From: Harman Kalra <hkalra@marvell.com>
To: Haiyue Wang <haiyue.wang@intel.com>
Cc: <dev@dpdk.org>, <anatoly.burakov@intel.com>,
<thomas@monjalon.net>, <jerinj@marvell.com>,
<david.marchand@redhat.com>, <arybchenko@solarflare.com>,
<xiaolong.ye@intel.com>
Subject: Re: [dpdk-dev] [PATCH v16 2/2] eal: support for VFIO-PCI VF token
Date: Tue, 23 Jun 2020 02:09:15 +0530 [thread overview]
Message-ID: <20200622203914.GA60728@outlook.office365.com> (raw)
In-Reply-To: <20200617063321.52709-3-haiyue.wang@intel.com>
On Wed, Jun 17, 2020 at 02:33:21PM +0800, Haiyue Wang wrote:
> The kernel module vfio-pci introduces the VF token to enable SR-IOV
> support since 5.7.
>
> The VF token can be set by a vfio-pci based PF driver and must be known
> by the vfio-pci based VF driver in order to gain access to the device.
>
> Signed-off-by: Haiyue Wang <haiyue.wang@intel.com>
> Acked-by: Anatoly Burakov <anatoly.burakov@intel.com>
> Acked-by: Andrew Rybchenko <arybchenko@solarflare.com>
> ---
Tested-by: Harman Kalra <hkalra@marvell.com>
> doc/guides/linux_gsg/linux_drivers.rst | 35 ++++++++++++++++++-
> doc/guides/linux_gsg/linux_eal_parameters.rst | 4 +++
> doc/guides/rel_notes/release_20_08.rst | 5 +++
> lib/librte_eal/common/eal_common_options.c | 2 ++
> lib/librte_eal/common/eal_internal_cfg.h | 2 ++
> lib/librte_eal/common/eal_options.h | 2 ++
> lib/librte_eal/freebsd/eal.c | 4 +++
> lib/librte_eal/include/rte_eal.h | 15 ++++++++
> lib/librte_eal/linux/eal.c | 29 +++++++++++++++
> lib/librte_eal/linux/eal_vfio.c | 19 ++++++++++
> lib/librte_eal/rte_eal_version.map | 1 +
> 11 files changed, 117 insertions(+), 1 deletion(-)
>
> diff --git a/doc/guides/linux_gsg/linux_drivers.rst b/doc/guides/linux_gsg/linux_drivers.rst
> index d40b495c1..02fba7d1e 100644
> --- a/doc/guides/linux_gsg/linux_drivers.rst
> +++ b/doc/guides/linux_gsg/linux_drivers.rst
> @@ -78,11 +78,44 @@ Note that in order to use VFIO, your kernel must support it.
> VFIO kernel modules have been included in the Linux kernel since version 3.6.0 and are usually present by default,
> however please consult your distributions documentation to make sure that is the case.
>
> +The ``vfio-pci`` module since Linux version 5.7 supports the creation of virtual
> +functions. After the PF is bound to vfio-pci module, the user can create the VFs
> +by sysfs interface, and these VFs are bound to vfio-pci module automatically.
> +
> +When the PF is bound to vfio-pci, it has initial VF token generated by random. For
> +security reason, this token is write only, the user can't read it from the kernel
> +directly. For accessing the VF, the user needs to start the PF with token parameter
> +to setup a VF token (uuid format), then the VF can be accessed with this new known
> +VF token.
> +
> +DPDK will use the EAL parameter ``--vfio-vf-token`` to specify the VF token value to
> +PF and its related VFs, this VF token will be shared in all VFIO devices, including
> +the different PFs.
> +
> +.. code-block:: console
> +
> + 1. Generate the VF token by uuid command
> + 14d63f20-8445-11ea-8900-1f9ce7d5650d
> +
> + 2. sudo modprobe vfio-pci enable_sriov=1
> +
> + 2. ./usertools/dpdk-devbind.py -b vfio-pci 0000:86:00.0
> +
> + 3. echo 2 > /sys/bus/pci/devices/0000:86:00.0/sriov_numvfs
> +
> + 4. Start the PF:
> + ./x86_64-native-linux-gcc/app/testpmd -l 22-25 -n 4 -w 86:00.0 \
> + --vfio-vf-token=14d63f20-8445-11ea-8900-1f9ce7d5650d --file-prefix=pf -- -i
> +
> + 5. Start the VF:
> + ./x86_64-native-linux-gcc/app/testpmd -l 26-29 -n 4 -w 86:02.0 \
> + --vfio-vf-token=14d63f20-8445-11ea-8900-1f9ce7d5650d --file-prefix=vf0 -- -i
> +
> Also, to use VFIO, both kernel and BIOS must support and be configured to use IO virtualization (such as Intel® VT-d).
