From: Will Deacon <will.deacon-5wv7dgnIgG8@public.gmane.org>
To: "Leizhen (ThunderTown)"
<thunder.leizhen-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>
Cc: linux-kernel
<linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>,
LinuxArm <linuxarm-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>,
iommu
<iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org>,
Robin Murphy <robin.murphy-5wv7dgnIgG8@public.gmane.org>,
linux-arm-kernel
<linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org>
Subject: Re: [PATCH v3 0/6] add non-strict mode support for arm-smmu-v3
Date: Fri, 27 Jul 2018 10:37:58 +0100 [thread overview]
Message-ID: <20180727093758.GL28088@arm.com> (raw)
In-Reply-To: <5B5A8857.9040907-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>
On Fri, Jul 27, 2018 at 10:49:59AM +0800, Leizhen (ThunderTown) wrote:
> On 2018/7/26 22:16, Robin Murphy wrote:
> > On 2018-07-26 4:44 AM, Leizhen (ThunderTown) wrote:
> >> Passthrough is not enough to support VFIO, and virtualization need
> >> the later.
> >
> > Huh? The whole point of passthrough mode is that the IOMMU can still be
> > used for VFIO, but without imposing the overhead of dynamic mapping on
> > host DMA.
>
> I said that from my experience. Userspace do not known the PA, so I think
> the user can not fill dma_map.iova correctly.
>
> /* Allocate some space and setup a DMA mapping */
> dma_map.vaddr = (__u64)mmap(0, 0x1000, PROT_READ | PROT_WRITE,
> MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
> dma_map.size = 0x1000;
> dma_map.iova = 0x2f00000000UL; /* user specified */
> dma_map.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
>
> ioctl(container, VFIO_IOMMU_MAP_DMA, &dma_map);
Hmm, I'm pretty sure that's not the case. When passthrough is configured
via iommu.passthrough, it only applies to the default domain and therefore
won't affect the unmanaged domain that VFIO manages explicitly. So VFIO
will continue to use translation and userspace can't pass whatever it likes
for the iova.
Will
WARNING: multiple messages have this Message-ID (diff)
From: will.deacon@arm.com (Will Deacon)
To: linux-arm-kernel@lists.infradead.org
Subject: [PATCH v3 0/6] add non-strict mode support for arm-smmu-v3
Date: Fri, 27 Jul 2018 10:37:58 +0100 [thread overview]
Message-ID: <20180727093758.GL28088@arm.com> (raw)
In-Reply-To: <5B5A8857.9040907@huawei.com>
On Fri, Jul 27, 2018 at 10:49:59AM +0800, Leizhen (ThunderTown) wrote:
> On 2018/7/26 22:16, Robin Murphy wrote:
> > On 2018-07-26 4:44 AM, Leizhen (ThunderTown) wrote:
> >> Passthrough is not enough to support VFIO, and virtualization need
> >> the later.
> >
> > Huh? The whole point of passthrough mode is that the IOMMU can still be
> > used for VFIO, but without imposing the overhead of dynamic mapping on
> > host DMA.
>
> I said that from my experience. Userspace do not known the PA, so I think
> the user can not fill dma_map.iova correctly.
>
> /* Allocate some space and setup a DMA mapping */
> dma_map.vaddr = (__u64)mmap(0, 0x1000, PROT_READ | PROT_WRITE,
> MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
> dma_map.size = 0x1000;
> dma_map.iova = 0x2f00000000UL; /* user specified */
> dma_map.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
>
> ioctl(container, VFIO_IOMMU_MAP_DMA, &dma_map);
Hmm, I'm pretty sure that's not the case. When passthrough is configured
via iommu.passthrough, it only applies to the default domain and therefore
won't affect the unmanaged domain that VFIO manages explicitly. So VFIO
will continue to use translation and userspace can't pass whatever it likes
for the iova.
