RE: [PATCH v2] target/i386/host-cpu: Use iommu phys_bits with VFIO assigned devices on Intel h/w

2024-01-30 Thread Tian, Kevin
> From: Alex Williamson > Sent: Friday, January 26, 2024 5:20 AM > > On Thu, 25 Jan 2024 09:18:02 +0100 > Eric Auger wrote: > > > Hi Vivek, > > > > On 1/18/24 20:20, Vivek Kasireddy wrote: > > > > > > +if (iommu_phys_bits && phys_bits > iommu_phys_bits) { > > > +phys_bits =

RE: [PATCH v1 15/22] Add iommufd configure option

2023-09-26 Thread Tian, Kevin
> From: Jason Gunthorpe > Sent: Thursday, September 21, 2023 2:20 AM > > On Wed, Sep 20, 2023 at 12:17:24PM -0600, Alex Williamson wrote: > > > > The iommufd design requires one open of the /dev/iommu to be shared > > > across all the vfios. > > > > "requires"? It's certainly of limited value

RE: Multiple vIOMMU instance support in QEMU?

2023-05-18 Thread Tian, Kevin
> From: Jason Gunthorpe > Sent: Friday, May 19, 2023 4:19 AM > > On Thu, May 18, 2023 at 03:45:24PM -0400, Peter Xu wrote: > > > I see that Intel is already copied here (at least Yi and Kevin) so I assume > > there're already some kind of synchronizations on multi-vIOMMU vs recent > > works on

RE: Multiple vIOMMU instance support in QEMU?

2023-05-18 Thread Tian, Kevin
> From: Jason Gunthorpe > Sent: Thursday, May 18, 2023 10:57 PM > > On Thu, May 18, 2023 at 10:16:24AM -0400, Peter Xu wrote: > > > What you mentioned above makes sense to me from the POV that 1 > vIOMMU may > > not suffice, but that's at least totally new area to me because I never > > used >1

RE: [RFC PATCH 00/13] Add a plugin to support out-of-band live migration for VFIO pass-through device

2022-06-01 Thread Tian, Kevin
Hi, Alex, > From: Alex Williamson > Sent: Thursday, June 2, 2022 2:01 AM > > On Wed, 1 Jun 2022 17:09:25 + > "Dong, Eddie" wrote: > > > > -Original Message- > > > From: Qemu-devel > > bounces+eddie.dong=intel@nongnu.org> On Behalf Of Alex > Williamson > > > On Tue, 24 May

RE: [RFC 00/18] vfio: Adopt iommufd

2022-04-28 Thread Tian, Kevin
> From: Daniel P. Berrangé > Sent: Friday, April 29, 2022 12:20 AM > > On Thu, Apr 28, 2022 at 08:24:48AM -0600, Alex Williamson wrote: > > On Thu, 28 Apr 2022 03:21:45 +0000 > > "Tian, Kevin" wrote: > > > > > > From: Alex Williams

RE: [RFC 00/18] vfio: Adopt iommufd

2022-04-27 Thread Tian, Kevin
> From: Alex Williamson > Sent: Wednesday, April 27, 2022 12:22 AM > > > > > > My expectation would be that libvirt uses: > > > > > > -object iommufd,id=iommufd0,fd=NNN > > > -device vfio-pci,fd=MMM,iommufd=iommufd0 > > > > > > Whereas simple QEMU command line would be: > > > > > > -object

RE: [RFC 15/18] vfio/iommufd: Implement iommufd backend

2022-04-26 Thread Tian, Kevin
> From: Liu, Yi L > Sent: Tuesday, April 26, 2022 5:55 PM > On 2022/4/22 22:58, Jason Gunthorpe wrote: > > On Thu, Apr 14, 2022 at 03:47:07AM -0700, Yi Liu wrote: > > > >> + > >> +/* try to attach to an existing container in this space */ > >> +QLIST_FOREACH(bcontainer, >containers, next)

RE: [RFC 00/18] vfio: Adopt iommufd

2022-04-26 Thread Tian, Kevin
> From: Eric Auger > Sent: Tuesday, April 26, 2022 3:55 AM > > Hi Kevin, > > On 4/18/22 10:49 AM, Tian, Kevin wrote: > >> From: Liu, Yi L > >> Sent: Thursday, April 14, 2022 6:47 PM > >> > >> This series qomifies the VFIOContainer object

RE: [RFC 00/18] vfio: Adopt iommufd

2022-04-26 Thread Tian, Kevin
> From: Alex Williamson > Sent: Monday, April 25, 2022 10:38 PM > > On Mon, 25 Apr 2022 11:10:14 +0100 > Daniel P. Berrangé wrote: > > > On Fri, Apr 22, 2022 at 04:09:43PM -0600, Alex Williamson wrote: > > > [Cc +libvirt folks] > > > > > > On Thu, 14 Apr 2022 03:46:52 -0700 > > > Yi Liu

RE: [RFC 00/18] vfio: Adopt iommufd

2022-04-18 Thread Tian, Kevin
> From: Liu, Yi L > Sent: Thursday, April 14, 2022 6:47 PM > > With the introduction of iommufd[1], the linux kernel provides a generic > interface for userspace drivers to propagate their DMA mappings to kernel > for assigned devices. This series does the porting of the VFIO devices > onto the

RE: [PATCH V2 1/4] intel-iommu: don't warn guest errors when getting rid2pasid entry

