Displaying 15 results from an estimated 15 matches for "protvirt".
Did you mean:
previrt
2020 Jun 10
0
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On Wed, 10 Jun 2020 15:11:51 +0200
Pierre Morel <pmorel at linux.ibm.com> wrote:
> Protected Virtualisation protects the memory of the guest and
> do not allow a the host to access all of its memory.
>
> Let's refuse a VIRTIO device which does not use IOMMU
> protected access.
>
> Signed-off-by: Pierre Morel <pmorel at linux.ibm.com>
> ---
>
2020 Jun 10
0
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On Wed, 10 Jun 2020 16:37:55 +0200
Pierre Morel <pmorel at linux.ibm.com> wrote:
> On 2020-06-10 15:24, Cornelia Huck wrote:
> > On Wed, 10 Jun 2020 15:11:51 +0200
> > Pierre Morel <pmorel at linux.ibm.com> wrote:
> >
> >> Protected Virtualisation protects the memory of the guest and
> >> do not allow a the host to access all of its memory.
2020 Jun 11
0
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020/6/10 ??9:11, Pierre Morel wrote:
> Protected Virtualisation protects the memory of the guest and
> do not allow a the host to access all of its memory.
>
> Let's refuse a VIRTIO device which does not use IOMMU
> protected access.
>
> Signed-off-by: Pierre Morel <pmorel at linux.ibm.com>
> ---
> drivers/s390/virtio/virtio_ccw.c | 5 +++++
> 1 file
2020 Jun 12
0
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020-06-12 15:45, Mauricio Tavares wrote:
> On Wed, Jun 10, 2020 at 12:32 PM Pierre Morel <pmorel at linux.ibm.com> wrote:
>>
>> Protected Virtualisation protects the memory of the guest and
>> do not allow a the host to access all of its memory.
>>
>> Let's refuse a VIRTIO device which does not use IOMMU
>> protected access.
>>
>
2020 Jun 15
0
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On Mon, 15 Jun 2020 11:01:55 +0800
Jason Wang <jasowang at redhat.com> wrote:
> > hum, in between I found another way which seems to me much better:
> >
> > We already have the force_dma_unencrypted() function available which
> > AFAIU is what we want for encrypted memory protection and is already
> > used by power and x86 SEV/SME in a way that seems AFAIU
2020 Jun 12
0
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020-06-12 11:21, Pierre Morel wrote:
>
>
> On 2020-06-11 05:10, Jason Wang wrote:
>>
>> On 2020/6/10 ??9:11, Pierre Morel wrote:
>>> Protected Virtualisation protects the memory of the guest and
>>> do not allow a the host to access all of its memory.
>>>
>>> Let's refuse a VIRTIO device which does not use IOMMU
>>>
2020 Jun 10
2
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020-06-10 15:24, Cornelia Huck wrote:
> On Wed, 10 Jun 2020 15:11:51 +0200
> Pierre Morel <pmorel at linux.ibm.com> wrote:
>
>> Protected Virtualisation protects the memory of the guest and
>> do not allow a the host to access all of its memory.
>>
>> Let's refuse a VIRTIO device which does not use IOMMU
>> protected access.
>>
>>
2020 Jun 10
2
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020-06-10 15:24, Cornelia Huck wrote:
> On Wed, 10 Jun 2020 15:11:51 +0200
> Pierre Morel <pmorel at linux.ibm.com> wrote:
>
>> Protected Virtualisation protects the memory of the guest and
>> do not allow a the host to access all of its memory.
>>
>> Let's refuse a VIRTIO device which does not use IOMMU
>> protected access.
>>
>>
2020 Jun 15
3
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020/6/12 ??7:38, Pierre Morel wrote:
>
>
> On 2020-06-12 11:21, Pierre Morel wrote:
>>
>>
>> On 2020-06-11 05:10, Jason Wang wrote:
>>>
>>> On 2020/6/10 ??9:11, Pierre Morel wrote:
>>>> Protected Virtualisation protects the memory of the guest and
>>>> do not allow a the host to access all of its memory.
>>>>
2020 Jun 15
3
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020/6/12 ??7:38, Pierre Morel wrote:
>
>
> On 2020-06-12 11:21, Pierre Morel wrote:
>>
>>
>> On 2020-06-11 05:10, Jason Wang wrote:
>>>
>>> On 2020/6/10 ??9:11, Pierre Morel wrote:
>>>> Protected Virtualisation protects the memory of the guest and
>>>> do not allow a the host to access all of its memory.
>>>>
2020 Jun 12
2
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020-06-11 05:10, Jason Wang wrote:
>
> On 2020/6/10 ??9:11, Pierre Morel wrote:
>> Protected Virtualisation protects the memory of the guest and
>> do not allow a the host to access all of its memory.
>>
>> Let's refuse a VIRTIO device which does not use IOMMU
>> protected access.
>>
>> Signed-off-by: Pierre Morel <pmorel at
2020 Jun 12
2
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
On 2020-06-11 05:10, Jason Wang wrote:
>
> On 2020/6/10 ??9:11, Pierre Morel wrote:
>> Protected Virtualisation protects the memory of the guest and
>> do not allow a the host to access all of its memory.
>>
>> Let's refuse a VIRTIO device which does not use IOMMU
>> protected access.
>>
>> Signed-off-by: Pierre Morel <pmorel at
2020 Jun 10
5
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
Protected Virtualisation protects the memory of the guest and
do not allow a the host to access all of its memory.
Let's refuse a VIRTIO device which does not use IOMMU
protected access.
Signed-off-by: Pierre Morel <pmorel at linux.ibm.com>
---
drivers/s390/virtio/virtio_ccw.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/drivers/s390/virtio/virtio_ccw.c
2020 Jun 10
5
[PATCH] s390: protvirt: virtio: Refuse device without IOMMU
Protected Virtualisation protects the memory of the guest and
do not allow a the host to access all of its memory.
Let's refuse a VIRTIO device which does not use IOMMU
protected access.
Signed-off-by: Pierre Morel <pmorel at linux.ibm.com>
---
drivers/s390/virtio/virtio_ccw.c | 5 +++++
1 file changed, 5 insertions(+)
diff --git a/drivers/s390/virtio/virtio_ccw.c
2019 Apr 16
0
[RFC PATCH 00/12] s390: virtio: support protected virtualization
...aware. Unfortunately we don't have a decision yet about which parts
> of the protected virtualization architecture are going to be PoP
> material.
Oh, okay.
>
> You can get some more context immediately by having a look at Martin's
> features branch and looking at the s390/protvirt and s390/uv patches.
As I don't have time to dig through random branches to
discover/reverse-engineer the obvious, I won't be reviewing this patch
series. But as I am not an I/O expert, this might not be bad at all :)
Maybe other people can help.
>
> I will try to provide more ba...