Will
WARNING: multiple messages have this Message-ID (diff)
From: Will Deacon <will.deacon@arm.com>
To: "Leizhen (ThunderTown)" <thunder.leizhen@huawei.com>
Cc: Robin Murphy <robin.murphy@arm.com>,
Jean-Philippe Brucker <jean-philippe.brucker@arm.com>,
Joerg Roedel <joro@8bytes.org>,
linux-arm-kernel <linux-arm-kernel@lists.infradead.org>,
iommu <iommu@lists.linux-foundation.org>,
linux-kernel <linux-kernel@vger.kernel.org>,
LinuxArm <linuxarm@huawei.com>
Subject: Re: [PATCH v3 0/6] add non-strict mode support for arm-smmu-v3
Date: Fri, 27 Jul 2018 10:37:58 +0100 [thread overview]
Message-ID: <20180727093758.GL28088@arm.com> (raw)
In-Reply-To: <5B5A8857.9040907@huawei.com>
On Fri, Jul 27, 2018 at 10:49:59AM +0800, Leizhen (ThunderTown) wrote:
> On 2018/7/26 22:16, Robin Murphy wrote:
> > On 2018-07-26 4:44 AM, Leizhen (ThunderTown) wrote:
> >> Passthrough is not enough to support VFIO, and virtualization need
> >> the later.
> >
> > Huh? The whole point of passthrough mode is that the IOMMU can still be
> > used for VFIO, but without imposing the overhead of dynamic mapping on
> > host DMA.
>
> I said that from my experience. Userspace do not known the PA, so I think
> the user can not fill dma_map.iova correctly.
>
> /* Allocate some space and setup a DMA mapping */
> dma_map.vaddr = (__u64)mmap(0, 0x1000, PROT_READ | PROT_WRITE,
> MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
> dma_map.size = 0x1000;
> dma_map.iova = 0x2f00000000UL; /* user specified */
> dma_map.flags = VFIO_DMA_MAP_FLAG_READ | VFIO_DMA_MAP_FLAG_WRITE;
>
> ioctl(container, VFIO_IOMMU_MAP_DMA, &dma_map);
Hmm, I'm pretty sure that's not the case. When passthrough is configured
via iommu.passthrough, it only applies to the default domain and therefore
won't affect the unmanaged domain that VFIO manages explicitly. So VFIO
will continue to use translation and userspace can't pass whatever it likes
for the iova.
Will
next prev parent reply other threads:[~2018-07-27 9:37 UTC|newest]
Thread overview: 65+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-07-12 6:18 [PATCH v3 0/6] add non-strict mode support for arm-smmu-v3 Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-12 6:18 ` [PATCH v3 1/6] iommu/arm-smmu-v3: fix the implementation of flush_iotlb_all hook Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-12 6:18 ` [PATCH v3 2/6] iommu/dma: add support for non-strict mode Zhen Lei
2018-07-12 6:18 ` Zhen Lei
[not found] ` <1531376312-2192-3-git-send-email-thunder.leizhen-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>
2018-07-24 22:01 ` Robin Murphy
2018-07-24 22:01 ` Robin Murphy
2018-07-24 22:01 ` Robin Murphy
[not found] ` <4a668c7c-bce6-eef0-e11d-319333c60fcb-5wv7dgnIgG8@public.gmane.org>
2018-07-26 4:15 ` Leizhen (ThunderTown)
2018-07-26 4:15 ` Leizhen (ThunderTown)
2018-07-26 4:15 ` Leizhen (ThunderTown)
[not found] ` <1531376312-2192-1-git-send-email-thunder.leizhen-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>