2022-04-05 Thread Tian, Kevin
> From: Jason Wang > Sent: Wednesday, April 6, 2022 11:33 AM > To: Tian, Kevin > Cc: Liu, Yi L ; m...@redhat.com; pet...@redhat.com; > yi.y@linux.intel.com; qemu-devel@nongnu.org > Subject: Re: [PATCH V2 1/4] intel-iommu: don't warn guest errors when > getting rid2pa

RE: [PATCH V2 1/4] intel-iommu: don't warn guest errors when getting rid2pasid entry

2022-04-02 Thread Tian, Kevin
> From: Jason Wang > Sent: Wednesday, March 30, 2022 4:37 PM > On Wed, Mar 30, 2022 at 4:16 PM Tian, Kevin wrote: > > > > > From: Jason Wang > > > Sent: Tuesday, March 29, 2022 12:52 PM > > > > > > > >>> > > >

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-04-02 Thread Tian, Kevin
> From: Jason Wang > Sent: Wednesday, March 30, 2022 4:32 PM > > > > > > > > > > If there is certain fault > > > > triggered by a request with PASID, we do want to report this > information > > > > upward. > > > > > > I tend to do it increasingly on top of this series (anyhow at least > > >

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-04-02 Thread Tian, Kevin
> From: Jason Wang > Sent: Wednesday, March 30, 2022 4:32 PM > > On Wed, Mar 30, 2022 at 4:02 PM Tian, Kevin wrote: > > > > > From: Jason Wang > > > Sent: Tuesday, March 29, 2022 12:49 PM > > > > > > On Mon, Mar 28, 2022 at 3:03 PM Ti

RE: [PATCH V2 1/4] intel-iommu: don't warn guest errors when getting rid2pasid entry

2022-03-30 Thread Tian, Kevin
> From: Jason Wang > Sent: Tuesday, March 29, 2022 12:52 PM > > > >>> > >>> Currently the implementation of vtd_ce_get_rid2pasid_entry() is also > >>> problematic. According to VT-d spec, RID2PASID field is effective only > >>> when ecap.rps is true otherwise PASID#0 is used for RID2PASID. I

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-03-30 Thread Tian, Kevin
> From: Jason Wang > Sent: Tuesday, March 29, 2022 12:49 PM > > On Mon, Mar 28, 2022 at 3:03 PM Tian, Kevin wrote: > > > > > From: Jason Wang > > > Sent: Monday, March 21, 2022 1:54 PM > > > > > > +/* > > > + * vtd-spec v3

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-03-30 Thread Tian, Kevin
> From: Jason Wang > Sent: Tuesday, March 29, 2022 12:47 PM > > On Mon, Mar 28, 2022 at 2:47 PM Tian, Kevin wrote: > > > > > From: Jason Wang > > > Sent: Monday, March 28, 2022 10:31 AM > > > > > > On Thu, Mar 24, 2022 at 4:54 PM Ti

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-03-28 Thread Tian, Kevin
> From: Jason Wang > Sent: Monday, March 21, 2022 1:54 PM > > +/* > + * vtd-spec v3.4 3.14: > + * > + * """ > + * Requests-with-PASID with input address in range 0xFEEx_ are > + * translated normally like any other request-with-PASID through > + * DMA-remapping

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-03-28 Thread Tian, Kevin
> From: Jason Wang > Sent: Monday, March 28, 2022 10:31 AM > > On Thu, Mar 24, 2022 at 4:54 PM Tian, Kevin wrote: > > > > > From: Jason Wang > > > Sent: Monday, March 21, 2022 1:54 PM > > > > > > This patch introduce ECAP_PASID v

RE: [PATCH V2 4/4] intel-iommu: PASID support

2022-03-24 Thread Tian, Kevin
> From: Jason Wang > Sent: Monday, March 21, 2022 1:54 PM > > This patch introduce ECAP_PASID via "x-pasid-mode". Based on the > existing support for scalable mode, we need to implement the following > missing parts: > > 1) tag VTDAddressSpace with PASID and support IOMMU/DMA translation >

RE: [PATCH V2 3/4] intel-iommu: convert VTD_PE_GET_FPD_ERR() to be a function

2022-03-24 Thread Tian, Kevin
> From: Jason Wang > Sent: Monday, March 21, 2022 1:54 PM > @@ -1724,6 +1713,19 @@ out: > trace_vtd_pt_enable_fast_path(source_id, success); > } > > +static void vtd_qualify_report_fault(IntelIOMMUState *s, > + int err, bool is_fpd_set, > +

RE: [PATCH V2 1/4] intel-iommu: don't warn guest errors when getting rid2pasid entry

2022-03-24 Thread Tian, Kevin
> From: Jason Wang > Sent: Monday, March 21, 2022 1:54 PM > > We use to warn on wrong rid2pasid entry. But this error could be > triggered by the guest and could happens during initialization. So > let's don't warn in this case. > > Signed-off-by: Jason Wang > --- > hw/i386/intel_iommu.c | 6

RE: [RFC PATCH 6/7] x86: Use new XSAVE ioctls handling

2022-01-10 Thread Tian, Kevin
> From: Zeng, Guang > Sent: Monday, January 10, 2022 5:47 PM > > On 1/10/2022 4:40 PM, Tian, Kevin wrote: > >> From: Zhong, Yang > >> Sent: Friday, January 7, 2022 5:32 PM > >> > >> From: Jing Liu > >> > >> Extended feature has

RE: [RFC PATCH 6/7] x86: Use new XSAVE ioctls handling

2022-01-10 Thread Tian, Kevin
> From: Zhong, Yang > Sent: Friday, January 7, 2022 5:32 PM > > From: Jing Liu > > Extended feature has large state while current > kvm_xsave only allows 4KB. Use new XSAVE ioctls > if the xstate size is large than kvm_xsave. shouldn't we always use the new xsave ioctls as long as CAP_XSAVE2

