From mboxrd@z Thu Jan 1 00:00:00 1970 From: Paolo Bonzini Subject: Re: [PATCH v4 0/4] virtio: Clean up scatterlists and use the DMA API Date: Wed, 03 Sep 2014 17:11:45 +0200 Message-ID: <54072FB1.1090205@redhat.com> References: <1409609814.30640.11.camel@pasglop> <1409691213.30640.37.camel@pasglop> <1409695810.30640.57.camel@pasglop> <1409700010.30640.67.camel@pasglop> <1409703942.30640.71.camel@pasglop> <5406C77B.1000809@redhat.com> <1409731536.30640.95.camel@pasglop> <54070555.70608@redhat.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Sender: virtualization-bounces@lists.linux-foundation.org Errors-To: virtualization-bounces@lists.linux-foundation.org List-Archive: List-Post: To: Andy Lutomirski Cc: "linux-s390@vger.kernel.org" , Benjamin Herrenschmidt , Konrad Rzeszutek Wilk , "Michael S. Tsirkin" , Linux Virtualization , Christian Borntraeger , "linux390@de.ibm.com" List-ID: Il 03/09/2014 17:07, Andy Lutomirski ha scritto: >> > Yes, only for virtio---but for x86 I think it should be off by default, >> > even if that means virtio+IOMMU requires a new kernel. > Just to clarify: is "it" the direct-ram-access property? If so, I > think I might agree. Yes. > Alternatively, could QEMU easily teach the IOMMU code to generate the > ACPI tables such that virtio-pci devices aren't advertised as living > behind the IOMMU? This would work both with and without my patches. > On the other hand, maybe this gets complicated when hotplug is > involved. That could be possible. For hot-plug, you can simply forbid hotplugging with direct-ram-access=on. If you want hotplug, then we should add the direct-ram-access property to PCI bridges too (with the same limitation on hotplug). All devices under such a bridge would be outside the IOMMU, including virtio devices with direct-ram-access=off. Paolo