2018-07-12 6:18 ` [PATCH v3 3/6] iommu/amd: use default branch to deal with all non-supported capabilities Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-12 6:18 ` [PATCH v3 4/6] iommu/io-pgtable-arm: add support for non-strict mode Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-24 22:25 ` Robin Murphy
2018-07-24 22:25 ` Robin Murphy
2018-07-26 7:20 ` Leizhen (ThunderTown)
2018-07-26 7:20 ` Leizhen (ThunderTown)
2018-07-26 14:35 ` Robin Murphy
2018-07-26 14:35 ` Robin Murphy
2018-08-06 1:32 ` Yang, Shunyong
2018-08-06 1:32 ` Yang, Shunyong
2018-08-06 1:32 ` Yang, Shunyong
[not found] ` <1d24541340334954969c58980ef85444-lZSh27GicDvRFhMSnsQfeMEiO7E3kugT0e7PPNI6Mm0@public.gmane.org>
2018-08-14 8:33 ` Leizhen (ThunderTown)
2018-08-14 8:33 ` Leizhen (ThunderTown)
2018-08-14 8:33 ` Leizhen (ThunderTown)
[not found] ` <5B7293E5.7040702-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>
2018-08-14 8:35 ` Will Deacon
2018-08-14 8:35 ` Will Deacon
2018-08-14 8:35 ` Will Deacon
2018-08-14 10:02 ` Robin Murphy
2018-08-14 10:02 ` Robin Murphy
[not found] ` <feabf4a3-db1e-a22b-daab-fad831b473f9-5wv7dgnIgG8@public.gmane.org>
2018-08-15 1:43 ` Yang, Shunyong
2018-08-15 1:43 ` Yang, Shunyong
2018-08-15 1:43 ` Yang, Shunyong
[not found] ` <7a2dedda98aa9e677eb7f85b6b55e34e0128d2d9.camel-PT9Dzx9SjPiXmMXjJBpWqg@public.gmane.org>
2018-08-15 7:33 ` Will Deacon
2018-08-15 7:33 ` Will Deacon
2018-08-15 7:33 ` Will Deacon
2018-08-15 7:35 ` Will Deacon
2018-08-15 7:35 ` Will Deacon
2018-08-16 0:43 ` Yang, Shunyong
2018-08-16 0:43 ` Yang, Shunyong
2018-08-16 0:43 ` Yang, Shunyong
2018-07-12 6:18 ` [PATCH v3 5/6] iommu/arm-smmu-v3: " Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-12 6:18 ` [PATCH v3 6/6] iommu/arm-smmu-v3: add bootup option "iommu_strict_mode" Zhen Lei
2018-07-12 6:18 ` Zhen Lei
2018-07-24 22:46 ` Robin Murphy
2018-07-24 22:46 ` Robin Murphy
2018-07-26 7:41 ` Leizhen (ThunderTown)
2018-07-26 7:41 ` Leizhen (ThunderTown)
2018-07-24 21:51 ` [PATCH v3 0/6] add non-strict mode support for arm-smmu-v3 Robin Murphy
2018-07-24 21:51 ` Robin Murphy
[not found] ` <aace9ec9-a36a-79a8-98eb-bbedd06f11a4-5wv7dgnIgG8@public.gmane.org>
2018-07-26 3:44 ` Leizhen (ThunderTown)
2018-07-26 3:44 ` Leizhen (ThunderTown)
2018-07-26 3:44 ` Leizhen (ThunderTown)
2018-07-26 14:16 ` Robin Murphy
2018-07-26 14:16 ` Robin Murphy
2018-07-27 2:49 ` Leizhen (ThunderTown)
2018-07-27 2:49 ` Leizhen (ThunderTown)
[not found] ` <5B5A8857.9040907-hv44wF8Li93QT0dZR+AlfA@public.gmane.org>
2018-07-27 9:37 ` Will Deacon [this message]
2018-07-27 9:37 ` Will Deacon
2018-07-27 9:37 ` Will Deacon
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180727093758.GL28088@arm.com \
--to=will.deacon-5wv7dgnigg8@public.gmane.org \
--cc=iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
--cc=linux-arm-kernel-IAPFreCvJWM7uuMidbF8XUB+6BGkLq7r@public.gmane.org \
--cc=linux-kernel-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
--cc=linuxarm-hv44wF8Li93QT0dZR+AlfA@public.gmane.org \
--cc=robin.murphy-5wv7dgnIgG8@public.gmane.org \
--cc=thunder.leizhen-hv44wF8Li93QT0dZR+AlfA@public.gmane.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.