RE: [RFC PATCH 4/7] x86: Add XFD faulting bit for state components

2022-01-10 Thread Tian, Kevin
> From: Zhong, Yang > Sent: Friday, January 7, 2022 5:32 PM > > From: Jing Liu > > Intel introduces XFD faulting mechanism for extended > XSAVE features to dynamically enable the features in > runtime. If CPUID (EAX=0Dh, ECX=n, n>1).ECX[2] is set > as 1, it indicates support for XFD faulting

RE: [RFC PATCH 3/7] x86: Grant AMX permission for guest

2022-01-10 Thread Tian, Kevin
> From: Zhong, Yang > Sent: Friday, January 7, 2022 5:32 PM > > Kernel mechanism for dynamically enabled XSAVE features there is no definition of "dynamically-enabled XSAVE features). > asks userspace VMM requesting guest permission if it wants > to expose the features. Only with the

RE: [RFC PATCH 2/7] x86: Add AMX XTILECFG and XTILEDATA components

2022-01-10 Thread Tian, Kevin
> From: Zhong, Yang > Sent: Friday, January 7, 2022 5:31 PM > > From: Jing Liu > > AMX XTILECFG and XTILEDATA are managed by XSAVE feature > set. State component 17 is used for 64-byte TILECFG register > (XTILECFG state) and component 18 is used for 8192 bytes > of tile data (XTILEDATA state).

RE: [RFC PATCH 1/7] x86: Fix the 64-byte boundary enumeration for extended state

2022-01-10 Thread Tian, Kevin
> From: Zhong, Yang > Sent: Friday, January 7, 2022 5:31 PM > > From: Jing Liu > > The extended state subleaves (EAX=0Dh, ECX=n, n>1).ECX[1] > are all zero, while spec actually introduces that bit 01 > should indicate if the extended state component locates > on the next 64-byte boundary

RE: [question] VFIO Device Migration: The vCPU may be paused during vfio device DMA in iommu nested stage mode && vSVA

2021-09-27 Thread Tian, Kevin
> From: Kunkun Jiang > Sent: Monday, September 27, 2021 8:30 PM > > Hi Kevin: > > On 2021/9/24 14:47, Tian, Kevin wrote: > >> From: Kunkun Jiang > >> Sent: Friday, September 24, 2021 2:19 PM > >> > >> Hi all, > >> > >>

RE: [question] VFIO Device Migration: The vCPU may be paused during vfio device DMA in iommu nested stage mode && vSVA

2021-09-25 Thread Tian, Kevin
> From: Kirti Wankhede > Sent: Friday, September 24, 2021 5:29 PM > > On 9/24/2021 12:17 PM, Tian, Kevin wrote: > >> From: Kunkun Jiang > >> Sent: Friday, September 24, 2021 2:19 PM > >> > >> Hi all, > >> > >> I encountered a

RE: [question] VFIO Device Migration: The vCPU may be paused during vfio device DMA in iommu nested stage mode && vSVA

2021-09-24 Thread Tian, Kevin
> From: Kunkun Jiang > Sent: Friday, September 24, 2021 2:19 PM > > Hi all, > > I encountered a problem in vfio device migration test. The > vCPU may be paused during vfio-pci DMA in iommu nested > stage mode && vSVA. This may lead to migration fail and > other problems related to device

RE: [RFC PATCH 0/3] vfio/migration: Support manual clear vfio dirty log

2021-03-18 Thread Tian, Kevin
> From: Kunkun Jiang > Sent: Thursday, March 18, 2021 8:29 PM > > Hi Kevin, > > On 2021/3/18 17:04, Tian, Kevin wrote: > >> From: Kunkun Jiang > >> Sent: Thursday, March 18, 2021 3:59 PM > >> > >> Hi Kevin, > >> > >> On 2

RE: [RFC PATCH 0/3] vfio/migration: Support manual clear vfio dirty log

2021-03-18 Thread Tian, Kevin
> From: Kunkun Jiang > Sent: Thursday, March 18, 2021 3:59 PM > > Hi Kevin, > > On 2021/3/18 14:28, Tian, Kevin wrote: > >> From: Kunkun Jiang > >> Sent: Wednesday, March 10, 2021 5:41 PM > >> > >> Hi all, > >> > &

RE: [RFC PATCH 0/3] vfio/migration: Support manual clear vfio dirty log

2021-03-18 Thread Tian, Kevin
> From: Kunkun Jiang > Sent: Wednesday, March 10, 2021 5:41 PM > > Hi all, > > In the past, we clear dirty log immediately after sync dirty log to > userspace. This may cause redundant dirty handling if userspace > handles dirty log iteratively: > > After vfio clears dirty log, new dirty log

RE: [PATCH v2 1/1] docs/devel: Add VFIO device migration documentation

2021-03-16 Thread Tian, Kevin
> From: Tarun Gupta (SW-GPU) > Sent: Tuesday, March 16, 2021 9:35 PM > > > >> + > >> +* A ``save_live_iterate`` function that reads the VFIO device's data from > the > >> + vendor driver through the migration region during iterative phase. > >> + > >> +* A ``save_live_complete_precopy``

RE: [PATCH v2 1/1] docs/devel: Add VFIO device migration documentation

2021-03-16 Thread Tian, Kevin
> From: Dr. David Alan Gilbert > Sent: Tuesday, March 16, 2021 11:47 PM > > * Tian, Kevin (kevin.t...@intel.com) wrote: > > > From: Qemu-devel bounces+kevin.tian=intel@nongnu.org> > > > On Behalf Of Dr. David Alan Gilbert > > > > > &g

