search for: iommu_platform

Displaying 20 results from an estimated 89 matches for "iommu_platform".

2020 Aug 06
2
[PATCH v2 19/24] vdpa: make sure set_features in invoked for legacy
...r whether it's easier to just support modern device? >>>> >>>> Thanks >>> Well hardware vendors are I think interested in supporting legacy >>> guests. Limiting vdpa to modern only would make it uncompetitive. >> >> My understanding is that, IOMMU_PLATFORM is mandatory for hardware vDPA to >> work. > Hmm I don't really see why. Assume host maps guest memory properly, > VM does not have an IOMMU, legacy guest can just work. Yes, guest may not set IOMMU_PLATFORM. > > Care explaining what's wrong with this picture? The pr...
2020 Aug 06
2
[PATCH v2 19/24] vdpa: make sure set_features in invoked for legacy
...r whether it's easier to just support modern device? >>>> >>>> Thanks >>> Well hardware vendors are I think interested in supporting legacy >>> guests. Limiting vdpa to modern only would make it uncompetitive. >> >> My understanding is that, IOMMU_PLATFORM is mandatory for hardware vDPA to >> work. > Hmm I don't really see why. Assume host maps guest memory properly, > VM does not have an IOMMU, legacy guest can just work. Yes, guest may not set IOMMU_PLATFORM. > > Care explaining what's wrong with this picture? The pr...
2020 Aug 18
2
[PATCH v8 1/2] virtio: let arch validate VIRTIO features
...> @@ -6,6 +6,12 @@ config VIRTIO > bus, such as CONFIG_VIRTIO_PCI, CONFIG_VIRTIO_MMIO, CONFIG_RPMSG > or CONFIG_S390_GUEST. > > +config ARCH_HAS_RESTRICTED_MEMORY_ACCESS > + bool > + help > + This option is selected by any architecture enforcing > + VIRTIO_F_IOMMU_PLATFORM This option is only for a very specific case of "restricted memory access", namely the kind that requires IOMMU_PLATFORM for virtio devices. ARCH_HAS_RESTRICTED_VIRTIO_MEMORY_ACCESS? Or is this intended to cover cases outside of virtio as well? > + > menuconfig VIRTIO_MENU >...
2020 Aug 18
2
[PATCH v8 1/2] virtio: let arch validate VIRTIO features
...> @@ -6,6 +6,12 @@ config VIRTIO > bus, such as CONFIG_VIRTIO_PCI, CONFIG_VIRTIO_MMIO, CONFIG_RPMSG > or CONFIG_S390_GUEST. > > +config ARCH_HAS_RESTRICTED_MEMORY_ACCESS > + bool > + help > + This option is selected by any architecture enforcing > + VIRTIO_F_IOMMU_PLATFORM This option is only for a very specific case of "restricted memory access", namely the kind that requires IOMMU_PLATFORM for virtio devices. ARCH_HAS_RESTRICTED_VIRTIO_MEMORY_ACCESS? Or is this intended to cover cases outside of virtio as well? > + > menuconfig VIRTIO_MENU >...
2020 Aug 06
2
[PATCH v2 19/24] vdpa: make sure set_features in invoked for legacy
...o catch a kick to handle these. >> I wonder whether it's easier to just support modern device? >> >> Thanks > Well hardware vendors are I think interested in supporting legacy > guests. Limiting vdpa to modern only would make it uncompetitive. My understanding is that, IOMMU_PLATFORM is mandatory for hardware vDPA to work. So it can only work for modern device ... Thanks > > >
2020 Aug 06
2
[PATCH v2 19/24] vdpa: make sure set_features in invoked for legacy
...o catch a kick to handle these. >> I wonder whether it's easier to just support modern device? >> >> Thanks > Well hardware vendors are I think interested in supporting legacy > guests. Limiting vdpa to modern only would make it uncompetitive. My understanding is that, IOMMU_PLATFORM is mandatory for hardware vDPA to work. So it can only work for modern device ... Thanks > > >
2017 Jul 21
1
[RFC v1 0/3] Add VIRTIO_F_IOMMU_PLATFORM support
On Fri, Jul 21, 2017 at 06:17:15AM -0500, Brijesh Singh wrote: > > On 7/20/17 10:24 PM, Jason Wang wrote: > > > > > > On 2017?07?20? 06:09, Brijesh Singh wrote: > >> I have found that OVMF fails to detect the disk when iommu_platform > >> is set from > >> qemu cli. The failure occurs during the feature bit negotiation. > >> > >> Recently, EDKII introduced IOMMU protocol d1fddc4533bf. SEV patch > >> series introduced > >> a IoMmu protocol driver f9d129e68a45 to set a DMA acce...