>
> .. note::
>
> - ``vfio-pci`` module doesn't support the creation of virtual functions.
> + ``vfio-pci`` module doesn't support the creation of virtual functions before Linux version 5.7.
>
> For proper operation of VFIO when running DPDK applications as a non-privileged user, correct permissions should also be set up.
> This can be done by using the DPDK setup script (called dpdk-setup.sh and located in the usertools directory).
> diff --git a/doc/guides/linux_gsg/linux_eal_parameters.rst b/doc/guides/linux_gsg/linux_eal_parameters.rst
> index b2cc60e44..bd3977cb3 100644
> --- a/doc/guides/linux_gsg/linux_eal_parameters.rst
> +++ b/doc/guides/linux_gsg/linux_eal_parameters.rst
> @@ -40,6 +40,10 @@ Device-related options
>
> Use specified interrupt mode for devices bound to VFIO kernel driver.
>
> +* ``--vfio-vf-token <uuid>``
> +
> + Use specified VF token for devices bound to VFIO kernel driver.
> +
> Multiprocessing-related options
> ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>
> diff --git a/doc/guides/rel_notes/release_20_08.rst b/doc/guides/rel_notes/release_20_08.rst
> index 86d240213..ca7fd521b 100644
> --- a/doc/guides/rel_notes/release_20_08.rst
> +++ b/doc/guides/rel_notes/release_20_08.rst
> @@ -62,6 +62,11 @@ New Features
>
> * Added new PMD devarg ``reclaim_mem_mode``.
>
> +* **Added the support for vfio-pci new VF token interface.**
> +
> + Since Linux version 5.7, vfio-pci supports a shared VF token (UUID) to represent
> + the trust between SR-IOV PF and the created VFs. Update the method to gain access
> + to the PF and VFs devices by appending the VF token parameter.
>
> Removed Items
> -------------
> diff --git a/lib/librte_eal/common/eal_common_options.c b/lib/librte_eal/common/eal_common_options.c
> index 0546beb3a..fc889309c 100644
> --- a/lib/librte_eal/common/eal_common_options.c
> +++ b/lib/librte_eal/common/eal_common_options.c
> @@ -94,6 +94,7 @@ eal_long_options[] = {
> {OPT_SYSLOG, 1, NULL, OPT_SYSLOG_NUM },
> {OPT_VDEV, 1, NULL, OPT_VDEV_NUM },
> {OPT_VFIO_INTR, 1, NULL, OPT_VFIO_INTR_NUM },
> + {OPT_VFIO_VF_TOKEN, 1, NULL, OPT_VFIO_VF_TOKEN_NUM },
> {OPT_VMWARE_TSC_MAP, 0, NULL, OPT_VMWARE_TSC_MAP_NUM },
> {OPT_LEGACY_MEM, 0, NULL, OPT_LEGACY_MEM_NUM },
> {OPT_SINGLE_FILE_SEGMENTS, 0, NULL, OPT_SINGLE_FILE_SEGMENTS_NUM},
> @@ -301,6 +302,7 @@ eal_reset_internal_config(struct internal_config *internal_cfg)
>
> /* if set to NONE, interrupt mode is determined automatically */
> internal_cfg->vfio_intr_mode = RTE_INTR_MODE_NONE;
> + memset(internal_cfg->vfio_vf_token, 0, sizeof(rte_uuid_t));
>
> #ifdef RTE_LIBEAL_USE_HPET
> internal_cfg->no_hpet = 0;
> diff --git a/lib/librte_eal/common/eal_internal_cfg.h b/lib/librte_eal/common/eal_internal_cfg.h
> index c650bc081..43095b7a2 100644
> --- a/lib/librte_eal/common/eal_internal_cfg.h
> +++ b/lib/librte_eal/common/eal_internal_cfg.h
> @@ -72,6 +72,8 @@ struct internal_config {
> volatile int syslog_facility; /**< facility passed to openlog() */
> /** default interrupt mode for VFIO */
> volatile enum rte_intr_mode vfio_intr_mode;
> + /** the shared VF token for VFIO-PCI bound PF and VFs devices */
> + rte_uuid_t vfio_vf_token;