RE: [PATCH v2 1/1] docs/devel: Add VFIO device migration documentation

2021-03-11 Thread Tian, Kevin
> From: Tarun Gupta > Sent: Thursday, March 11, 2021 3:20 AM > > Document interfaces used for VFIO device migration. Added flow of state > changes > during live migration with VFIO device. Tested by building docs with the new > vfio-migration.rst file. > > v2: > - Included the new

RE: [PATCH v2 1/1] docs/devel: Add VFIO device migration documentation

2021-03-11 Thread Tian, Kevin
> From: Qemu-devel > On Behalf Of Dr. David Alan Gilbert > > * Daniel P. Berrangé (berra...@redhat.com) wrote: > > On Thu, Mar 11, 2021 at 12:50:09AM +0530, Tarun Gupta wrote: > > > Document interfaces used for VFIO device migration. Added flow of state > changes > > > during live migration with

RE: [PATCH v1 1/1] vfio: Make migration support non experimental by default.

2021-03-11 Thread Tian, Kevin
> From: Alex Williamson > Sent: Tuesday, March 9, 2021 6:51 AM > > [Cc +Intel] > > On Mon, 8 Mar 2021 21:39:49 +0530 > Tarun Gupta wrote: > > > VFIO migration support in QEMU is experimental as of now, which was > done to > > provide soak time and resolve concerns regarding bit-stream. > >

RE: [PATCH] virtio-iommu: Default to bypass during boot

2021-03-04 Thread Tian, Kevin
> From: Jean-Philippe Brucker > Sent: Friday, February 26, 2021 9:01 PM > > On Fri, Feb 26, 2021 at 08:11:41AM +, Tian, Kevin wrote: > > > From: Qemu-devel bounces+kevin.tian=intel@nongnu.org> > > > On Behalf Of Jean-Philippe Brucker > > > >

RE: [PATCH] virtio-iommu: Default to bypass during boot

2021-02-26 Thread Tian, Kevin
> From: Qemu-devel > On Behalf Of Jean-Philippe Brucker > > On Sun, Feb 21, 2021 at 06:45:18AM -0500, Michael S. Tsirkin wrote: > > On Thu, Feb 18, 2021 at 11:59:30AM +0100, Jean-Philippe Brucker wrote: > > > Currently the virtio-iommu device must be programmed before it allows > > > DMA from

RE: [PATCH] vhost: Unbreak SMMU and virtio-iommu on dev-iotlb support

2021-02-08 Thread Tian, Kevin
> From: Peter Xu > Sent: Sunday, February 7, 2021 10:47 PM > > Hi, Kevin, > > On Sun, Feb 07, 2021 at 09:04:55AM +, Tian, Kevin wrote: > > > From: Peter Xu > > > Sent: Friday, February 5, 2021 11:31 PM > > > > > > > > > > &g

RE: [PATCH] vhost: Unbreak SMMU and virtio-iommu on dev-iotlb support

2021-02-07 Thread Tian, Kevin
> From: Peter Xu > Sent: Friday, February 5, 2021 11:31 PM > > > > > > > > > >> or virtio-iommu > > >> since dev-iotlb (or PCIe ATS) > > > > > > > > > We may need to add this in the future. > > added Jean-Philippe in CC > > So that's the part I'm unsure about.. Since everybody is cced so maybe

RE: ENQCMD

2020-10-30 Thread Tian, Kevin
> From: Stefan Hajnoczi > Sent: Friday, October 30, 2020 3:51 PM > > Hi, > The "Scalable Work Submission in Device Virtualization" talk at KVM > Forum 2020 was interesting and I have some beginner questions about > ENQCMD: > https://static.sched.com/hosted_files/kvmforum2020/22/Scalable_Work_Su

RE: device compatibility interface for live migration with assigned devices

2020-09-11 Thread Tian, Kevin
> From: Cornelia Huck > Sent: Friday, September 11, 2020 6:08 PM > > On Fri, 11 Sep 2020 08:56:00 +0800 > Yan Zhao wrote: > > > On Thu, Sep 10, 2020 at 12:02:44PM -0600, Alex Williamson wrote: > > > On Thu, 10 Sep 2020 13:50:11 +0100 > > > Sean Mooney wrote: > > > > > > > On Thu, 2020-09-10

RE: [PATCH Kernel v24 0/8] Add UAPIs to support migration for VFIO devices

2020-07-21 Thread Tian, Kevin
> From: Xiang Zheng > Sent: Wednesday, July 22, 2020 10:56 AM > > Hi Alex, > > Thank you for your suggestion. > > On 2020/7/22 6:43, Alex Williamson wrote: > > On Tue, 21 Jul 2020 10:43:21 +0800 > > Xiang Zheng wrote: > > > >> Hi Kirti, > >> > >> Sorry to disturb you since this patch set has

RE: [PATCH Kernel v21 0/8] Add UAPIs to support migration for VFIO devices

2020-05-15 Thread Tian, Kevin
Hi, Kirti, Will you send out a new version in Qemu side, or previous v16 still applies? Thanks Kevin > From: Kirti Wankhede > Sent: Saturday, May 16, 2020 5:13 AM > > Hi, > > This patch set adds: > * IOCTL VFIO_IOMMU_DIRTY_PAGES to get dirty pages bitmap with > respect to IOMMU container

RE: [PATCH v5 0/4] introduction of migration_version attribute for VFIO live migration

2020-04-21 Thread Tian, Kevin
> From: Yan Zhao > Sent: Tuesday, April 21, 2020 10:37 AM > > On Tue, Apr 21, 2020 at 06:56:00AM +0800, Alex Williamson wrote: > > On Sun, 19 Apr 2020 21:24:57 -0400 > > Yan Zhao wrote: > > > > > On Fri, Apr 17, 2020 at 07:24:57PM +0800, Cornelia Huck wrote: > > > > On Fri, 17 Apr 2020 05:52:02

RE: [PATCH v15 Kernel 4/7] vfio iommu: Implementation of ioctl for dirty pages tracking.

