sking INTx where it cannot be enabled, plays poorly with
SR-IOV VFs and presumes DisINTx support.
----
Alex Williamson (1):
Revert: "vfio-pci: Mask INTx if a device is not capabable of enabling it"
drivers/vfio/pci/vfio_p
sking INTx where it cannot be enabled, plays poorly with
SR-IOV VFs and presumes DisINTx support.
----
Alex Williamson (1):
Revert: "vfio-pci: Mask INTx if a device is not capabable of enabling it"
drivers/vfio/pci/vfio_p
On Thu, 22 Mar 2018 12:52:16 +0800
"Jason Cai (Xiang Feng)" wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct
On Thu, 22 Mar 2018 12:52:16 +0800
"Jason Cai (Xiang Feng)" wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct page, and
> the corresponding
On Thu, 22 Feb 2018 15:59:15 -0700
Alex Williamson <alex.william...@redhat.com> wrote:
> On Thu, 1 Feb 2018 01:27:38 -0500
> Suravee Suthikulpanit <suravee.suthikulpa...@amd.com> wrote:
>
> > VFIO IOMMU type1 currently upmaps IOVA pages synchronously, which requires
&
On Thu, 22 Feb 2018 15:59:15 -0700
Alex Williamson wrote:
> On Thu, 1 Feb 2018 01:27:38 -0500
> Suravee Suthikulpanit wrote:
>
> > VFIO IOMMU type1 currently upmaps IOVA pages synchronously, which requires
> > IOTLB flushing for every unmapping. This results in
On Fri, 9 Mar 2018 11:36:05 +0530
Kirti Wankhede wrote:
> Thanks for fixing it.
> Patch looks good to me.
> +Alex to pull this patch.
>
> Reviewed by: Kirti Wankhede
Applied to vfio next branch for v4.17 with Kirti's Rb. Thanks,
Alex
> On
On Fri, 9 Mar 2018 11:36:05 +0530
Kirti Wankhede wrote:
> Thanks for fixing it.
> Patch looks good to me.
> +Alex to pull this patch.
>
> Reviewed by: Kirti Wankhede
Applied to vfio next branch for v4.17 with Kirti's Rb. Thanks,
Alex
> On 3/8/2018 12:38 PM, Shunyong Yang wrote:
> > When
On Thu, 15 Mar 2018 16:35:09 +
Shameer Kolothum wrote:
> This pretty much reverts commit 273df9635385 ("iommu/dma: Make PCI
> window reservation generic") by moving the PCI window region
> reservation back into the dma specific path so that these
On Thu, 15 Mar 2018 16:35:09 +
Shameer Kolothum wrote:
> This pretty much reverts commit 273df9635385 ("iommu/dma: Make PCI
> window reservation generic") by moving the PCI window region
> reservation back into the dma specific path so that these regions
> doesn't get exposed via the IOMMU
padath <ar...@chelsio.com>
Fixes: 2170dd04316e ("vfio-pci: Mask INTx if a device is not capabable of
enabling it")
Acked-by: Casey Leedom <lee...@chelsio.com>
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
v2:
One more quick spin on this, barring
Vynipadath
Fixes: 2170dd04316e ("vfio-pci: Mask INTx if a device is not capabable of
enabling it")
Acked-by: Casey Leedom
Signed-off-by: Alex Williamson
---
v2:
One more quick spin on this, barring issues I'd like to get a pull
request in for rc7. The regression was originally masked
On Wed, 21 Mar 2018 03:28:16 +
"Tian, Kevin" <kevin.t...@intel.com> wrote:
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Wednesday, March 21, 2018 6:55 AM
> >
> > On Mon, 19 Mar 2018 08:28:32 +
> > "Tian, Kevin
On Wed, 21 Mar 2018 03:28:16 +
"Tian, Kevin" wrote:
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Wednesday, March 21, 2018 6:55 AM
> >
> > On Mon, 19 Mar 2018 08:28:32 +
> > "Tian, Kevin" wrote:
> >
On Wed, 21 Mar 2018 03:30:29 +
"Tian, Kevin" <kevin.t...@intel.com> wrote:
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Wednesday, March 21, 2018 6:38 AM
> >
> > On Mon, 19 Mar 2018 07:51:58 +
> > "Tian, Kevin
On Wed, 21 Mar 2018 03:30:29 +
"Tian, Kevin" wrote:
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Wednesday, March 21, 2018 6:38 AM
> >
> > On Mon, 19 Mar 2018 07:51:58 +
> > "Tian, Kevin" wrote:
> >
On Wed, 21 Mar 2018 10:08:03 +0100
Gerd Hoffmann wrote:
> On unknown/unhandled ioctls the driver should return an error, so
> userspace knows it tried to use something unsupported.
