Displaying 20 results from an estimated 68 matches for "pasid".
Did you mean:
pasi
2017 Oct 25
2
[RFC] virtio-iommu version 0.5
...versions will extend it.
> > >> * Simplify PROBE request by removing the ack part, and flattening RESV
> > >> properties.
> > >> * Rename "address space" to "domain". The change might seem futile but
> > >> allows to introduce PASIDs and other features cleanly in the next
> > >> versions. In the same vein, the few remaining "device" occurrences were
> > >> replaced by "endpoint", to avoid any confusion with "the device"
> > >> referring to the virtio devic...
2017 Oct 24
2
[RFC] virtio-iommu version 0.5
...t; >> future versions will extend it.
> >> * Simplify PROBE request by removing the ack part, and flattening RESV
> >> properties.
> >> * Rename "address space" to "domain". The change might seem futile but
> >> allows to introduce PASIDs and other features cleanly in the next
> >> versions. In the same vein, the few remaining "device" occurrences were
> >> replaced by "endpoint", to avoid any confusion with "the device"
> >> referring to the virtio device across the do...
2017 Oct 24
2
[RFC] virtio-iommu version 0.5
...t; >> future versions will extend it.
> >> * Simplify PROBE request by removing the ack part, and flattening RESV
> >> properties.
> >> * Rename "address space" to "domain". The change might seem futile but
> >> allows to introduce PASIDs and other features cleanly in the next
> >> versions. In the same vein, the few remaining "device" occurrences were
> >> replaced by "endpoint", to avoid any confusion with "the device"
> >> referring to the virtio device across the do...
2023 Jun 16
1
[RFC PATCHES 00/17] IOMMUFD: Deliver IO page faults to user space
...lt pending. Given that the
PCI spec does not indicate a timeout, the guest can wait as long as it
wants to complete the fault (and 100ms may even be reasonable on an
emulator, who knows how many layers and context switches the fault has to
go through).
Another outstanding issue was what to do for PASID stop. When the guest
device driver stops using a PASID it issues a PASID stop request to the
device (a device-specific mechanism). If the device is not using PRI stop
markers it waits for pending PRs to complete and we're fine. Otherwise it
sends a stop marker which is flushed to the PRI queue,...
2017 Oct 25
0
[RFC] virtio-iommu version 0.5
...s will extend it.
>>>>> * Simplify PROBE request by removing the ack part, and flattening RESV
>>>>> properties.
>>>>> * Rename "address space" to "domain". The change might seem futile but
>>>>> allows to introduce PASIDs and other features cleanly in the next
>>>>> versions. In the same vein, the few remaining "device" occurrences were
>>>>> replaced by "endpoint", to avoid any confusion with "the device"
>>>>> referring to the virtio...
2017 Oct 25
1
[RFC] virtio-iommu version 0.5
...t; >>>>> * Simplify PROBE request by removing the ack part, and flattening RESV
> >>>>> properties.
> >>>>> * Rename "address space" to "domain". The change might seem futile but
> >>>>> allows to introduce PASIDs and other features cleanly in the next
> >>>>> versions. In the same vein, the few remaining "device" occurrences were
> >>>>> replaced by "endpoint", to avoid any confusion with "the device"
> >>>>> referrin...
2017 Oct 25
1
[RFC] virtio-iommu version 0.5
...t; >>>>> * Simplify PROBE request by removing the ack part, and flattening RESV
> >>>>> properties.
> >>>>> * Rename "address space" to "domain". The change might seem futile but
> >>>>> allows to introduce PASIDs and other features cleanly in the next
> >>>>> versions. In the same vein, the few remaining "device" occurrences were
> >>>>> replaced by "endpoint", to avoid any confusion with "the device"
> >>>>> referrin...
2017 Oct 24
0
[RFC] virtio-iommu version 0.5
...ults are available but
>> future versions will extend it.
>> * Simplify PROBE request by removing the ack part, and flattening RESV
>> properties.
>> * Rename "address space" to "domain". The change might seem futile but
>> allows to introduce PASIDs and other features cleanly in the next
>> versions. In the same vein, the few remaining "device" occurrences were
>> replaced by "endpoint", to avoid any confusion with "the device"
>> referring to the virtio device across the document.
>>...
2018 Apr 19
5
[RFC] vhost: introduce mdev based hardware vhost backend
...e at the
device which is also allowed by the IOMMU to poke at
kernel memory (needed for kernel driver to work).
Yes, maybe if device is not buggy it's all fine, but
it's better if we do not have to trust the device
otherwise the security picture becomes more murky.
I suggested attaching a PASID to (some) queues - see my old post "using
PASIDs to enable a safe variant of direct ring access".
Then using IOMMU with VFIO to limit access through queue to corrent
ranges of memory.
--
MST
2018 Apr 19
5
[RFC] vhost: introduce mdev based hardware vhost backend
...e at the
device which is also allowed by the IOMMU to poke at
kernel memory (needed for kernel driver to work).
Yes, maybe if device is not buggy it's all fine, but
it's better if we do not have to trust the device
otherwise the security picture becomes more murky.
I suggested attaching a PASID to (some) queues - see my old post "using
PASIDs to enable a safe variant of direct ring access".
Then using IOMMU with VFIO to limit access through queue to corrent
ranges of memory.
--
MST
2017 Oct 24
1
[RFC] virtio-iommu version 0.5
...nly unrecoverable faults are available but
> future versions will extend it.
> * Simplify PROBE request by removing the ack part, and flattening RESV
> properties.