2017 Jul 21
1
[RFC v1 0/3] Add VIRTIO_F_IOMMU_PLATFORM support
On Fri, Jul 21, 2017 at 06:17:15AM -0500, Brijesh Singh wrote: > > On 7/20/17 10:24 PM, Jason Wang wrote: > > > > > > On 2017?07?20? 06:09, Brijesh Singh wrote: > >> I have found that OVMF fails to detect the disk when iommu_platform > >> is set from > >> qemu cli. The failure occurs during the feature bit negotiation. > >> > >> Recently, EDKII introduced IOMMU protocol d1fddc4533bf. SEV patch > >> series introduced > >> a IoMmu protocol driver f9d129e68a45 to set a DMA acce...
2020 Aug 06
3
[PATCH v1 0/1] s390: virtio-ccw: PV needs VIRTIO I/O device protection
...n entry to reject the features on the transport basis. Transport is not architecture so I send a separate series in which we fail the feature negociation inside virtio_ccw_finalize_features, the virtio_config_ops.finalize_features for S390 CCW transport, when the device do not propose the VIRTIO_F_IOMMU_PLATFORM. This solves the problem of crashing QEMU when this one is not using a CCW device with iommu_platform=on in S390. Regards, Pierre Regards, Pierre Pierre Morel (1): s390: virtio-ccw: PV needs VIRTIO I/O device protection drivers/s390/virtio/virtio_ccw.c | 24 +++++++++++++++++++----- 1 file...
2020 Aug 06
3
[PATCH v1 0/1] s390: virtio-ccw: PV needs VIRTIO I/O device protection
...n entry to reject the features on the transport basis. Transport is not architecture so I send a separate series in which we fail the feature negociation inside virtio_ccw_finalize_features, the virtio_config_ops.finalize_features for S390 CCW transport, when the device do not propose the VIRTIO_F_IOMMU_PLATFORM. This solves the problem of crashing QEMU when this one is not using a CCW device with iommu_platform=on in S390. Regards, Pierre Regards, Pierre Pierre Morel (1): s390: virtio-ccw: PV needs VIRTIO I/O device protection drivers/s390/virtio/virtio_ccw.c | 24 +++++++++++++++++++----- 1 file...
2020 Aug 06
0
[PATCH v2 19/24] vdpa: make sure set_features in invoked for legacy
...dern device? > > > > > > > > > > Thanks > > > > Well hardware vendors are I think interested in supporting legacy > > > > guests. Limiting vdpa to modern only would make it uncompetitive. > > > > > > My understanding is that, IOMMU_PLATFORM is mandatory for hardware vDPA to > > > work. > > Hmm I don't really see why. Assume host maps guest memory properly, > > VM does not have an IOMMU, legacy guest can just work. > > > Yes, guest may not set IOMMU_PLATFORM. > > > > > > Care exp...
2020 Aug 19
0
[PATCH v8 1/2] virtio: let arch validate VIRTIO features
...Cornelia Huck wrote: > On Tue, 18 Aug 2020 16:58:30 +0200 > Pierre Morel <pmorel at linux.ibm.com> wrote: > ... >> +config ARCH_HAS_RESTRICTED_MEMORY_ACCESS >> + bool >> + help >> + This option is selected by any architecture enforcing >> + VIRTIO_F_IOMMU_PLATFORM > > This option is only for a very specific case of "restricted memory > access", namely the kind that requires IOMMU_PLATFORM for virtio > devices. ARCH_HAS_RESTRICTED_VIRTIO_MEMORY_ACCESS? Or is this intended > to cover cases outside of virtio as well? AFAIK we did not...
2020 Jul 17
0
[PATCH vhost next 10/10] vdpa/mlx5: Add VDPA driver for supported mlx5 devices
...s = mlx_to_vritio_features(dev_features); >>> + if (MLX5_CAP_DEV_VDPA_EMULATION(mvdev->mdev, virtio_version_1_0)) >>> + ndev->mvdev.mlx_features |= BIT(VIRTIO_F_VERSION_1); >> >> This is interesting. This suggests !VIRTIO_F_VERSION_1 && >> VIRTIO_F_IOMMU_PLATFORM is valid. But virito spec doesn't allow such >> configuration. > Will fix >> So I think you need either: >> >> 1) Fail vDPA device probe when VERSION_1 is not supported >> 2) clear IOMMU_PLATFORM if VERSION_1 is not negotiated >> >> For 2) I guess it...