> char *hugefile_prefix; /**< the base filename of hugetlbfs files */
> char *hugepage_dir; /**< specific hugetlbfs directory to use */
> char *user_mbuf_pool_ops_name;
> diff --git a/lib/librte_eal/common/eal_options.h b/lib/librte_eal/common/eal_options.h
> index 18e6da9ab..89769d48b 100644
> --- a/lib/librte_eal/common/eal_options.h
> +++ b/lib/librte_eal/common/eal_options.h
> @@ -69,6 +69,8 @@ enum {
> OPT_VDEV_NUM,
> #define OPT_VFIO_INTR "vfio-intr"
> OPT_VFIO_INTR_NUM,
> +#define OPT_VFIO_VF_TOKEN "vfio-vf-token"
> + OPT_VFIO_VF_TOKEN_NUM,
> #define OPT_VMWARE_TSC_MAP "vmware-tsc-map"
> OPT_VMWARE_TSC_MAP_NUM,
> #define OPT_LEGACY_MEM "legacy-mem"
> diff --git a/lib/librte_eal/freebsd/eal.c b/lib/librte_eal/freebsd/eal.c
> index c41f265fa..4ff5028d8 100644
> --- a/lib/librte_eal/freebsd/eal.c
> +++ b/lib/librte_eal/freebsd/eal.c
> @@ -1005,6 +1005,10 @@ rte_eal_vfio_intr_mode(void)
> return RTE_INTR_MODE_NONE;
> }
>
> +void rte_eal_vfio_get_vf_token(__rte_unused rte_uuid_t vf_token)
> +{
> +}
> +
> int rte_vfio_setup_device(__rte_unused const char *sysfs_base,
> __rte_unused const char *dev_addr,
> __rte_unused int *vfio_dev_fd,
> diff --git a/lib/librte_eal/include/rte_eal.h b/lib/librte_eal/include/rte_eal.h
> index 2f9ed298d..2f47347dc 100644
> --- a/lib/librte_eal/include/rte_eal.h
> +++ b/lib/librte_eal/include/rte_eal.h
> @@ -21,6 +21,7 @@
> #include <rte_bus.h>
>
> #include <rte_pci_dev_feature_defs.h>
> +#include <rte_uuid.h>
>
> #ifdef __cplusplus
> extern "C" {
> @@ -438,6 +439,20 @@ int rte_eal_create_uio_dev(void);
> */
> enum rte_intr_mode rte_eal_vfio_intr_mode(void);
>
> +
> +/**
> + * @warning
> + * @b EXPERIMENTAL: this API may change without prior notice
> + *
> + * Copy the user-configured vfio VF token.
> + *
> + * @param vf_token
> + * vfio VF token configured with the command line is copied
> + * into this parameter, zero uuid by default.
> + */
> +__rte_experimental
> +void rte_eal_vfio_get_vf_token(rte_uuid_t vf_token);
> +
> /**
> * A wrap API for syscall gettid.
> *
> diff --git a/lib/librte_eal/linux/eal.c b/lib/librte_eal/linux/eal.c
> index f162124a3..00f3fdced 100644
> --- a/lib/librte_eal/linux/eal.c
> +++ b/lib/librte_eal/linux/eal.c
> @@ -558,6 +558,7 @@ eal_usage(const char *prgname)
> " --"OPT_FILE_PREFIX" Prefix for hugepage filenames\n"
> " --"OPT_CREATE_UIO_DEV" Create /dev/uioX (usually done by hotplug)\n"
> " --"OPT_VFIO_INTR" Interrupt mode for VFIO (legacy|msi|msix)\n"
> + " --"OPT_VFIO_VF_TOKEN" VF token (UUID) shared between SR-IOV PF and VFs\n"
> " --"OPT_LEGACY_MEM" Legacy memory mode (no dynamic allocation, contiguous segments)\n"
> " --"OPT_SINGLE_FILE_SEGMENTS" Put all hugepage memory in single files\n"
> " --"OPT_MATCH_ALLOCATIONS" Free hugepages exactly as allocated\n"
> @@ -649,6 +650,19 @@ eal_parse_vfio_intr(const char *mode)
> return -1;
> }
>
> +static int
> +eal_parse_vfio_vf_token(const char *vf_token)
> +{
> + rte_uuid_t uuid;
> +
> + if (!rte_uuid_parse(vf_token, uuid)) {
> + rte_uuid_copy(internal_config.vfio_vf_token, uuid);
> + return 0;
> + }
> +
> + return -1;
> +}
> +
> /* Parse the arguments for --log-level only */
> static void