>
> Cc: sta...@vger.kernel.org
> Signed-off-by: Gerd Hoffmann
> ---
>
On Wed, 21 Mar 2018 10:08:03 +0100
Gerd Hoffmann wrote:
> On unknown/unhandled ioctls the driver should return an error, so
> userspace knows it tried to use something unsupported.
>
> Cc: sta...@vger.kernel.org
> Signed-off-by: Gerd Hoffmann
> ---
> drivers/gpu/drm/i915/gvt/kvmgt.c | 2 +-
>
On Mon, 19 Mar 2018 08:28:32 +
"Tian, Kevin" wrote:
> > From: Shameer Kolothum
> > Sent: Friday, March 16, 2018 12:35 AM
> >
> > This series introduces an iova list associated with a vfio
> > iommu. The list is kept updated taking care of iommu apertures,
> > and
On Mon, 19 Mar 2018 08:28:32 +
"Tian, Kevin" wrote:
> > From: Shameer Kolothum
> > Sent: Friday, March 16, 2018 12:35 AM
> >
> > This series introduces an iova list associated with a vfio
> > iommu. The list is kept updated taking care of iommu apertures,
> > and reserved regions. Also this
On Mon, 19 Mar 2018 07:51:58 +
"Tian, Kevin" wrote:
> > From: Shameer Kolothum
> > Sent: Friday, March 16, 2018 12:35 AM
> >
> > This retrieves the reserved regions associated with dev group and
> > checks for conflicts with any existing dma mappings. Also update
> >
On Mon, 19 Mar 2018 07:51:58 +
"Tian, Kevin" wrote:
> > From: Shameer Kolothum
> > Sent: Friday, March 16, 2018 12:35 AM
> >
> > This retrieves the reserved regions associated with dev group and
> > checks for conflicts with any existing dma mappings. Also update
> > the iova list excluding
On Tue, 20 Mar 2018 15:33:23 -0600
Alex Williamson <alex.william...@redhat.com> wrote:
> On Mon, 19 Mar 2018 10:30:24 +0800
> "Jason Cai (Xiang Feng)" <jason@linux.alibaba.com> wrote:
>
> > When using vfio to pass through a PCIe device (e.g. a GPU car
On Tue, 20 Mar 2018 15:33:23 -0600
Alex Williamson wrote:
> On Mon, 19 Mar 2018 10:30:24 +0800
> "Jason Cai (Xiang Feng)" wrote:
>
> > When using vfio to pass through a PCIe device (e.g. a GPU card) that
> > has a huge BAR (e.g. 16GB), a lot of cycles are waste
On Mon, 19 Mar 2018 10:30:24 +0800
"Jason Cai (Xiang Feng)" wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct
On Mon, 19 Mar 2018 10:30:24 +0800
"Jason Cai (Xiang Feng)" wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct page, and
> the corresponding
change other than big endian systems aren't
penalized with wasted swaps.
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio_pci_rdwr.c | 34 ++
1 file changed, 26 insertions(+), 8 deletions(-)
diff --git a/drivers/vf
change other than big endian systems aren't
penalized with wasted swaps.
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci_rdwr.c | 34 ++
1 file changed, 26 insertions(+), 8 deletions(-)
diff --git a/drivers/vfio/pci/vfio_pci_rdwr.c b/drivers/vfio/pci
This creates a common helper that we'll use for ioeventfd setup.
Reviewed-by: Peter Xu <pet...@redhat.com>
Reviewed-by: Eric Auger <eric.au...@redhat.com>
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio
l io reads
and writes. This should be a nop for little-endian and avoid
redundant swap on big-endian, and hopefully resolves Alexey's
comments regarding the endian nature of this interface.
* Rebase to v4.16-rc3
Thanks,
Alex
---
Alex Williamson (3):
vfio/pci: Pull BAR mapping setup from read-
a virtualized
region in order to allow the MSI interrupt to re-trigger.
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio_pci.c | 35 +++
drivers/vfio/pci/vfio_pci_private.h | 19 ++
drivers/vfio/pci/vfio_pci_rdwr.c
This creates a common helper that we'll use for ioeventfd setup.
