search for: vsmmu

Displaying 20 results from an estimated 20 matches for "vsmmu".

Did you mean: smmu
2018 Nov 27
2
[PATCH v5 5/7] iommu: Add virtio-iommu driver
On Tue, Nov 27, 2018 at 05:55:20PM +0000, Jean-Philippe Brucker wrote: > On 23/11/2018 21:56, Michael S. Tsirkin wrote: > >> +config VIRTIO_IOMMU > >> + bool "Virtio IOMMU driver" > >> + depends on VIRTIO=y > >> + select IOMMU_API > >> + select INTERVAL_TREE > >> + select ARM_DMA_USE_IOMMU if ARM > >> + help > >>
2018 Dec 12
2
[virtio-dev] Re: [PATCH v5 5/7] iommu: Add virtio-iommu driver
...;s reasonably portable. > > If you want to go that way down the road, you should avoid > > virtio iommu, instead emulate and share code with the ARM SMMU (probably > > with a different vendor id so you can implement the > > report on map for devices without PRI). > > vSMMU has to stay in userspace though. The main reason we're proposing > virtio-iommu is that emulating every possible vIOMMU model in the kernel > would be unmaintainable. With virtio-iommu we can process the fast path > in the host kernel, through vhost-iommu, and do the heavy lifting in &...
2018 Dec 07
0
[virtio-dev] Re: [PATCH v5 5/7] iommu: Add virtio-iommu driver
...n and fault reporting descriptors are fairly generic. > If you want to go that way down the road, you should avoid > virtio iommu, instead emulate and share code with the ARM SMMU (probably > with a different vendor id so you can implement the > report on map for devices without PRI). vSMMU has to stay in userspace though. The main reason we're proposing virtio-iommu is that emulating every possible vIOMMU model in the kernel would be unmaintainable. With virtio-iommu we can process the fast path in the host kernel, through vhost-iommu, and do the heavy lifting in userspace. As sa...
2018 Dec 13
1
[virtio-dev] Re: [PATCH v5 5/7] iommu: Add virtio-iommu driver
...f you want to go that way down the road, you should avoid >>>> virtio iommu, instead emulate and share code with the ARM SMMU (probably >>>> with a different vendor id so you can implement the >>>> report on map for devices without PRI). >>> >>> vSMMU has to stay in userspace though. The main reason we're proposing >>> virtio-iommu is that emulating every possible vIOMMU model in the kernel >>> would be unmaintainable. With virtio-iommu we can process the fast path >>> in the host kernel, through vhost-iommu, and d...
2018 Dec 12
0
[virtio-dev] Re: [PATCH v5 5/7] iommu: Add virtio-iommu driver
...> >>> If you want to go that way down the road, you should avoid >>> virtio iommu, instead emulate and share code with the ARM SMMU (probably >>> with a different vendor id so you can implement the >>> report on map for devices without PRI). >> >> vSMMU has to stay in userspace though. The main reason we're proposing >> virtio-iommu is that emulating every possible vIOMMU model in the kernel >> would be unmaintainable. With virtio-iommu we can process the fast path >> in the host kernel, through vhost-iommu, and do the heavy...
2017 Sep 06
2
[RFC] virtio-iommu version 0.4
...bling Intel RMRR or AMD IVMD on ARM platforms. I do think ARM platforms could need MEM_T_IDENTITY for requesting the guest to map MSI windows when page-table handover is in use (MSI addresses are translated by the physical SMMU, so a IOVA->GPA mapping must be installed by the guest). But since a vSMMU would need a solution as well, I think I'll try to implement something more generic. > 2.6.8.2.3 Device Requirements: Property RESV_MEM > > --citation start-- > If an endpoint is attached to an address space, the device SHOULD leave > any access targeting one of its VIRTIO_IOM...
2017 Sep 06
2
[RFC] virtio-iommu version 0.4
...bling Intel RMRR or AMD IVMD on ARM platforms. I do think ARM platforms could need MEM_T_IDENTITY for requesting the guest to map MSI windows when page-table handover is in use (MSI addresses are translated by the physical SMMU, so a IOVA->GPA mapping must be installed by the guest). But since a vSMMU would need a solution as well, I think I'll try to implement something more generic. > 2.6.8.2.3 Device Requirements: Property RESV_MEM > > --citation start-- > If an endpoint is attached to an address space, the device SHOULD leave > any access targeting one of its VIRTIO_IOM...