> eal_log_level_parse(int argc, char **argv)
> @@ -787,6 +801,16 @@ eal_parse_args(int argc, char **argv)
> }
> break;
>
> + case OPT_VFIO_VF_TOKEN_NUM:
> + if (eal_parse_vfio_vf_token(optarg) < 0) {
> + RTE_LOG(ERR, EAL, "invalid parameters for --"
> + OPT_VFIO_VF_TOKEN "\n");
> + eal_usage(prgname);
> + ret = -1;
> + goto out;
> + }
> + break;
> +
> case OPT_CREATE_UIO_DEV_NUM:
> internal_config.create_uio_dev = 1;
> break;
> @@ -1370,6 +1394,11 @@ rte_eal_vfio_intr_mode(void)
> return internal_config.vfio_intr_mode;
> }
>
> +void rte_eal_vfio_get_vf_token(rte_uuid_t vf_token)
> +{
> + rte_uuid_copy(vf_token, internal_config.vfio_vf_token);
> +}
> +
> int
> rte_eal_check_module(const char *module_name)
> {
> diff --git a/lib/librte_eal/linux/eal_vfio.c b/lib/librte_eal/linux/eal_vfio.c
> index d26e1649a..5b2f6b305 100644
> --- a/lib/librte_eal/linux/eal_vfio.c
> +++ b/lib/librte_eal/linux/eal_vfio.c
> @@ -712,6 +712,7 @@ rte_vfio_setup_device(const char *sysfs_base, const char *dev_addr,
> int vfio_container_fd;
> int vfio_group_fd;
> int iommu_group_num;
> + rte_uuid_t vf_token;
> int i, ret;
>
> /* get group number */
> @@ -895,6 +896,23 @@ rte_vfio_setup_device(const char *sysfs_base, const char *dev_addr,
> t->type_id, t->name);
> }
>
> + rte_eal_vfio_get_vf_token(vf_token);
> +
> + /* get a file descriptor for the device with VF token firstly */
> + if (!rte_uuid_is_null(vf_token)) {
> + char vf_token_str[RTE_UUID_STRLEN];
> + char dev[PATH_MAX];
> +
> + rte_uuid_unparse(vf_token, vf_token_str, sizeof(vf_token_str));
> + snprintf(dev, sizeof(dev),
> + "%s vf_token=%s", dev_addr, vf_token_str);
> +
> + *vfio_dev_fd = ioctl(vfio_group_fd, VFIO_GROUP_GET_DEVICE_FD,
> + dev);
> + if (*vfio_dev_fd >= 0)
> + goto dev_get_info;
> + }
> +
> /* get a file descriptor for the device */
> *vfio_dev_fd = ioctl(vfio_group_fd, VFIO_GROUP_GET_DEVICE_FD, dev_addr);
> if (*vfio_dev_fd < 0) {
> @@ -909,6 +927,7 @@ rte_vfio_setup_device(const char *sysfs_base, const char *dev_addr,
> return -1;
> }
>
> +dev_get_info:
> /* test and setup the device */
> ret = ioctl(*vfio_dev_fd, VFIO_DEVICE_GET_INFO, device_info);
> if (ret) {
> diff --git a/lib/librte_eal/rte_eal_version.map b/lib/librte_eal/rte_eal_version.map
> index 196eef5af..16c8de27e 100644
> --- a/lib/librte_eal/rte_eal_version.map
> +++ b/lib/librte_eal/rte_eal_version.map
> @@ -372,6 +372,7 @@ EXPERIMENTAL {
> __rte_trace_point_register;
> per_lcore_trace_mem;
> per_lcore_trace_point_sz;
> + rte_eal_vfio_get_vf_token;
> rte_log_can_log;
> rte_thread_getname;
> rte_trace_dump;
> --
> 2.27.0
>
next prev parent reply other threads:[~2020-06-22 20:39 UTC|newest]
Thread overview: 92+ messages / expand[flat|nested] mbox.gz Atom feed top
2020-03-05 4:33 [dpdk-dev] [RFC v1 1/1] vfio: set vf token and gain vf device access vattunuru
2020-04-01 3:14 ` Varghese, Vipin
2020-04-10 7:10 ` Vamsi Krishna Attunuru
2020-04-02 12:43 ` Wang, Haiyue
2020-04-10 7:28 ` Vamsi Krishna Attunuru
2020-04-10 7:43 ` Wang, Haiyue
2020-04-10 7:32 ` [dpdk-dev] [RFC v2] eal: add VFIO-PCI SR-IOV support Haiyue Wang
2020-04-10 13:02 ` [dpdk-dev] [EXT] " Vamsi Krishna Attunuru
2020-04-13 2:31 ` [dpdk-dev] [PATCH v1] " Haiyue Wang