Reviewed-by: Peter Xu
Reviewed-by: Eric Auger
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci_rdwr.c | 39 ++
1 file changed, 27 insertions(+), 12 deletions(-)
diff --git
l io reads
and writes. This should be a nop for little-endian and avoid
redundant swap on big-endian, and hopefully resolves Alexey's
comments regarding the endian nature of this interface.
* Rebase to v4.16-rc3
Thanks,
Alex
---
Alex Williamson (3):
vfio/pci: Pull BAR mapping setup from read-
a virtualized
region in order to allow the MSI interrupt to re-trigger.
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci.c | 35 +++
drivers/vfio/pci/vfio_pci_private.h | 19 ++
drivers/vfio/pci/vfio_pci_rdwr.c| 111 +++
include
On Tue, 13 Mar 2018 13:38:00 +0100
Auger Eric <eric.au...@redhat.com> wrote:
> On 08/02/18 02:22, Alexey Kardashevskiy wrote:
> > On 08/02/18 01:12, Alex Williamson wrote:
> >> On Wed, 7 Feb 2018 15:48:26 +1100
> >> Alexey Kardashevskiy <a...@ozlabs.ru&g
On Tue, 13 Mar 2018 13:38:00 +0100
Auger Eric wrote:
> On 08/02/18 02:22, Alexey Kardashevskiy wrote:
> > On 08/02/18 01:12, Alex Williamson wrote:
> >> On Wed, 7 Feb 2018 15:48:26 +1100
> >> Alexey Kardashevskiy wrote:
> >>> On 07/02/18 15:25, Alex W
On Wed, 7 Mar 2018 13:56:44 +0800
Peter Xu <pet...@redhat.com> wrote:
> On Wed, Feb 28, 2018 at 01:15:20PM -0700, Alex Williamson wrote:
>
> [...]
>
> > @@ -1174,6 +1206,8 @@ static int vfio_pci_probe(struct pci_dev *pdev, const
> > struct pci_device_
On Wed, 7 Mar 2018 13:56:44 +0800
Peter Xu wrote:
> On Wed, Feb 28, 2018 at 01:15:20PM -0700, Alex Williamson wrote:
>
> [...]
>
> > @@ -1174,6 +1206,8 @@ static int vfio_pci_probe(struct pci_dev *pdev, const
> > struct pci_device_id *id)
> > vdev
On Tue, 13 Mar 2018 14:12:34 +0100
Auger Eric <eric.au...@redhat.com> wrote:
> On 28/02/18 21:15, Alex Williamson wrote:
> > +long vfio_pci_ioeventfd(struct vfio_pci_device *vdev, loff_t offset,
> > + uint64_t data, int count, int fd)
> > +{
> >
On Tue, 13 Mar 2018 14:12:34 +0100
Auger Eric wrote:
> On 28/02/18 21:15, Alex Williamson wrote:
> > +long vfio_pci_ioeventfd(struct vfio_pci_device *vdev, loff_t offset,
> > + uint64_t data, int count, int fd)
> > +{
> > + struct pci_dev *pdev = vde
4316e ("vfio-pci: Mask INTx if a device is not capabable of
enabling it")
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio_pci.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/drivers/vfio/pci/vfio_pci.c b/d
NTx if a device is not capabable of
enabling it")
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci.c | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/drivers/vfio/pci/vfio_pci.c b/drivers/vfio/pci/vfio_pci.c
index ad18ed266dc0..f2ca24644a2c
our IOVA
handling. Thanks,
Alex
> Signed-off-by: Filippo Sironi <sir...@amazon.de>
> Cc: Alex Williamson <alex.william...@redhat.com>
> Cc: k...@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> ---
> drivers/vfio/vfio_iommu_type1.c | 32 ++---
nks,
Alex
> Signed-off-by: Filippo Sironi
> Cc: Alex Williamson
> Cc: k...@vger.kernel.org
> Cc: linux-kernel@vger.kernel.org
> ---
> drivers/vfio/vfio_iommu_type1.c | 32 ++--
> 1 file changed, 14 insertions(+), 18 deletions(-)
>
> diff -
On Sat, 3 Mar 2018 20:10:33 +0800
"Jason Cai (Xiang Feng)" wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct
On Sat, 3 Mar 2018 20:10:33 +0800
"Jason Cai (Xiang Feng)" wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct page, and
> the corresponding VMA
On Mon, 12 Mar 2018 09:01:54 -0700
Alexander Duyck <alexander.du...@gmail.com> wrote:
> On Mon, Mar 12, 2018 at 12:59 AM, Christoph Hellwig <h...@lst.de> wrote:
> > On Sun, Mar 11, 2018 at 09:59:09PM -0600, Alex Williamson wrote:
> >> I still struggle to understa
On Mon, 12 Mar 2018 09:01:54 -0700
Alexander Duyck wrote:
> On Mon, Mar 12, 2018 at 12:59 AM, Christoph Hellwig wrote:
> > On Sun, Mar 11, 2018 at 09:59:09PM -0600, Alex Williamson wrote:
> >> I still struggle to understand why we need this "unmanaged"
>
On Thu, 08 Mar 2018 11:02:29 -0800
Alexander Duyck wrote:
> From: Alexander Duyck
>
> This patch is meant to add some basic functionality to support for SR-IOV
> on devices when the VFs are not managed by some other entity in the device
>
On Thu, 08 Mar 2018 11:02:29 -0800
Alexander Duyck wrote:
> From: Alexander Duyck
>
> This patch is meant to add some basic functionality to support for SR-IOV
> on devices when the VFs are not managed by some other entity in the device
> other than the kernel.
>
> A new sysfs value called
On Fri, 02 Mar 2018 15:44:25 -0800
Alexander Duyck wrote:
> From: Alexander Duyck
>
> This patch is meant to add some basic functionality to support for SR-IOV
> on devices when the VFs are not managed by the kernel. The functions
>
On Fri, 02 Mar 2018 15:44:25 -0800
Alexander Duyck wrote:
> From: Alexander Duyck
>
> This patch is meant to add some basic functionality to support for SR-IOV
> on devices when the VFs are not managed by the kernel. The functions
> provided here can be used by drivers such as vfio-pci and
On Fri, 2 Mar 2018 06:54:17 +
"Tian, Kevin" <kevin.t...@intel.com> wrote:
> > From: Alex Williamson
> > Sent: Friday, March 2, 2018 4:22 AM
> > >
> > > I am pretty sure that you are describing is true of some, but not for
> > > al
On Fri, 2 Mar 2018 06:54:17 +
"Tian, Kevin" wrote:
> > From: Alex Williamson
> > Sent: Friday, March 2, 2018 4:22 AM
> > >
> > > I am pretty sure that you are describing is true of some, but not for
> > > all. I think the Amazon solut
On Fri, 2 Mar 2018 07:08:51 +
"Tian, Kevin" <kevin.t...@intel.com> wrote:
> > From: Alex Williamson
> > Sent: Thursday, March 1, 2018 4:15 AM
> >
> > A vfio ioeventfd will perform the pre-specified device write on
> > triggering of
On Fri, 2 Mar 2018 07:08:51 +
"Tian, Kevin" wrote:
> > From: Alex Williamson
> > Sent: Thursday, March 1, 2018 4:15 AM
> >
> > A vfio ioeventfd will perform the pre-specified device write on
> > triggering of an eventfd. When coupled with KVM
On Thu, 1 Mar 2018 18:49:53 -0800
Alexander Duyck <alexander.du...@gmail.com> wrote:
> On Thu, Mar 1, 2018 at 3:58 PM, Alex Williamson
> <alex.william...@redhat.com> wrote:
> > On Thu, 1 Mar 2018 14:42:40 -0800
> > Alexander Duyck <alexander.du...@gmail.com> w
On Thu, 1 Mar 2018 18:49:53 -0800
Alexander Duyck wrote:
> On Thu, Mar 1, 2018 at 3:58 PM, Alex Williamson
> wrote:
> > On Thu, 1 Mar 2018 14:42:40 -0800
> > Alexander Duyck wrote:
> >
> >> On Thu, Mar 1, 2018 at 12:22 PM, Alex Williamson
> >> wr
On Fri, 2 Mar 2018 13:19:58 +
Shameerali Kolothum Thodi <shameerali.kolothum.th...@huawei.com> wrote:
> > -Original Message-
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Wednesday, February 28, 2018 3:24 PM
> > To: Auger Eric
On Fri, 2 Mar 2018 13:19:58 +
Shameerali Kolothum Thodi wrote:
> > -Original Message-
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Wednesday, February 28, 2018 3:24 PM
> > To: Auger Eric
> > Cc: Shameerali Kolothum Thodi ;
&g
On Thu, 1 Mar 2018 14:42:40 -0800
Alexander Duyck <alexander.du...@gmail.com> wrote:
> On Thu, Mar 1, 2018 at 12:22 PM, Alex Williamson
> <alex.william...@redhat.com> wrote:
> > On Wed, 28 Feb 2018 16:36:38 -0800
> > Alexander Duyck <alexander.du...@gmail.com&
On Thu, 1 Mar 2018 14:42:40 -0800
Alexander Duyck wrote:
> On Thu, Mar 1, 2018 at 12:22 PM, Alex Williamson
> wrote:
> > On Wed, 28 Feb 2018 16:36:38 -0800
> > Alexander Duyck wrote:
> >
> >> On Wed, Feb 28, 2018 at 2:59 PM, Alex Williamson
> >> wr
On Thu, 1 Mar 2018 18:54:01 +
"Stephen Bates" wrote:
> Thanks for the detailed review Bjorn!
