search for: pasid

Displaying 20 results from an estimated 68 matches for "pasid".

Did you mean: pasi
2017 Oct 25
2
[RFC] virtio-iommu version 0.5
...versions will extend it. > > >> * Simplify PROBE request by removing the ack part, and flattening RESV > > >> properties. > > >> * Rename "address space" to "domain". The change might seem futile but > > >> allows to introduce PASIDs and other features cleanly in the next > > >> versions. In the same vein, the few remaining "device" occurrences were > > >> replaced by "endpoint", to avoid any confusion with "the device" > > >> referring to the virtio devic...
2017 Oct 24
2
[RFC] virtio-iommu version 0.5
...t; >> future versions will extend it. > >> * Simplify PROBE request by removing the ack part, and flattening RESV > >> properties. > >> * Rename "address space" to "domain". The change might seem futile but > >> allows to introduce PASIDs and other features cleanly in the next > >> versions. In the same vein, the few remaining "device" occurrences were > >> replaced by "endpoint", to avoid any confusion with "the device" > >> referring to the virtio device across the do...
2017 Oct 24
2
[RFC] virtio-iommu version 0.5
...t; >> future versions will extend it. > >> * Simplify PROBE request by removing the ack part, and flattening RESV > >> properties. > >> * Rename "address space" to "domain". The change might seem futile but > >> allows to introduce PASIDs and other features cleanly in the next > >> versions. In the same vein, the few remaining "device" occurrences were > >> replaced by "endpoint", to avoid any confusion with "the device" > >> referring to the virtio device across the do...
2023 Jun 16
1
[RFC PATCHES 00/17] IOMMUFD: Deliver IO page faults to user space
...lt pending. Given that the PCI spec does not indicate a timeout, the guest can wait as long as it wants to complete the fault (and 100ms may even be reasonable on an emulator, who knows how many layers and context switches the fault has to go through). Another outstanding issue was what to do for PASID stop. When the guest device driver stops using a PASID it issues a PASID stop request to the device (a device-specific mechanism). If the device is not using PRI stop markers it waits for pending PRs to complete and we're fine. Otherwise it sends a stop marker which is flushed to the PRI queue,...
2017 Oct 25
0
[RFC] virtio-iommu version 0.5
...s will extend it. >>>>> * Simplify PROBE request by removing the ack part, and flattening RESV >>>>> properties. >>>>> * Rename "address space" to "domain". The change might seem futile but >>>>> allows to introduce PASIDs and other features cleanly in the next >>>>> versions. In the same vein, the few remaining "device" occurrences were >>>>> replaced by "endpoint", to avoid any confusion with "the device" >>>>> referring to the virtio...
2017 Oct 25
1
[RFC] virtio-iommu version 0.5
...t; >>>>> * Simplify PROBE request by removing the ack part, and flattening RESV > >>>>> properties. > >>>>> * Rename "address space" to "domain". The change might seem futile but > >>>>> allows to introduce PASIDs and other features cleanly in the next > >>>>> versions. In the same vein, the few remaining "device" occurrences were > >>>>> replaced by "endpoint", to avoid any confusion with "the device" > >>>>> referrin...
2017 Oct 25
1
[RFC] virtio-iommu version 0.5
...t; >>>>> * Simplify PROBE request by removing the ack part, and flattening RESV > >>>>> properties. > >>>>> * Rename "address space" to "domain". The change might seem futile but > >>>>> allows to introduce PASIDs and other features cleanly in the next > >>>>> versions. In the same vein, the few remaining "device" occurrences were > >>>>> replaced by "endpoint", to avoid any confusion with "the device" > >>>>> referrin...
2017 Oct 24
0
[RFC] virtio-iommu version 0.5
...ults are available but >> future versions will extend it. >> * Simplify PROBE request by removing the ack part, and flattening RESV >> properties. >> * Rename "address space" to "domain". The change might seem futile but >> allows to introduce PASIDs and other features cleanly in the next >> versions. In the same vein, the few remaining "device" occurrences were >> replaced by "endpoint", to avoid any confusion with "the device" >> referring to the virtio device across the document. >&gt...
2018 Apr 19
5
[RFC] vhost: introduce mdev based hardware vhost backend
...e at the device which is also allowed by the IOMMU to poke at kernel memory (needed for kernel driver to work). Yes, maybe if device is not buggy it's all fine, but it's better if we do not have to trust the device otherwise the security picture becomes more murky. I suggested attaching a PASID to (some) queues - see my old post "using PASIDs to enable a safe variant of direct ring access". Then using IOMMU with VFIO to limit access through queue to corrent ranges of memory. -- MST
2018 Apr 19
5
[RFC] vhost: introduce mdev based hardware vhost backend
...e at the device which is also allowed by the IOMMU to poke at kernel memory (needed for kernel driver to work). Yes, maybe if device is not buggy it's all fine, but it's better if we do not have to trust the device otherwise the security picture becomes more murky. I suggested attaching a PASID to (some) queues - see my old post "using PASIDs to enable a safe variant of direct ring access". Then using IOMMU with VFIO to limit access through queue to corrent ranges of memory. -- MST
2017 Oct 24
1
[RFC] virtio-iommu version 0.5
...nly unrecoverable faults are available but > future versions will extend it. > * Simplify PROBE request by removing the ack part, and flattening RESV > properties. > * Rename "address space" to "domain". The change might seem futile but > allows to introduce PASIDs and other features cleanly in the next > versions. In the same vein, the few remaining "device" occurrences were > replaced by "endpoint", to avoid any confusion with "the device" > referring to the virtio device across the document. > * Add implemen...
