Displaying 20 results from an estimated 3000 matches similar to: "[PATCH RFC 0/3] virtio-pci: iommu support"
2016 Aug 30
6
[PATCH v2 0/2] vfio: blacklist legacy virtio devices
Legacy virtio devices always bypassed an IOMMU, so using them with vfio was
never safe. This adds a quirk detecting these and disabling VFIO unless the
noiommu mode is used. At the moment, this only applies to virtio-pci devices.
The patch might make sense on stable as well.
Michael S. Tsirkin (2):
vfio: report group noiommu status
vfio: add virtio pci quirk
2016 Aug 30
6
[PATCH v2 0/2] vfio: blacklist legacy virtio devices
Legacy virtio devices always bypassed an IOMMU, so using them with vfio was
never safe. This adds a quirk detecting these and disabling VFIO unless the
noiommu mode is used. At the moment, this only applies to virtio-pci devices.
The patch might make sense on stable as well.
Michael S. Tsirkin (2):
vfio: report group noiommu status
vfio: add virtio pci quirk
2016 Aug 30
4
[PATCH v2 2/2] vfio: add virtio pci quirk
On Tue, 30 Aug 2016 05:27:17 +0300
"Michael S. Tsirkin" <mst at redhat.com> wrote:
> Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
> to signal they are safe to use with an IOMMU.
>
> Without this bit, exposing the device to userspace is unsafe, so probe
> and fail VFIO initialization unless noiommu is enabled.
>
> Signed-off-by: Michael S.
2016 Aug 30
4
[PATCH v2 2/2] vfio: add virtio pci quirk
On Tue, 30 Aug 2016 05:27:17 +0300
"Michael S. Tsirkin" <mst at redhat.com> wrote:
> Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
> to signal they are safe to use with an IOMMU.
>
> Without this bit, exposing the device to userspace is unsafe, so probe
> and fail VFIO initialization unless noiommu is enabled.
>
> Signed-off-by: Michael S.
2016 Aug 30
2
[PATCH v2 2/2] vfio: add virtio pci quirk
On Mon, 29 Aug 2016 21:52:20 -0600
Alex Williamson <alex.williamson at redhat.com> wrote:
> On Mon, 29 Aug 2016 21:23:25 -0600
> Alex Williamson <alex.williamson at redhat.com> wrote:
>
> > On Tue, 30 Aug 2016 05:27:17 +0300
> > "Michael S. Tsirkin" <mst at redhat.com> wrote:
> >
> > > Modern virtio pci devices can set
2016 Aug 30
2
[PATCH v2 2/2] vfio: add virtio pci quirk
On Mon, 29 Aug 2016 21:52:20 -0600
Alex Williamson <alex.williamson at redhat.com> wrote:
> On Mon, 29 Aug 2016 21:23:25 -0600
> Alex Williamson <alex.williamson at redhat.com> wrote:
>
> > On Tue, 30 Aug 2016 05:27:17 +0300
> > "Michael S. Tsirkin" <mst at redhat.com> wrote:
> >
> > > Modern virtio pci devices can set
2016 Apr 18
1
[PATCH RFC 3/3] vfio: add virtio pci quirk
On Mon, 18 Apr 2016 12:58:28 +0300
"Michael S. Tsirkin" <mst at redhat.com> wrote:
> Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
> to signal they are safe to use with an IOMMU.
>
> Without this bit, exposing the device to userspace is unsafe, so probe
> and fail VFIO initialization unless noiommu is enabled.
>
> Signed-off-by: Michael S.
2016 Apr 18
1
[PATCH RFC 3/3] vfio: add virtio pci quirk
On Mon, 18 Apr 2016 12:58:28 +0300
"Michael S. Tsirkin" <mst at redhat.com> wrote:
> Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
> to signal they are safe to use with an IOMMU.
>
> Without this bit, exposing the device to userspace is unsafe, so probe
> and fail VFIO initialization unless noiommu is enabled.
>
> Signed-off-by: Michael S.
2016 Aug 30
0
[PATCH v2 2/2] vfio: add virtio pci quirk
Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
to signal they are safe to use with an IOMMU.
Without this bit, exposing the device to userspace is unsafe, so probe
and fail VFIO initialization unless noiommu is enabled.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vfio/pci/vfio_pci_private.h | 1 +
drivers/vfio/pci/vfio_pci.c | 14 ++++
2016 Aug 30
0
[PATCH v2 2/2] vfio: add virtio pci quirk
On Mon, Aug 29, 2016 at 10:53:04PM -0600, Alex Williamson wrote:
> On Mon, 29 Aug 2016 21:52:20 -0600
> Alex Williamson <alex.williamson at redhat.com> wrote:
>
> > On Mon, 29 Aug 2016 21:23:25 -0600
> > Alex Williamson <alex.williamson at redhat.com> wrote:
> >
> > > On Tue, 30 Aug 2016 05:27:17 +0300
> > > "Michael S. Tsirkin"
2016 Apr 18
0
[PATCH RFC 3/3] vfio: add virtio pci quirk
Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
to signal they are safe to use with an IOMMU.
