From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from eggs.gnu.org ([208.118.235.92]:49749) by lists.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1TMKzq-0005vG-W4 for qemu-devel@nongnu.org; Thu, 11 Oct 2012 11:48:31 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.71) (envelope-from ) id 1TMKzk-0001jB-Ea for qemu-devel@nongnu.org; Thu, 11 Oct 2012 11:48:26 -0400 Received: from mx1.redhat.com ([209.132.183.28]:17128) by eggs.gnu.org with esmtp (Exim 4.71) (envelope-from ) id 1TMKzk-0001j7-6M for qemu-devel@nongnu.org; Thu, 11 Oct 2012 11:48:20 -0400 Message-ID: <5076EA3E.1010904@redhat.com> Date: Thu, 11 Oct 2012 17:48:14 +0200 From: Avi Kivity MIME-Version: 1.0 References: <1349962023-560-1-git-send-email-avi@redhat.com> <1349962023-560-8-git-send-email-avi@redhat.com> <20121011133155.GA8983@redhat.com> <5076CAFE.8060205@redhat.com> <20121011134428.GB8983@redhat.com> <5076CD2A.8000703@redhat.com> <20121011143519.GE8983@redhat.com> <5076D92B.1060200@redhat.com> <20121011153415.GK8983@redhat.com> In-Reply-To: <20121011153415.GK8983@redhat.com> Content-Type: text/plain; charset=ISO-8859-1 Content-Transfer-Encoding: 7bit Subject: Re: [Qemu-devel] [RFC v1 7/7] vhost: abort if an emulated iommu is used List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: "Michael S. Tsirkin" Cc: qemu-devel@nongnu.org, liu ping fan , Blue Swirl , Alex Williamson , Anthony Liguori , Paolo Bonzini On 10/11/2012 05:34 PM, Michael S. Tsirkin wrote: > On Thu, Oct 11, 2012 at 04:35:23PM +0200, Avi Kivity wrote: >> On 10/11/2012 04:35 PM, Michael S. Tsirkin wrote: >> >> >> No, qemu should configure virtio devices to bypass the iommu, even if it >> >> is on. >> > >> > Okay so there will be some API that virtio devices should call >> > to achieve this? >> >> The iommu should probably call pci_device_bypasses_iommu() to check for >> such devices. > > So maybe this patch should depend on the introduction of such > an API. I've dropped it for now. In fact, virtio/vhost are safe since they use cpu_physical_memory_rw() and the memory listener watches address_space_memory, no iommu there. vfio needs to change to listen to pci_dev->bus_master_as, and need special handling for iommu regions (abort for now, type 2 iommu later). -- error compiling committee.c: too many arguments to function