2020-03-24 Thread Tian, Kevin
> From: Dr. David Alan Gilbert > Sent: Wednesday, March 25, 2020 4:23 AM > > * Alex Williamson (alex.william...@redhat.com) wrote: > > On Mon, 23 Mar 2020 23:01:18 -0400 > > Yan Zhao wrote: > > > > > On Tue, Mar 24, 2020 at 02:51:14AM +0800, Dr. David Alan Gilbert wrote: > > > > * Alex

RE: [PATCH v16 00/10] VIRTIO-IOMMU device

2020-03-04 Thread Tian, Kevin
> From: Jean-Philippe Brucker > Sent: Thursday, March 5, 2020 3:34 PM > > On Thu, Mar 05, 2020 at 02:56:20AM +, Tian, Kevin wrote: > > > From: Jean-Philippe Brucker > > > Sent: Thursday, March 5, 2020 12:47 AM > > > > > [...] > > >

RE: [PATCH v16 00/10] VIRTIO-IOMMU device

2020-03-04 Thread Tian, Kevin
> From: Jean-Philippe Brucker > Sent: Thursday, March 5, 2020 12:47 AM > [...] > > > > > > * We can't use DVM in nested mode unless the VMID is shared with the > > > CPU. For that we'll need the host SMMU driver to hook into the KVM > VMID > > > allocator, just like we do for the ASID allocator.

RE: [PATCH v9 Kernel 2/5] vfio iommu: Add ioctl defination to get dirty pages bitmap.

2019-11-19 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Wednesday, November 20, 2019 7:17 AM > > On Fri, 15 Nov 2019 05:10:53 +0000 > "Tian, Kevin" wrote: > > > > From: Alex Williamson > > > Sent: Friday, November 15, 2019 11:22 AM

RE: [PATCH v9 Kernel 2/5] vfio iommu: Add ioctl defination to get dirty pages bitmap.

2019-11-14 Thread Tian, Kevin
> From: Alex Williamson > Sent: Friday, November 15, 2019 11:22 AM > > On Thu, 14 Nov 2019 21:40:35 -0500 > Yan Zhao wrote: > > > On Fri, Nov 15, 2019 at 05:06:25AM +0800, Alex Williamson wrote: > > > On Fri, 15 Nov 2019 00:26:07 +0530 > > > Kirti Wankhede wrote: > > > > > > > On 11/14/2019

RE: [RFC v2 00/22] intel_iommu: expose Shared Virtual Addressing to VM

2019-11-02 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Friday, November 1, 2019 4:10 PM > > > On 2019/11/1 下午4:04, Jason Wang wrote: > > > > On 2019/11/1 下午3:46, Tian, Kevin wrote: > >>> From: Jason Wang [mailto:jasow...@redhat.com] >

RE: [RFC v2 00/22] intel_iommu: expose Shared Virtual Addressing to VM

2019-11-01 Thread Tian, Kevin
[RFC v2 00/22] intel_iommu: expose Shared Virtual > Addressing to VM > >> > >> > >> On 2019/10/25 下午6:12, Tian, Kevin wrote: > >>>> From: Jason Wang [mailto:jasow...@redhat.com] > >>>> Sent: Friday, October 25, 2019 5:49 PM > >>>

RE: [RFC v2 00/22] intel_iommu: expose Shared Virtual Addressing to VM

2019-10-30 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Thursday, October 31, 2019 12:33 PM > > > On 2019/10/25 下午6:12, Tian, Kevin wrote: > >> From: Jason Wang [mailto:jasow...@redhat.com] > >> Sent: Friday, October 25, 2019 5:49 PM > >> >

RE: [RFC v2 00/22] intel_iommu: expose Shared Virtual Addressing to VM

2019-10-25 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Friday, October 25, 2019 5:49 PM > > > On 2019/10/24 下午8:34, Liu Yi L wrote: > > Shared virtual address (SVA), a.k.a, Shared virtual memory (SVM) on Intel > > platforms allow address space sharing between device DMA and > applications. > >

RE: [PATCH v8 01/13] vfio: KABI for migration interface

2019-10-24 Thread Tian, Kevin
Sorry for late reply... > From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Friday, September 27, 2019 5:33 AM > > On Thu, 26 Sep 2019 03:07:08 +0000 > "Tian, Kevin" wrote: > > > > From: Alex Williamson [mailto:alex.william...@redhat.co

RE: [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-25 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Thursday, September 26, 2019 3:06 AM [...] > > > > The second point is about write-protection: > > > > > > > > > There is another value of recording GPA in VFIO. Vendor drivers > > > > > (e.g. GVT-g) may need to selectively

RE: [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-24 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Wednesday, September 25, 2019 2:03 AM > > On Tue, 24 Sep 2019 02:19:15 +0000 > "Tian, Kevin" wrote: > > > > From: Tian, Kevin > > > Sent: Friday, September 13, 20