Without this bit, exposing the device to userspace is unsafe, so probe
and fail VFIO initialization unless noiommu is enabled.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vfio/pci/vfio_pci_private.h | 1 +
drivers/vfio/pci/vfio_pci.c | 11 +++
2016 Aug 30
0
[PATCH v2 2/2] vfio: add virtio pci quirk
On Mon, 29 Aug 2016 21:23:25 -0600
Alex Williamson <alex.williamson at redhat.com> wrote:
> On Tue, 30 Aug 2016 05:27:17 +0300
> "Michael S. Tsirkin" <mst at redhat.com> wrote:
>
> > Modern virtio pci devices can set VIRTIO_F_IOMMU_PLATFORM
> > to signal they are safe to use with an IOMMU.
> >
> > Without this bit, exposing the device to
2016 Apr 18
0
[PATCH RFC 2/3] vfio: report group noiommu status
When using vfio, callers might want to know whether device is added to a
regular group or an non-iommu group.
Report this status from vfio_add_group_dev.
Signed-off-by: Michael S. Tsirkin <mst at redhat.com>
---
drivers/vfio/pci/vfio_pci.c | 2 +-
drivers/vfio/platform/vfio_platform_common.c | 2 +-
drivers/vfio/vfio.c | 5 ++++-
2017 Jan 22
1
[PATCH v2] vfio error recovery: kernel support
This is a design and an initial patch for kernel side for AER
support in VFIO.
0. What happens now (PCIE AER only)
Fatal errors cause a link reset.
Non fatal errors don't.
All errors stop the VM eventually, but not immediately
because it's detected and reported asynchronously.
Interrupts are forwarded as usual.
Correctable errors are not reported to guest at all.
2017 Jan 22
1
[PATCH v2] vfio error recovery: kernel support
This is a design and an initial patch for kernel side for AER
support in VFIO.
0. What happens now (PCIE AER only)
Fatal errors cause a link reset.
Non fatal errors don't.
All errors stop the VM eventually, but not immediately
because it's detected and reported asynchronously.
Interrupts are forwarded as usual.
Correctable errors are not reported to guest at all.
2016 Aug 30
0
[Qemu-devel] [PATCH v2 0/2] vfio: blacklist legacy virtio devices
On 2016?08?30? 10:27, Michael S. Tsirkin wrote:
> Legacy virtio devices always bypassed an IOMMU, so using them with vfio was
> never safe.
And it actually won't work since GPA is assumed in the device. So I'm
not sure this is must since we should get a IOMMU fault in this case.
> This adds a quirk detecting these and disabling VFIO unless the
> noiommu mode is used. At
2012 Oct 18
1
PCI device not properly reset after VFIO
Hi Alex,
I've been playing around with VFIO and megasas (of course).
What I did now was switching between VFIO and 'normal' operation, ie
emulated access.
megasas is happily running under VFIO, but when I do an emergency
stop like killing the Qemu session the PCI device is not properly reset.
IE when I load 'megaraid_sas' after unbinding the vfio_pci module
the driver
2012 Oct 18
1
PCI device not properly reset after VFIO
Hi Alex,
I've been playing around with VFIO and megasas (of course).
What I did now was switching between VFIO and 'normal' operation, ie
emulated access.
megasas is happily running under VFIO, but when I do an emergency
stop like killing the Qemu session the PCI device is not properly reset.
IE when I load 'megaraid_sas' after unbinding the vfio_pci module
the driver
2019 Sep 26
6
[PATCH] vhost: introduce mdev based hardware backend
This patch introduces a mdev based hardware vhost backend.
This backend is built on top of the same abstraction used
in virtio-mdev and provides a generic vhost interface for
userspace to accelerate the virtio devices in guest.
This backend is implemented as a mdev device driver on top
of the same mdev device ops used in virtio-mdev but using
a different mdev class id, and it will register the
2019 Sep 26
6
[PATCH] vhost: introduce mdev based hardware backend
This patch introduces a mdev based hardware vhost backend.
This backend is built on top of the same abstraction used
in virtio-mdev and provides a generic vhost interface for
userspace to accelerate the virtio devices in guest.
This backend is implemented as a mdev device driver on top
of the same mdev device ops used in virtio-mdev but using
a different mdev class id, and it will register the