2018 Apr 06
2
[RFC] virtio: Use DMA MAP API for devices without an IOMMU
On 04/06/2018 02:48 AM, Benjamin Herrenschmidt wrote: > On Thu, 2018-04-05 at 21:34 +0300, Michael S. Tsirkin wrote: >>> In this specific case, because that would make qemu expect an iommu, >>> and there isn't one. >> >> >> I think that you can set iommu_platform in qemu without an iommu. > > No I mean the platform has one but it's not desirable for it to be used > due to the performance hit. Also the only requirement is to bounce the I/O buffers through SWIOTLB implemented as DMA API which the virtio core understands. There is no need for an...
2018 Apr 06
2
[RFC] virtio: Use DMA MAP API for devices without an IOMMU
On 04/06/2018 02:48 AM, Benjamin Herrenschmidt wrote: > On Thu, 2018-04-05 at 21:34 +0300, Michael S. Tsirkin wrote: >>> In this specific case, because that would make qemu expect an iommu, >>> and there isn't one. >> >> >> I think that you can set iommu_platform in qemu without an iommu. > > No I mean the platform has one but it's not desirable for it to be used > due to the performance hit. Also the only requirement is to bounce the I/O buffers through SWIOTLB implemented as DMA API which the virtio core understands. There is no need for an...
2020 Nov 02
1
[PATCH] vhost/vsock: add IOTLB API support
...a >>>>simple issue: >>>>??? $ qemu -M q35,accel=kvm,kernel-irqchip=split \ >>>>?????????? -drive file=fedora.qcow2,format=qcow2,if=virtio \ >>>>?????????? -device intel-iommu,intremap=on \ >>>>?????????? -device vhost-vsock-pci,guest-cid=3,iommu_platform=on >>> >>> >>>Patch looks good, but a question: >>> >>>It looks to me you don't enable ATS which means vhost won't get >>>any invalidation request or did I miss anything? >>> >> >>You're right, I didn't see...
2018 Apr 05
2
[RFC] virtio: Use DMA MAP API for devices without an IOMMU
...> > > > > I'm confused by this. > > > > static bool vring_use_dma_api(struct virtio_device *vdev) > > { > > if (!virtio_has_iommu_quirk(vdev)) > > return true; > > > > > > Why doesn't setting VIRTIO_F_IOMMU_PLATFORM on the > > hypervisor side sufficient? > > In this specific case, because that would make qemu expect an iommu, > and there isn't one. I think that you can set iommu_platform in qemu without an iommu. > Anshuman, you need to provide more background here. I don't have...
2018 Apr 05
2
[RFC] virtio: Use DMA MAP API for devices without an IOMMU
...> > > > > I'm confused by this. > > > > static bool vring_use_dma_api(struct virtio_device *vdev) > > { > > if (!virtio_has_iommu_quirk(vdev)) > > return true; > > > > > > Why doesn't setting VIRTIO_F_IOMMU_PLATFORM on the > > hypervisor side sufficient? > > In this specific case, because that would make qemu expect an iommu, > and there isn't one. I think that you can set iommu_platform in qemu without an iommu. > Anshuman, you need to provide more background here. I don't have...
2016 Apr 21
1
[PATCH V2 RFC] fixup! virtio: convert to use DMA api
...hether we use the DMA API. > > > > On some systems, including Xen and any system with a physical device > > that speaks virtio behind a physical IOMMU, we must use the DMA API > > for virtio DMA to work at all. > > > > Add a feature bit to detect that: VIRTIO_F_IOMMU_PLATFORM. > > > > If not there, we preserve historic behavior and bypass the DMA > > API unless within Xen guest. This is actually required for > > systems, including SPARC and PPC64, where virtio-pci devices are > > enumerated as though they are behind an IOMMU, but the virti...
2016 Apr 21
1
[PATCH V2 RFC] fixup! virtio: convert to use DMA api
...hether we use the DMA API. > > > > On some systems, including Xen and any system with a physical device > > that speaks virtio behind a physical IOMMU, we must use the DMA API > > for virtio DMA to work at all. > > > > Add a feature bit to detect that: VIRTIO_F_IOMMU_PLATFORM. > > > > If not there, we preserve historic behavior and bypass the DMA > > API unless within Xen guest. This is actually required for > > systems, including SPARC and PPC64, where virtio-pci devices are > > enumerated as though they are behind an IOMMU, but the virti...