qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: David Gibson <david@gibson.dropbear.id.au>
To: Laurent Vivier <lvivier@redhat.com>
Cc: thuth@redhat.com, aik@ozlabs.ru, gwshan@linux.vnet.ibm.com,
	qemu-devel@nongnu.org, alex.williamson@redhat.com,
	qemu-ppc@nongnu.org, pbonzini@redhat.com
Subject: Re: [Qemu-devel] [RFC PATCH 00/10] pseries: Allow VFIO devices on spapr-pci-host-bridge
Date: Thu, 24 Sep 2015 11:02:19 +1000	[thread overview]
Message-ID: <20150924010219.GJ15944@voom.fritz.box> (raw)
In-Reply-To: <5602D759.1020201@redhat.com>

[-- Attachment #1: Type: text/plain, Size: 5275 bytes --]

On Wed, Sep 23, 2015 at 06:46:17PM +0200, Laurent Vivier wrote:
> 
> 
> On 17/09/2015 15:09, David Gibson wrote:
> > Currently the pseries machine type uses two types of PCI Host Bridge
> > (PHB) devices: "spapr-pci-host-bridge" the 'normal' variant intended
> > for emulated PCI devices, and "spapr-pci-vfio-host-bridge" intended
> > for VFIO devices.
> > 
> > When using VFIO with pseries, a separate spapr-pci-vfio-host-bridge
> > device is needed for every host IOMMU group from which you're using
> > VFIO devices.  This is quite awkward for the user and/or management
> > tools.  It's especially awkward since the current code makes
> > essentially no attempt to detect and warn the user if the wrong sorts
> > of devices are connected to the wrong PHB.
> > 
> > It turns out that the VFIO core code is actually general enough that
> > VFIO devices almost work on the normal spapr-pci-host-bridge device.
> > In fact with the right combination of circumstances they *can* work
> > right now.
> > 
> > spapr-pci-vfio-host-bridge does 3 additional things:
> > 
> >     1) It disables KVM acceleration of the guest IOMMU.  That
> >        acceleration breaks VFIO because it means guest IOMMU updates
> >        bypass the VFIO infrastructure which keeps the host IOMMU in
> >        sync.
> > 
> >     2) It automatically configures the guest PHB's DMA window to match
> >        the capabilities of the host IOMMU, and advertises that to the
> >        guest.
> > 
> >     3) It provides additional handling of EEH (Enhanced Error
> >        Handling) functions.
> > 
> > This patch series:
> >     * Allows VFIO devices to be used on the spapr-pci-host-bridge by
> >       auto-switching the KVM TCE acceleration
> > 
> >     * Adds verification that the host IOMMU can handle the DMA windows
> >       used by guest PHBs
> > 
> >     * Allows the DMA window on the guest PHB to be configured with
> >       device properties.  This can be used to make sure it matches a
> >       host window, but in practice the default setting will already
> >       work with the host IOMMU on all current systems.
> > 
> >     * Adds support to the VFIO core to allow a VFIO device to be
> >       hotplugged onto a bus which doesn't yet have VFIO devices.  This
> >       already worked for systems without a guest-visible IOMMU
> >       (i.e. x86), this series makes it work even with a guest visible
> >       IOMMU.
> > 
> >     * Makes a few related cleanups along the way
> > 
> > This series does NOT allow EEH operations on VFIO devices on the
> > spapr-pci-host-bridge device, so the spapr-pci-vfio-host-bridge device
> > is left in for now.  It turns out there are some serious existing
> > problems in both the qemu EEH implementation and (worse) in the
> > EEH/VFIO kernel interface.  Fixing those is a problem for another day.
> > Maybe tomorrow.
> > 
> > 
> > I've tested basic assignment of an xHCI to a pseries guest, both at
> > startup and with hotplug.  I haven't (yet) tested VFIO on x86 with
> > this series.
> > 
> > This series probably needs to be merged via several different trees.
> > I'm intending to split up as necessary once it's had some review.
> > 
> > David Gibson (10):
> >   vfio: Remove unneeded union from VFIOContainer
> >   vfio: Generalize vfio_listener_region_add failure path
> >   vfio: Check guest IOVA ranges against host IOMMU capabilities
> >   vfio: Record host IOMMU's available IO page sizes
> >   memory: Allow replay of IOMMU mapping notifications
> >   vfio: Allow hotplug of containers onto existing guest IOMMU mappings
> >   spapr_pci: Allow PCI host bridge DMA window to be configured
> >   spapr_iommu: Rename vfio_accel parameter
> >   spapr_iommu: Provide a function to switch a TCE table to allowing VFIO
> >   spapr_pci: Allow VFIO devices to work on the normal PCI host bridge
> > 
> >  hw/ppc/spapr_iommu.c          |  25 ++++++-
> >  hw/ppc/spapr_pci.c            |  13 +++-
> >  hw/vfio/common.c              | 152 +++++++++++++++++++++++++++---------------
> >  include/exec/memory.h         |  16 +++++
> >  include/hw/pci-host/spapr.h   |   3 +-
> >  include/hw/ppc/spapr.h        |   6 +-
> >  include/hw/vfio/vfio-common.h |  21 +++---
> >  memory.c                      |  18 +++++
> >  target-ppc/kvm.c              |   4 +-
> >  target-ppc/kvm_ppc.h          |   2 +-
> >  10 files changed, 184 insertions(+), 76 deletions(-)
> > 
> 
> Just a comment on the form: checkpatch.pl vociferates because of "DOS
> line endings", "trailing whitespace" and "line over 80 characters".