>
> >>
> >> +Enabling this option will also disable ACS on all ports behind
> >> +any PCIe switch. This effictively puts all devices behind any
> >> +switch into
On Thu, 1 Mar 2018 18:54:01 +
"Stephen Bates" wrote:
> Thanks for the detailed review Bjorn!
>
> >>
> >> +Enabling this option will also disable ACS on all ports behind
> >> +any PCIe switch. This effictively puts all devices behind any
> >> +switch into the same IOMMU group.
On Wed, 28 Feb 2018 16:36:38 -0800
Alexander Duyck <alexander.du...@gmail.com> wrote:
> On Wed, Feb 28, 2018 at 2:59 PM, Alex Williamson
> <alex.william...@redhat.com> wrote:
> > On Wed, 28 Feb 2018 09:49:21 -0800
> > Alexander Duyck <alexander.du...@gmail.com&
On Wed, 28 Feb 2018 16:36:38 -0800
Alexander Duyck wrote:
> On Wed, Feb 28, 2018 at 2:59 PM, Alex Williamson
> wrote:
> > On Wed, 28 Feb 2018 09:49:21 -0800
> > Alexander Duyck wrote:
> >
> >> On Tue, Feb 27, 2018 at 2:25 PM, Alexander Duyck
> >> wr
On Wed, 28 Feb 2018 09:49:21 -0800
Alexander Duyck <alexander.du...@gmail.com> wrote:
> On Tue, Feb 27, 2018 at 2:25 PM, Alexander Duyck
> <alexander.du...@gmail.com> wrote:
> > On Tue, Feb 27, 2018 at 1:40 PM, Alex Williamson
> > <alex.william...@redhat.com>
On Wed, 28 Feb 2018 09:49:21 -0800
Alexander Duyck wrote:
> On Tue, Feb 27, 2018 at 2:25 PM, Alexander Duyck
> wrote:
> > On Tue, Feb 27, 2018 at 1:40 PM, Alex Williamson
> > wrote:
> >> On Tue, 27 Feb 2018 11:06:54 -0800
> >> Alexander Duyck wrote
a virtualized
region in order to allow the MSI interrupt to re-trigger.
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio_pci.c | 34 ++
drivers/vfio/pci/vfio_pci_private.h | 18 +
drivers/vfio/pci/vfio_pci_rdwr.c
a virtualized
region in order to allow the MSI interrupt to re-trigger.
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci.c | 34 ++
drivers/vfio/pci/vfio_pci_private.h | 18 +
drivers/vfio/pci/vfio_pci_rdwr.c| 115 +++
include
change other than big endian systems aren't
penalized with wasted swaps.
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio_pci_rdwr.c | 34 ++
1 file changed, 26 insertions(+), 8 deletions(-)
diff --git a/drivers/vf
change other than big endian systems aren't
penalized with wasted swaps.
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci_rdwr.c | 34 ++
1 file changed, 26 insertions(+), 8 deletions(-)
diff --git a/drivers/vfio/pci/vfio_pci_rdwr.c b/drivers/vfio/pci
This creates a common helper that we'll use for ioeventfd setup.
Signed-off-by: Alex Williamson <alex.william...@redhat.com>
---
drivers/vfio/pci/vfio_pci_rdwr.c | 39 ++
1 file changed, 27 insertions(+), 12 deletions(-)
diff --git a/drivers/vf
This creates a common helper that we'll use for ioeventfd setup.