2017 Oct 24
2
[RFC] virtio-iommu version 0.5
...lt for SMMU. Luckily > I'm still working on adding PASID code for SMMUv3, so extracting it out of > the driver isn't a big overhead. The good thing about this solution is > that it reuses any specification work done for VFIO (and vice versa) and > any host driver change made for vSMMU/VT-d emulations. > > Thanks, > Jean -- Linu cherian
2017 Oct 24
2
[RFC] virtio-iommu version 0.5
...lt for SMMU. Luckily > I'm still working on adding PASID code for SMMUv3, so extracting it out of > the driver isn't a big overhead. The good thing about this solution is > that it reuses any specification work done for VFIO (and vice versa) and > any host driver change made for vSMMU/VT-d emulations. > > Thanks, > Jean -- Linu cherian
2017 Oct 25
2
[RFC] virtio-iommu version 0.5
...> > I'm still working on adding PASID code for SMMUv3, so extracting it out of > > the driver isn't a big overhead. The good thing about this solution is > > that it reuses any specification work done for VFIO (and vice versa) and > > any host driver change made for vSMMU/VT-d emulations. > > > > Thanks, > > Jean > > -- > Linu cherian -- Linu cherian
2017 Oct 24
0
[RFC] virtio-iommu version 0.5
...ry, which is difficult for SMMU. Luckily I'm still working on adding PASID code for SMMUv3, so extracting it out of the driver isn't a big overhead. The good thing about this solution is that it reuses any specification work done for VFIO (and vice versa) and any host driver change made for vSMMU/VT-d emulations. Thanks, Jean
2017 Oct 25
0
[RFC] virtio-iommu version 0.5
...; I'm still working on adding PASID code for SMMUv3, so extracting it out of >>> the driver isn't a big overhead. The good thing about this solution is >>> that it reuses any specification work done for VFIO (and vice versa) and >>> any host driver change made for vSMMU/VT-d emulations. >>> >>> Thanks, >>> Jean >> >> -- >> Linu cherian >
2017 Sep 21
0
[RFC] virtio-iommu version 0.4
...VMD on ARM platforms. I do think ARM platforms could need > MEM_T_IDENTITY > for requesting the guest to map MSI windows when page-table handover is > in > use (MSI addresses are translated by the physical SMMU, so a IOVA->GPA > mapping must be installed by the guest). But since a vSMMU would need a > solution as well, I think I'll try to implement something more generic. curious do you need identity mapping full IOVA->GPA->HPA translation, or just in GPA->HPA stage sufficient for above MSI scenario? > > > 2.6.8.2.3 Device Requirements: Property RESV_M...
2017 Oct 24
1
[RFC] virtio-iommu version 0.5
Hi Jean, On Mon Oct 23, 2017 at 10:32:41AM +0100, Jean-Philippe Brucker wrote: > This is version 0.5 of the virtio-iommu specification, the paravirtualized > IOMMU. This version addresses feedback from v0.4 and adds an event virtqueue. > Please find the specification, LaTeX sources and pdf, at: > git://linux-arm.org/virtio-iommu.git viommu/v0.5 >
2017 Oct 25
1
[RFC] virtio-iommu version 0.5
...working on adding PASID code for SMMUv3, so extracting it out of > >>> the driver isn't a big overhead. The good thing about this solution is > >>> that it reuses any specification work done for VFIO (and vice versa) and > >>> any host driver change made for vSMMU/VT-d emulations. > >>> > >>> Thanks, > >>> Jean > >> > >> -- > >> Linu cherian > > -- Linu cherian
2017 Oct 25
1
[RFC] virtio-iommu version 0.5
...working on adding PASID code for SMMUv3, so extracting it out of > >>> the driver isn't a big overhead. The good thing about this solution is > >>> that it reuses any specification work done for VFIO (and vice versa) and > >>> any host driver change made for vSMMU/VT-d emulations. > >>> > >>> Thanks, > >>> Jean > >> > >> -- > >> Linu cherian > > -- Linu cherian
2017 Oct 23
3
[RFC] virtio-iommu version 0.5
This is version 0.5 of the virtio-iommu specification, the paravirtualized IOMMU. This version addresses feedback from v0.4 and adds an event virtqueue. Please find the specification, LaTeX sources and pdf, at: git://linux-arm.org/virtio-iommu.git viommu/v0.5 http://linux-arm.org/git?p=virtio-iommu.git;a=blob;f=dist/v0.5/virtio-iommu-v0.5.pdf A detailed changelog since v0.4 follows. You can find
2017 Oct 23
3
[RFC] virtio-iommu version 0.5
This is version 0.5 of the virtio-iommu specification, the paravirtualized IOMMU. This version addresses feedback from v0.4 and adds an event virtqueue. Please find the specification, LaTeX sources and pdf, at: git://linux-arm.org/virtio-iommu.git viommu/v0.5 http://linux-arm.org/git?p=virtio-iommu.git;a=blob;f=dist/v0.5/virtio-iommu-v0.5.pdf A detailed changelog since v0.4 follows. You can find
2017 Apr 07
34
[RFC 0/3] virtio-iommu: a paravirtualized IOMMU
This is the initial proposal for a paravirtualized IOMMU device using virtio transport. It contains a description of the device, a Linux driver, and a toy implementation in kvmtool. With this prototype, you can translate DMA to guest memory from emulated (virtio), or passed-through (VFIO) devices. In its simplest form, implemented here, the device handles map/unmap requests from the guest. Future
2017 Apr 07
34
[RFC 0/3] virtio-iommu: a paravirtualized IOMMU
This is the initial proposal for a paravirtualized IOMMU device using virtio transport. It contains a description of the device, a Linux driver, and a toy implementation in kvmtool. With this prototype, you can translate DMA to guest memory from emulated (virtio), or passed-through (VFIO) devices. In its simplest form, implemented here, the device handles map/unmap requests from the guest. Future