Hmm.. I see the trailing whitespace and over 80 characters warnings
along with a few others.  Nothing about DOS line endings though.
Wondering if that could be something that's come from your mailer.

> 
> <troll>
> 	Please, use "vi" with "set ff=unix"
> </troll>
> 
> Stefan has a good tip to check automatically commits:
> 
> http://blog.vmsplice.net/2011/03/how-to-automatically-run-checkpatchpl.html

Nice, thanks.

-- 
David Gibson			| I'll have my music baroque, and my code
david AT gibson.dropbear.id.au	| minimalist, thank you.  NOT _the_ _other_
				| _way_ _around_!
http://www.ozlabs.org/~dgibson

[-- Attachment #2: Type: application/pgp-signature, Size: 819 bytes --]

  reply	other threads:[~2015-09-24  1:02 UTC|newest]

Thread overview: 54+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-09-17 13:09 [Qemu-devel] [RFC PATCH 00/10] pseries: Allow VFIO devices on spapr-pci-host-bridge David Gibson
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 01/10] vfio: Remove unneeded union from VFIOContainer David Gibson
2015-09-18  6:15   ` Alexey Kardashevskiy
2015-09-23 10:31   ` Thomas Huth
2015-09-23 23:14     ` David Gibson
2015-09-23 13:18   ` Laurent Vivier
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 02/10] vfio: Generalize vfio_listener_region_add failure path David Gibson
2015-09-23  9:13   ` Thomas Huth
2015-09-23 13:31   ` Laurent Vivier
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 03/10] vfio: Check guest IOVA ranges against host IOMMU capabilities David Gibson
2015-09-18  6:38   ` Alexey Kardashevskiy
2015-09-23 10:10   ` Thomas Huth
2015-09-23 11:07     ` David Gibson
2015-09-23 23:43       ` David Gibson
2015-09-23 14:26   ` Laurent Vivier
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 04/10] vfio: Record host IOMMU's available IO page sizes David Gibson
2015-09-23 10:29   ` Thomas Huth
2015-09-23 14:30   ` Laurent Vivier
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 05/10] memory: Allow replay of IOMMU mapping notifications David Gibson
2015-09-23 10:40   ` Thomas Huth
2015-09-23 16:35     ` Laurent Vivier
2015-09-23 23:47     ` David Gibson
2015-09-23 17:04   ` Laurent Vivier
2015-09-23 23:50     ` David Gibson
2015-09-24  7:09       ` Laurent Vivier
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 06/10] vfio: Allow hotplug of containers onto existing guest IOMMU mappings David Gibson
2015-09-17 16:54   ` Alex Williamson
2015-09-17 23:31     ` David Gibson
2015-09-23 11:02       ` Thomas Huth
2015-09-23 23:50         ` David Gibson
2015-09-23 18:44   ` Laurent Vivier
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 07/10] spapr_pci: Allow PCI host bridge DMA window to be configured David Gibson
2015-09-23 11:08   ` Thomas Huth
2015-09-23 23:56     ` David Gibson
2015-09-23 18:55   ` Laurent Vivier
2015-09-23 23:54     ` David Gibson
2015-09-24  6:59       ` Laurent Vivier
2015-10-03  0:25         ` Alexey Kardashevskiy
2015-10-05 14:13           ` Paolo Bonzini
2015-10-06  3:25             ` David Gibson
2015-10-06  4:18               ` David Gibson
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 08/10] spapr_iommu: Rename vfio_accel parameter David Gibson
2015-09-17 16:54   ` Alex Williamson
2015-09-17 23:34     ` David Gibson
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 09/10] spapr_iommu: Provide a function to switch a TCE table to allowing VFIO David Gibson
2015-09-17 16:54   ` Alex Williamson
2015-09-23 11:24     ` Thomas Huth
2015-09-24  0:35       ` David Gibson
2015-09-17 13:09 ` [Qemu-devel] [RFC PATCH 10/10] spapr_pci: Allow VFIO devices to work on the normal PCI host bridge David Gibson
2015-09-17 16:54 ` [Qemu-devel] [RFC PATCH 00/10] pseries: Allow VFIO devices on spapr-pci-host-bridge Alex Williamson
2015-09-23 11:26 ` Thomas Huth
2015-09-23 16:46 ` Laurent Vivier
2015-09-24  1:02   ` David Gibson [this message]
2015-09-24  7:02     ` Laurent Vivier

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20150924010219.GJ15944@voom.fritz.box \
    --to=david@gibson.dropbear.id.au \
    --cc=aik@ozlabs.ru \
    --cc=alex.williamson@redhat.com \
    --cc=gwshan@linux.vnet.ibm.com \
    --cc=lvivier@redhat.com \
    --cc=pbonzini@redhat.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-ppc@nongnu.org \
    --cc=thuth@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).