Signed-off-by: Alex Williamson
---
drivers/vfio/pci/vfio_pci_rdwr.c | 39 ++
1 file changed, 27 insertions(+), 12 deletions(-)
diff --git a/drivers/vfio/pci/vfio_pci_rdwr.c b/drivers/vfio/pci
ing the endian nature of this interface.
* Rebase to v4.16-rc3
Thanks,
Alex
---
Alex Williamson (3):
vfio/pci: Pull BAR mapping setup from read-write path
vfio/pci: Use endian neutral helpers
vfio/pci: Add ioeventfd support
drivers/vfio/pci/vfio_pci.c | 34 ++
driv
ing the endian nature of this interface.
* Rebase to v4.16-rc3
Thanks,
Alex
---
Alex Williamson (3):
vfio/pci: Pull BAR mapping setup from read-write path
vfio/pci: Use endian neutral helpers
vfio/pci: Add ioeventfd support
drivers/vfio/pci/vfio_pci.c | 34 ++
driv
t; >> Sent: Wednesday, February 28, 2018 9:02 AM
> >> To: Shameerali Kolothum Thodi <shameerali.kolothum.th...@huawei.com>;
> >> Alex Williamson <alex.william...@redhat.com>
> >> Cc: pmo...@linux.vnet.ibm.com; k...@vger.kernel.org; linux-
> >> ker
y, February 28, 2018 9:02 AM
> >> To: Shameerali Kolothum Thodi ;
> >> Alex Williamson
> >> Cc: pmo...@linux.vnet.ibm.com; k...@vger.kernel.org; linux-
> >> ker...@vger.kernel.org; Linuxarm ; John Garry
> >> ; xuwei (O) ; Robin Murphy
> >>
>
On Tue, 27 Feb 2018 11:06:54 -0800
Alexander Duyck wrote:
> From: Alexander Duyck
>
> This patch is meant to add support for SR-IOV on devices when the VFs are
> not managed by the kernel. Examples of recent patches attempting to do this
On Tue, 27 Feb 2018 11:06:54 -0800
Alexander Duyck wrote:
> From: Alexander Duyck
>
> This patch is meant to add support for SR-IOV on devices when the VFs are
> not managed by the kernel. Examples of recent patches attempting to do this
> include:
It appears to enable sriov when the _pf_ is
On Tue, 27 Feb 2018 09:57:16 +
Shameerali Kolothum Thodi <shameerali.kolothum.th...@huawei.com> wrote:
> > -Original Message-
> > From: Auger Eric [mailto:eric.au...@redhat.com]
> > Sent: Tuesday, February 27, 2018 8:27 AM
> > To: Alex Williamson <a
On Tue, 27 Feb 2018 09:57:16 +
Shameerali Kolothum Thodi wrote:
> > -Original Message-
> > From: Auger Eric [mailto:eric.au...@redhat.com]
> > Sent: Tuesday, February 27, 2018 8:27 AM
> > To: Alex Williamson
> > Cc: Shameerali Kolothum Thodi ;
&g
On Tue, 27 Feb 2018 09:26:37 +0100
Auger Eric <eric.au...@redhat.com> wrote:
> Hi,
> On 27/02/18 00:13, Alex Williamson wrote:
> > On Mon, 26 Feb 2018 23:05:43 +0100
> > Auger Eric <eric.au...@redhat.com> wrote:
> >
> >> Hi Shameer,
> >
On Tue, 27 Feb 2018 09:26:37 +0100
Auger Eric wrote:
> Hi,
> On 27/02/18 00:13, Alex Williamson wrote:
> > On Mon, 26 Feb 2018 23:05:43 +0100
> > Auger Eric wrote:
> >
> >> Hi Shameer,
> >>
> >> [Adding Robin in CC]
> >> On
On Mon, 26 Feb 2018 23:05:43 +0100
Auger Eric wrote:
> Hi Shameer,
>
> [Adding Robin in CC]
> On 21/02/18 13:22, Shameer Kolothum wrote:
> > This checks and rejects any dma map request outside valid iova
> > range.
> >
> > Signed-off-by: Shameer Kolothum
On Mon, 26 Feb 2018 23:05:43 +0100
Auger Eric wrote:
> Hi Shameer,
>
> [Adding Robin in CC]
> On 21/02/18 13:22, Shameer Kolothum wrote:
> > This checks and rejects any dma map request outside valid iova
> > range.
