redhat.com>
To: eric.auger.pro@gmail.com, eric.auger@redhat.com,
qemu-devel@nongnu.org, qemu-arm@nongnu.org,
peter.maydell@linaro.org, peterx@redhat.com, pbonzini@redhat.com,
alex.williamson@redhat.com
Subject: [Qemu-devel] [PATCH v2 0/6] ARM SMMUv3: Fix spurious notification errors and stall with vfio-pci
Date: Mon, 1 Jul 2019 11:30:28 +0200 [thread overview]
Message-ID: <20190701093034.18873-1-eric.auger@redhat.com> (raw)
This series fixes the guest stall observed when attempting to run
a guest exposed with a SMMUv3 and a VFIO-PCI device. As a reminder
SMMUv3 is not yet integrated with VFIO (the device will not work
properly) but this shouldn't prevent the guest from booting.
It also silences some spurious translation configuration decoding
errors (STE out of span or invalid STE) that may happen on guest IOVA
invalidation notifications.
Best Regards
Eric
History:
v1 -> v2:
- Added "memory: Remove unused memory_region_iommu_replay_all()" &
"hw/arm/smmuv3: Log a guest error when decoding an invalid STE"
- do not attempt to implement replay Cb but rather remove the call
in case it is not needed
- explain why we do not remove other log messages on config decoding
Eric Auger (6):
memory: Remove unused memory_region_iommu_replay_all()
memory: Add IOMMU_ATTR_VFIO_NESTED IOMMU memory region attribute
hw/vfio/common: Do not replay IOMMU mappings in nested case
hw/arm/smmuv3: Advertise VFIO_NESTED
hw/arm/smmuv3: Log a guest error when decoding an invalid STE
hw/arm/smmuv3: Remove spurious error messages on IOVA invalidations
hw/arm/smmuv3-internal.h | 1 +
hw/arm/smmuv3.c | 26 ++++++++++++++++++++------
hw/vfio/common.c | 7 ++++++-
include/exec/memory.h | 13 ++-----------
memory.c | 9 ---------
5 files changed, 29 insertions(+), 27 deletions(-)
--
2.20.1
next reply other threads:[~2019-07-01 9:36 UTC|newest]
Thread overview: 17+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-07-01 9:30 Eric Auger [this message]
2019-07-01 9:30 ` [Qemu-devel] [PATCH v2 1/6] memory: Remove unused memory_region_iommu_replay_all() Eric Auger
2019-07-01 9:58 ` Philippe Mathieu-Daudé
2019-07-03 5:41 ` Peter Xu
2019-07-01 9:30 ` [Qemu-devel] [PATCH v2 2/6] memory: Add IOMMU_ATTR_VFIO_NESTED IOMMU memory region attribute Eric Auger
2019-07-03 5:42 ` Peter Xu
2019-07-03 9:10 ` Auger Eric
2019-07-01 9:30 ` [Qemu-devel] [PATCH v2 3/6] hw/vfio/common: Do not replay IOMMU mappings in nested case Eric Auger
2019-07-03 5:41 ` Peter Xu
2019-07-03 9:04 ` Auger Eric
2019-07-03 10:21 ` Peter Xu
2019-07-03 10:45 ` Auger Eric
2019-07-04 2:36 ` Peter Xu
2019-07-01 9:30 ` [Qemu-devel] [PATCH v2 4/6] hw/arm/smmuv3: Advertise VFIO_NESTED Eric Auger
2019-07-01 9:30 ` [Qemu-devel] [PATCH v2 5/6] hw/arm/smmuv3: Log a guest error when decoding an invalid STE Eric Auger
2019-07-01 9:58 ` Philippe Mathieu-Daudé
2019-07-01 9:30 ` [Qemu-devel] [PATCH v2 6/6] hw/arm/smmuv3: Remove spurious error messages on IOVA invalidations Eric Auger
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20190701093034.18873-1-eric.auger@redhat.com \
--to=eric.auger@redhat.com \
--cc=alex.williamson@redhat.com \
--cc=eric.auger.pro@gmail.com \
--cc=pbonzini@redhat.com \
--cc=peter.maydell@linaro.org \
--cc=peterx@redhat.com \
--cc=qemu-arm@nongnu.org \
--cc=qemu-devel@nongnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).