2017 Oct 23
3
[RFC] virtio-iommu version 0.5
...driver. For the moment only unrecoverable faults are available but future versions will extend it. * Simplify PROBE request by removing the ack part, and flattening RESV properties. * Rename "address space" to "domain". The change might seem futile but allows to introduce PASIDs and other features cleanly in the next versions. In the same vein, the few remaining "device" occurrences were replaced by "endpoint", to avoid any confusion with "the device" referring to the virtio device across the document. * Add implementation notes for RES...
2017 Oct 23
3
[RFC] virtio-iommu version 0.5
...driver. For the moment only unrecoverable faults are available but future versions will extend it. * Simplify PROBE request by removing the ack part, and flattening RESV properties. * Rename "address space" to "domain". The change might seem futile but allows to introduce PASIDs and other features cleanly in the next versions. In the same vein, the few remaining "device" occurrences were replaced by "endpoint", to avoid any confusion with "the device" referring to the virtio device across the document. * Add implementation notes for RES...
2018 Apr 20
1
[RFC] vhost: introduce mdev based hardware vhost backend
...IOMMU > drivers don't support mdev bus. > > > > > Yes, maybe if device is not buggy it's all fine, but it's better if we > > do not have to trust the device otherwise the security picture becomes > > more murky. > > > > I suggested attaching a PASID to (some) queues - see my old post > > "using PASIDs to enable a safe variant of direct ring access". > Ideally we can have a device binding with normal driver in host, meanwhile support to allocate a few queues attaching with PASID on-demand. By vhost mdev transport channel, th...
2020 Nov 02
1
[PATCH] vhost/vsock: add IOTLB API support
...ected translation failure (dev=00:03:00, iova=0x1d40000030c0) qemu-system-x86_64: New fault is not recorded due to compression of faults Guest kernel messages: [ 44.940872] DMAR: DRHD: handling fault status reg 2 [ 44.941989] DMAR: [DMA Read] Request device [00:03.0] PASID ffffffff fault addr ffff88W [ 49.785884] DMAR: DRHD: handling fault status reg 2 [ 49.788874] DMAR: [DMA Read] Request device [00:03.0] PASID ffffffff fault addr ffff88W QEMU: b149dea55c Merge remote-tracking branch 'remotes/cschoenebeck/tags/pull-9p-20201102' i...
2017 Apr 21
1
[RFC 3/3] virtio-iommu: future work
...> > Introducing a probe request is more flexible than advertising those > features in virtio config, because capabilities are dynamic, and depend on > which devices are attached to an address space. Within a single address > space, devices may support different numbers of contexts (PASIDs), and > some may not support recoverable faults. > > (3) Device responds success with all page table formats implemented by the > physical IOMMU in pg_format. 'model' 0 is invalid, so driver can > initialize the array to 0 and deduce from there which entries have &g...
2017 Apr 21
1
[RFC 3/3] virtio-iommu: future work
...> > Introducing a probe request is more flexible than advertising those > features in virtio config, because capabilities are dynamic, and depend on > which devices are attached to an address space. Within a single address > space, devices may support different numbers of contexts (PASIDs), and > some may not support recoverable faults. > > (3) Device responds success with all page table formats implemented by the > physical IOMMU in pg_format. 'model' 0 is invalid, so driver can > initialize the array to 0 and deduce from there which entries have &g...
2018 Apr 20
0
[RFC] vhost: introduce mdev based hardware vhost backend
...t on top of VFIO for sure. So kernel memory were perfectly isolated in this case. > > Yes, maybe if device is not buggy it's all fine, but > it's better if we do not have to trust the device > otherwise the security picture becomes more murky. > > I suggested attaching a PASID to (some) queues - see my old post "using > PASIDs to enable a safe variant of direct ring access". > > Then using IOMMU with VFIO to limit access through queue to corrent > ranges of memory. Well userspace driver could benefit from this too. And we can even go further by us...
2018 Apr 20
0
[RFC] vhost: introduce mdev based hardware vhost backend
...userspace directly is that, currently IOMMU drivers don't support mdev bus. > > Yes, maybe if device is not buggy it's all fine, but > it's better if we do not have to trust the device > otherwise the security picture becomes more murky. > > I suggested attaching a PASID to (some) queues - see my old post "using > PASIDs to enable a safe variant of direct ring access". It's pretty cool. We also have some similar ideas. Cunming will talk more about this. Best regards, Tiwei Bie > > Then using IOMMU with VFIO to limit access through queue t...
2023 Jan 06
8
[PATCH 0/8] Let iommufd charge IOPTE allocations to the memory cgroup
...host1x/cdma.c | 2 +- drivers/infiniband/hw/usnic/usnic_uiom.c | 4 +- drivers/iommu/dma-iommu.c | 11 ++--- drivers/iommu/intel/iommu.c | 36 +++++++++------- drivers/iommu/intel/iommu.h | 2 +- drivers/iommu/intel/pasid.c | 2 +- drivers/iommu/iommu.c | 43 +++++-------------- drivers/iommu/iommufd/pages.c | 6 ++- drivers/iommu/s390-iommu.c | 15 ++++--- drivers/media/platform/qcom/venus/firmware.c | 2 +- drivers/net/ipa/ipa_mem.c...