> >
> > Signed-off-by: Shameer Kolothum
> > ---
> >
On Sat, 24 Feb 2018 13:44:07 +0800
jason wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct page, and
> the
On Sat, 24 Feb 2018 13:44:07 +0800
jason wrote:
> When using vfio to pass through a PCIe device (e.g. a GPU card) that
> has a huge BAR (e.g. 16GB), a lot of cycles are wasted on memory
> pinning because PFNs of PCI BAR are not backed by struct page, and
> the corresponding VMA has flags
On Fri, 23 Feb 2018 08:20:51 +
"Tian, Kevin" <kevin.t...@intel.com> wrote:
> > From: Alex Williamson
> > Sent: Friday, February 23, 2018 6:59 AM
> >
> > On Thu, 1 Feb 2018 01:27:38 -0500
> > Suravee Suthikulpanit <suravee.suthikulpa...@amd.co
On Fri, 23 Feb 2018 08:20:51 +
"Tian, Kevin" wrote:
> > From: Alex Williamson
> > Sent: Friday, February 23, 2018 6:59 AM
> >
> > On Thu, 1 Feb 2018 01:27:38 -0500
> > Suravee Suthikulpanit wrote:
> >
> > > VFIO IOMMU
ugh devices has a large number of mapped
> IOVAs. This can be avoided by using the new IOTLB flushing interface.
>
> Cc: Alex Williamson <alex.william...@redhat.com>
> Cc: Joerg Roedel <j...@8bytes.org>
> Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpa.
of mapped
> IOVAs. This can be avoided by using the new IOTLB flushing interface.
>
> Cc: Alex Williamson
> Cc: Joerg Roedel
> Signed-off-by: Suravee Suthikulpanit
> ---
>
> Changes from v4 (https://lkml.org/lkml/2018/1/31/153)
> * Change return type from ssize
On Wed, 21 Feb 2018 12:22:08 +
Shameer Kolothum wrote:
> This allows the user-space to retrieve the supported IOVA
> range(s), excluding any reserved regions. The implementation
> is based on capability chains, added to VFIO_IOMMU_GET_INFO ioctl.
>
>
On Wed, 21 Feb 2018 12:22:08 +
Shameer Kolothum wrote:
> This allows the user-space to retrieve the supported IOVA
> range(s), excluding any reserved regions. The implementation
> is based on capability chains, added to VFIO_IOMMU_GET_INFO ioctl.
>
> Signed-off-by: Shameer Kolothum
> ---
On Mon, 19 Feb 2018 09:50:24 +
Shameerali Kolothum Thodi <shameerali.kolothum.th...@huawei.com> wrote:
> > -Original Message-
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Friday, February 16, 2018 8:49 PM
> > On Thu, 15 Feb 2
On Mon, 19 Feb 2018 09:50:24 +
Shameerali Kolothum Thodi wrote:
> > -Original Message-
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Friday, February 16, 2018 8:49 PM
> > On Thu, 15 Feb 2018 09:44:59 +
>
On Mon, 19 Feb 2018 10:00:53 +
Shameerali Kolothum Thodi <shameerali.kolothum.th...@huawei.com> wrote:
> > -Original Message-
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Friday, February 16, 2018 9:18 PM
> >
> >
On Mon, 19 Feb 2018 10:00:53 +
Shameerali Kolothum Thodi wrote:
> > -Original Message-
> > From: Alex Williamson [mailto:alex.william...@redhat.com]
> > Sent: Friday, February 16, 2018 9:18 PM
> >
> > On Thu, 15 Feb 2018 09:45:00 +00
On Thu, 15 Feb 2018 09:45:03 +
Shameer Kolothum wrote:
> This allows the user-space to retrieve the supported IOVA
> range(s), excluding any reserved regions. The implementation
> is based on capability chains, added to VFIO_IOMMU_GET_INFO ioctl.
>
>
On Thu, 15 Feb 2018 09:45:03 +
Shameer Kolothum wrote:
> This allows the user-space to retrieve the supported IOVA
> range(s), excluding any reserved regions. The implementation
> is based on capability chains, added to VFIO_IOMMU_GET_INFO ioctl.
>
> Signed-off-by: Shameer Kolothum
> ---
901 - 1000 of 5215 matches
Mail list logo