RE: [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-23 Thread Tian, Kevin
> From: Tian, Kevin > Sent: Friday, September 13, 2019 7:00 AM > > > From: Alex Williamson [mailto:alex.william...@redhat.com] > > Sent: Thursday, September 12, 2019 10:41 PM > > > > On Tue, 3 Sep 2019 06:57:27 + > > "Tian, Kevin" wrote: >

RE: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-23 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Friday, September 20, 2019 9:19 AM > > On 2019/9/20 上午6:54, Tian, Kevin wrote: > >> From: Paolo Bonzini [mailto:pbonz...@redhat.com] > >> Sent: Thursday, September 19, 2019 7:14 PM > >> > >> O

RE: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-19 Thread Tian, Kevin
> From: Paolo Bonzini [mailto:pbonz...@redhat.com] > Sent: Thursday, September 19, 2019 7:14 PM > > On 19/09/19 09:16, Tian, Kevin wrote: > >>> why GPA1 and GPA2 should be both dirty? > >>> even they have the same HVA due to overlaping virtual address space

RE: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-19 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Friday, September 20, 2019 1:21 AM > > On Wed, 18 Sep 2019 07:21:05 +0000 > "Tian, Kevin" wrote: > > > > From: Jason Wang [mailto:jasow...@redhat.com] > > > Sent: Wednesday, Septemb

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-19 Thread Tian, Kevin
ao wrote: > >>> On Thu, Sep 19, 2019 at 09:05:12AM +0800, Jason Wang wrote: > >>>> On 2019/9/18 下午4:37, Tian, Kevin wrote: > >>>>>> From: Jason Wang [mailto:jasow...@redhat.com] > >>>>>> Sent: Wednesday, September 18, 2019 2:10 PM &

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-18 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Wednesday, September 18, 2019 2:10 PM > > >> > >> Note that the HVA to GPA mapping is not an 1:1 mapping. One HVA > range > >> could be mapped to several GPA ranges. > > This is fine. Currently vfio_dma maintains IOVA->HVA mapping. > > > >

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-18 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Wednesday, September 18, 2019 2:10 PM > > On 2019/9/18 上午9:44, Tian, Kevin wrote: > >> From: Jason Wang [mailto:jasow...@redhat.com] > >> Sent: Tuesday, September 17, 2019 6:36 PM > >> > >> On

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-18 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Wednesday, September 18, 2019 2:04 PM > > On 2019/9/18 上午9:31, Tian, Kevin wrote: > >> From: Alex Williamson [mailto:alex.william...@redhat.com] > >> Sent: Tuesday, September 17, 2019 10:54 PM > >>

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-17 Thread Tian, Kevin
> From: Tian, Kevin > Sent: Wednesday, September 18, 2019 9:32 AM > > > From: Alex Williamson [mailto:alex.william...@redhat.com] > > Sent: Tuesday, September 17, 2019 10:54 PM > > > > On Tue, 17 Sep 2019 08:48:36 + > > "Tian, Kevin"

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-17 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Tuesday, September 17, 2019 6:36 PM > > On 2019/9/17 下午4:48, Tian, Kevin wrote: > >> From: Jason Wang [mailto:jasow...@redhat.com] > >> Sent: Monday, September 16, 2019 4:33 PM > >> > >> >

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-17 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Tuesday, September 17, 2019 10:54 PM > > On Tue, 17 Sep 2019 08:48:36 +0000 > "Tian, Kevin" wrote: > > > > From: Jason Wang [mailto:jasow...@redhat.com] > > > Sent: Monday, Septembe

Re: [Qemu-devel] vhost, iova, and dirty page tracking

2019-09-17 Thread Tian, Kevin
> From: Jason Wang [mailto:jasow...@redhat.com] > Sent: Monday, September 16, 2019 4:33 PM > > > On 2019/9/16 上午9:51, Tian, Kevin wrote: > > Hi, Jason > > > > We had a discussion about dirty page tracking in VFIO, when vIOMMU > > is enabled: > > &

Re: [Qemu-devel] [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-15 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Friday, September 13, 2019 11:48 PM > > On Thu, 12 Sep 2019 23:00:03 +0000 > "Tian, Kevin" wrote: > > > > From: Alex Williamson [mailto:alex.william...@redhat.com] > > &g

[Qemu-devel] vhost, iova, and dirty page tracking

2019-09-15 Thread Tian, Kevin
Hi, Jason We had a discussion about dirty page tracking in VFIO, when vIOMMU is enabled: https://lists.nongnu.org/archive/html/qemu-devel/2019-09/msg02690.html It's actually a similar model as vhost - Qemu cannot interpose the fast-path DMAs thus relies on the kernel part to track and report

Re: [Qemu-devel] [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-12 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Thursday, September 12, 2019 10:41 PM > > On Tue, 3 Sep 2019 06:57:27 +0000 > "Tian, Kevin" wrote: > > > > From: Alex Williamson [mailto:alex.william...@redhat.com] > >

Re: [Qemu-devel] [PATCH for-4.2 v10 08/15] virtio-iommu: Implement map/unmap

2019-09-03 Thread Tian, Kevin
> From: Peter Xu [mailto:pet...@redhat.com] > Sent: Wednesday, September 4, 2019 1:37 PM > > On Wed, Sep 04, 2019 at 04:23:50AM +, Tian, Kevin wrote: > > > From: Peter Xu [mailto:pet...@redhat.com] > > > Sent: Wednesday, September 4, 2019 9:44 AM > > > &