> * Rename "address space" to "domain". The change might seem futile but
> allows to introduce PASIDs and other features cleanly in the next
> versions. In the same vein, the few remaining "device" occurrences were
> replaced by "endpoint", to avoid any confusion with "the device"
> referring to the virtio device across the document.
> * Add implemen...
2017 Oct 23
3
[RFC] virtio-iommu version 0.5
...driver. For the moment only unrecoverable faults are available but
future versions will extend it.
* Simplify PROBE request by removing the ack part, and flattening RESV
properties.
* Rename "address space" to "domain". The change might seem futile but
allows to introduce PASIDs and other features cleanly in the next
versions. In the same vein, the few remaining "device" occurrences were
replaced by "endpoint", to avoid any confusion with "the device"
referring to the virtio device across the document.
* Add implementation notes for RES...
2017 Oct 23
3
[RFC] virtio-iommu version 0.5
...driver. For the moment only unrecoverable faults are available but
future versions will extend it.
* Simplify PROBE request by removing the ack part, and flattening RESV
properties.
* Rename "address space" to "domain". The change might seem futile but
allows to introduce PASIDs and other features cleanly in the next
versions. In the same vein, the few remaining "device" occurrences were
replaced by "endpoint", to avoid any confusion with "the device"
referring to the virtio device across the document.
* Add implementation notes for RES...
2018 Apr 20
1
[RFC] vhost: introduce mdev based hardware vhost backend
...IOMMU
> drivers don't support mdev bus.
>
> >
> > Yes, maybe if device is not buggy it's all fine, but it's better if we
> > do not have to trust the device otherwise the security picture becomes
> > more murky.
> >
> > I suggested attaching a PASID to (some) queues - see my old post
> > "using PASIDs to enable a safe variant of direct ring access".
>
Ideally we can have a device binding with normal driver in host, meanwhile support to allocate a few queues attaching with PASID on-demand. By vhost mdev transport channel, th...
2020 Nov 02
1
[PATCH] vhost/vsock: add IOTLB API support
...ected translation
failure (dev=00:03:00, iova=0x1d40000030c0)
qemu-system-x86_64: New fault is not recorded due to compression of
faults
Guest kernel messages:
[ 44.940872] DMAR: DRHD: handling fault status reg 2
[ 44.941989] DMAR: [DMA Read] Request device [00:03.0] PASID
ffffffff fault addr ffff88W
[ 49.785884] DMAR: DRHD: handling fault status reg 2
[ 49.788874] DMAR: [DMA Read] Request device [00:03.0] PASID
ffffffff fault addr ffff88W
QEMU: b149dea55c Merge remote-tracking branch
'remotes/cschoenebeck/tags/pull-9p-20201102' i...
2017 Apr 21
1
[RFC 3/3] virtio-iommu: future work
...>
> Introducing a probe request is more flexible than advertising those
> features in virtio config, because capabilities are dynamic, and depend on
> which devices are attached to an address space. Within a single address
> space, devices may support different numbers of contexts (PASIDs), and
> some may not support recoverable faults.
>
> (3) Device responds success with all page table formats implemented by the
> physical IOMMU in pg_format. 'model' 0 is invalid, so driver can
> initialize the array to 0 and deduce from there which entries have
&g...
2017 Apr 21
1
[RFC 3/3] virtio-iommu: future work
...>
> Introducing a probe request is more flexible than advertising those
> features in virtio config, because capabilities are dynamic, and depend on
> which devices are attached to an address space. Within a single address
> space, devices may support different numbers of contexts (PASIDs), and
> some may not support recoverable faults.
>
> (3) Device responds success with all page table formats implemented by the
> physical IOMMU in pg_format. 'model' 0 is invalid, so driver can
> initialize the array to 0 and deduce from there which entries have
&g...
2018 Apr 20
0
[RFC] vhost: introduce mdev based hardware vhost backend
...t on top of VFIO
for sure. So kernel memory were perfectly isolated in this case.
>
> Yes, maybe if device is not buggy it's all fine, but
> it's better if we do not have to trust the device
> otherwise the security picture becomes more murky.
>
> I suggested attaching a PASID to (some) queues - see my old post "using
> PASIDs to enable a safe variant of direct ring access".
>
> Then using IOMMU with VFIO to limit access through queue to corrent
> ranges of memory.
Well userspace driver could benefit from this too. And we can even go
further by us...
2018 Apr 20
0
[RFC] vhost: introduce mdev based hardware vhost backend
...userspace directly is that, currently IOMMU
drivers don't support mdev bus.
>
> Yes, maybe if device is not buggy it's all fine, but
> it's better if we do not have to trust the device
> otherwise the security picture becomes more murky.
>
> I suggested attaching a PASID to (some) queues - see my old post "using
> PASIDs to enable a safe variant of direct ring access".
It's pretty cool. We also have some similar ideas.
Cunming will talk more about this.
Best regards,
Tiwei Bie
>
> Then using IOMMU with VFIO to limit access through queue t...
2023 Jan 06
8
[PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
...host1x/cdma.c | 2 +-
drivers/infiniband/hw/usnic/usnic_uiom.c | 4 +-
drivers/iommu/dma-iommu.c | 11 ++---
drivers/iommu/intel/iommu.c | 36 +++++++++-------
drivers/iommu/intel/iommu.h | 2 +-
drivers/iommu/intel/pasid.c | 2 +-
drivers/iommu/iommu.c | 43 +++++--------------
drivers/iommu/iommufd/pages.c | 6 ++-
drivers/iommu/s390-iommu.c | 15 ++++---
drivers/media/platform/qcom/venus/firmware.c | 2 +-
drivers/net/ipa/ipa_mem.c...