Re: [Qemu-devel] [PATCH for-4.2 v10 08/15] virtio-iommu: Implement map/unmap

2019-09-03 Thread Tian, Kevin
> From: Peter Xu [mailto:pet...@redhat.com] > Sent: Wednesday, September 4, 2019 9:44 AM > > On Tue, Sep 03, 2019 at 01:37:11PM +0200, Auger Eric wrote: > > Hi Peter, > > > > On 8/19/19 10:11 AM, Peter Xu wrote: > > > On Tue, Jul 30, 2019 at 07:21:30PM +0200, Eric Auger wrote: > > > > > > [...] >

Re: [Qemu-devel] [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-03 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Saturday, August 31, 2019 12:33 AM > > On Fri, 30 Aug 2019 08:06:32 +0000 > "Tian, Kevin" wrote: > > > > From: Tian, Kevin > > > Sent: Friday, August 30, 2019 3:26 PM > &g

Re: [Qemu-devel] [PATCH v8 01/13] vfio: KABI for migration interface

2019-09-03 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Saturday, August 31, 2019 12:15 AM > > On Fri, 30 Aug 2019 07:25:59 +0000 > "Tian, Kevin" wrote: > > > > From: Alex Williamson [mailto:alex.william...@redhat.com] > > > Sent: Thursd

Re: [Qemu-devel] [PATCH v8 01/13] vfio: KABI for migration interface

2019-08-30 Thread Tian, Kevin
> From: Tian, Kevin > Sent: Friday, August 30, 2019 3:26 PM > [...] > > How does QEMU handle the fact that IOVAs are potentially dynamic while > > performing the live portion of a migration? For example, each time a > > guest driver calls dma_m

Re: [Qemu-devel] [PATCH v8 01/13] vfio: KABI for migration interface

2019-08-30 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Thursday, August 29, 2019 4:51 AM > > On Tue, 27 Aug 2019 00:25:41 +0530 > Kirti Wankhede wrote: > > > - Defined MIGRATION region type and sub-type. > > - Used 3 bits to define VFIO device states. > > Bit 0 => _RUNNING > >

Re: [Qemu-devel] [PATCH v7 04/13] vfio: Add save and load functions for VFIO PCI devices

2019-08-23 Thread Tian, Kevin
> From: Dr. David Alan Gilbert [mailto:dgilb...@redhat.com] > Sent: Friday, August 23, 2019 5:27 PM > > * Tian, Kevin (kevin.t...@intel.com) wrote: > > > From: Dr. David Alan Gilbert [mailto:dgilb...@redhat.com] > > > Sent: Friday, August 23, 2019 3:13 AM > &

Re: [Qemu-devel] [PATCH v7 04/13] vfio: Add save and load functions for VFIO PCI devices

2019-08-22 Thread Tian, Kevin
> From: Dr. David Alan Gilbert [mailto:dgilb...@redhat.com] > Sent: Friday, August 23, 2019 3:13 AM > > * Kirti Wankhede (kwankh...@nvidia.com) wrote: > > > > > > On 8/22/2019 3:02 PM, Dr. David Alan Gilbert wrote: > > > * Kirti Wankhede (kwankh...@nvidia.com) wrote: > > >> Sorry for delay to

Re: [Qemu-devel] [PATCH for-4.2 v10 11/15] virtio-iommu: Expose the IOAPIC MSI reserved region when relevant

2019-07-31 Thread Tian, Kevin
> From: Auger Eric [mailto:eric.au...@redhat.com] > Sent: Thursday, August 1, 2019 3:45 AM > > Hi Michael, > > On 7/31/19 9:25 PM, Michael S. Tsirkin wrote: > > On Tue, Jul 30, 2019 at 11:20:44PM +, Tian, Kevin wrote: > >>> From: Michael S. Tsirkin

Re: [Qemu-devel] [PATCH for-4.2 v10 11/15] virtio-iommu: Expose the IOAPIC MSI reserved region when relevant

2019-07-30 Thread Tian, Kevin
> From: Michael S. Tsirkin [mailto:m...@redhat.com] > Sent: Wednesday, July 31, 2019 3:38 AM > > On Tue, Jul 30, 2019 at 07:21:33PM +0200, Eric Auger wrote: > > We introduce a new msi_bypass field which indicates whether > > the IOAPIC MSI window [0xFEE0 - 0xFEEF] must be exposed it's

Re: [Qemu-devel] QEMU and vIOMMU support for emulated VF passthrough to nested (L2) VM

2019-04-07 Thread Tian, Kevin
> From: Elijah Shakkour [mailto:elija...@mellanox.com] > Sent: Sunday, April 7, 2019 9:47 PM > > > > -Original Message----- > > From: Tian, Kevin > > Sent: Thursday, April 4, 2019 10:58 AM > > To: Peter Xu ; Elijah Shakkour > > > > Cc: Knut

Re: [Qemu-devel] QEMU and vIOMMU support for emulated VF passthrough to nested (L2) VM

2019-04-04 Thread Tian, Kevin
> From: Peter Xu [mailto:pet...@redhat.com] > Sent: Thursday, April 4, 2019 3:00 PM > > On Wed, Apr 03, 2019 at 10:10:35PM +, Elijah Shakkour wrote: > > [...] > > > > > > > > > You can also try to enable VT-d device log by appending: > > > > > > > > > > > > > > > > -trace enable="vtd_*" >

Re: [Qemu-devel] [PATCH 0/5] QEMU VFIO live migration

2019-03-11 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Tuesday, March 12, 2019 4:19 AM > On Mon, 11 Mar 2019 02:33:11 +0000 > "Tian, Kevin" wrote: > [...] > > I think I've fully conceded any notion of security by obscurity towards > opaque d

Re: [Qemu-devel] [PATCH 0/5] QEMU VFIO live migration

2019-03-10 Thread Tian, Kevin
> From: Alex Williamson > Sent: Saturday, March 9, 2019 6:03 AM > > On Fri, 8 Mar 2019 16:21:46 + > "Dr. David Alan Gilbert" wrote: > > > * Alex Williamson (alex.william...@redhat.com) wrote: > > > On Thu, 7 Mar 2019 23:20:36 + > > &

Re: [Qemu-devel] [PATCH 0/5] QEMU VFIO live migration

2019-03-07 Thread Tian, Kevin
> From: Alex Williamson [mailto:alex.william...@redhat.com] > Sent: Friday, March 8, 2019 1:44 AM > > > > > > > This kind of data needs to be saved / loaded in pre-copy and > > > > stop-and-copy phase. > > > > The data of device memory is held in device memory region. > > >

Re: [Qemu-devel] [RFC v2 0/3] intel_iommu: support scalable mode

2019-02-28 Thread Tian, Kevin
> From: Yi Sun [mailto:yi.y@linux.intel.com] > Sent: Friday, March 1, 2019 3:13 PM > > On 19-03-01 15:07:34, Peter Xu wrote: > > On Thu, Feb 28, 2019 at 09:47:54PM +0800, Yi Sun wrote: > > > Intel vt-d rev3.0 [1] introduces a new translation mode called > > > 'scalable mode', which enables

Re: [Qemu-devel] [PATCH v3 0/5] Add migration support for VFIO device

2019-02-26 Thread Tian, Kevin
> From: Neo Jia [mailto:c...@nvidia.com] > Sent: Thursday, February 21, 2019 3:10 PM > > On Thu, Feb 21, 2019 at 05:52:53AM +, Tian, Kevin wrote: > > > From: Kirti Wankhede [mailto:kwankh...@nvidia.com] > > > Sent: Thursday, February 21, 2019 1:25 PM > &

Re: [Qemu-devel] [PATCH v3 0/5] Add migration support for VFIO device

2019-02-20 Thread Tian, Kevin
> From: Kirti Wankhede [mailto:kwankh...@nvidia.com] > Sent: Thursday, February 21, 2019 1:25 PM > > On 2/20/2019 3:52 PM, Dr. David Alan Gilbert wrote: > > * Kirti Wankhede (kwankh...@nvidia.com) wrote: > >> Add migration support for VFIO device > > > > Hi Kirti, > > Can you explain how this

Re: [Qemu-devel] [RFC v1 2/3] intel_iommu: add 256 bits qi_desc support

2019-02-14 Thread Tian, Kevin
> From: Peter Xu [mailto:pet...@redhat.com] > Sent: Thursday, February 14, 2019 4:13 PM > > On Thu, Feb 14, 2019 at 07:35:20AM +, Tian, Kevin wrote: > > > From: Peter Xu [mailto:pet...@redhat.com] > > > Sent: Thursday, February 14, 2019 3:14 PM > &g

Re: [Qemu-devel] [RFC v1 2/3] intel_iommu: add 256 bits qi_desc support

2019-02-13 Thread Tian, Kevin
> From: Peter Xu [mailto:pet...@redhat.com] > Sent: Thursday, February 14, 2019 3:14 PM > > > > > > When 256 bits invalidation descriptor is used, the guest driver > > > should be responsible to fill in zeros into reserved fields. > > > > > > Another question: is val[2] & val[3] used in any place

Re: [Qemu-devel] [PATCH v3 2/2] intel-iommu: extend VTD emulation to allow 57-bit IOVA address width.

2018-12-24 Thread Tian, Kevin
> From: Yu Zhang > Sent: Saturday, December 22, 2018 1:34 AM > [...] > > > > > As to the check against hardware IOMMU, Peter once had a proposal in > > > http://lists.nongnu.org/archive/html/qemu-devel/2018- > 11/msg02281.html > > > > > > Do you have any comment or suggestion on Peter's proposal?

Re: [Qemu-devel] [PATCH 1/5] VFIO KABI for migration interface

2018-11-25 Thread Tian, Kevin
> From: Kirti Wankhede [mailto:kwankh...@nvidia.com] > Sent: Friday, November 23, 2018 4:02 AM > [...] > > > > I looked at the explanations in this patch, but still didn't get the > > intention, > e.g.: > > > > + * - VFIO_DEVICE_STATE_MIGRATION_SETUP: > > + * Transition VFIO device in

Re: [Qemu-devel] [PATCH 1/5] VFIO KABI for migration interface

2018-11-20 Thread Tian, Kevin
> From: Kirti Wankhede [mailto:kwankh...@nvidia.com] > Sent: Wednesday, November 21, 2018 12:24 PM > > > On 11/21/2018 5:56 AM, Tian, Kevin wrote: > >> From: Kirti Wankhede [mailto:kwankh...@nvidia.com] > >> Sent: Wednesday, November 21, 2018 4:40 AM > >

Re: [Qemu-devel] [PATCH 1/5] VFIO KABI for migration interface

2018-11-20 Thread Tian, Kevin
> From: Kirti Wankhede [mailto:kwankh...@nvidia.com] > Sent: Wednesday, November 21, 2018 4:40 AM > > - Defined MIGRATION region type and sub-type. > - Defined VFIO device states during migration process. > - Defined vfio_device_migration_info structure which will be placed at 0th > offset of

  1   2   3   4   >