2020-04-13 4:45 ` [dpdk-dev] [PATCH v2] " Haiyue Wang
2020-04-13 6:42 ` [dpdk-dev] [PATCH v3] " Haiyue Wang
2020-04-13 8:29 ` [dpdk-dev] [PATCH v4] " Haiyue Wang
2020-04-13 12:18 ` Thomas Monjalon
2020-04-13 17:01 ` Wang, Haiyue
2020-04-13 15:37 ` Andrew Rybchenko
2020-04-13 16:45 ` Wang, Haiyue
2020-04-14 3:06 ` [dpdk-dev] [PATCH v5 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-04-14 3:06 ` [dpdk-dev] [PATCH v5 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-04-14 3:06 ` [dpdk-dev] [PATCH v5 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-04-14 3:21 ` [dpdk-dev] [PATCH v6 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-04-14 3:21 ` [dpdk-dev] [PATCH v6 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-04-14 3:21 ` [dpdk-dev] [PATCH v6 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-04-14 13:18 ` [dpdk-dev] [EXT] [PATCH v6 0/2] support for VFIO-PCI VF token interface Vamsi Krishna Attunuru
2020-04-18 9:22 ` [dpdk-dev] " David Marchand
2020-04-18 9:38 ` Wang, Haiyue
2020-04-18 9:50 ` Thomas Monjalon
2020-04-18 9:58 ` Wang, Haiyue
2020-04-18 11:16 ` [dpdk-dev] [PATCH v7 " Haiyue Wang
2020-04-18 11:16 ` [dpdk-dev] [PATCH v7 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-04-18 11:16 ` [dpdk-dev] [PATCH v7 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-04-18 13:26 ` Thomas Monjalon
2020-04-18 17:37 ` Wang, Haiyue
2020-04-18 17:30 ` [dpdk-dev] [PATCH v8 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-04-18 17:30 ` [dpdk-dev] [PATCH v8 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-04-18 17:30 ` [dpdk-dev] [PATCH v8 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-04-20 17:12 ` Thomas Monjalon
2020-04-20 16:53 ` [dpdk-dev] [PATCH v8 0/2] support for VFIO-PCI VF token interface David Marchand
2020-04-20 17:02 ` Wang, Haiyue
2020-04-20 17:13 ` Thomas Monjalon
2020-04-20 17:37 ` Wang, Haiyue
2020-04-20 17:42 ` Thomas Monjalon
2020-04-21 1:38 ` Wang, Haiyue
2020-04-21 2:12 ` Thomas Monjalon
2020-04-21 2:52 ` Wang, Haiyue
2020-04-21 8:47 ` Thomas Monjalon
2020-04-21 17:35 ` Wang, Haiyue
2020-04-22 5:08 ` [dpdk-dev] [PATCH v9 " Haiyue Wang
2020-04-22 5:08 ` [dpdk-dev] [PATCH v9 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-04-22 5:08 ` [dpdk-dev] [PATCH v9 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-04-22 8:23 ` Thomas Monjalon
2020-04-22 14:02 ` Wang, Haiyue
2020-04-26 1:55 ` [dpdk-dev] [PATCH v10 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-04-26 1:55 ` [dpdk-dev] [PATCH v10 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-04-26 1:55 ` [dpdk-dev] [PATCH v10 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-04-27 11:18 ` Burakov, Anatoly
2020-05-06 16:40 ` Andrew Rybchenko
2020-05-05 7:46 ` [dpdk-dev] [PATCH v11 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-05-05 7:46 ` [dpdk-dev] [PATCH v11 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-05-05 7:46 ` [dpdk-dev] [PATCH v11 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-05-05 10:34 ` [dpdk-dev] [PATCH v12 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-05-05 10:34 ` [dpdk-dev] [PATCH v12 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-05-05 10:34 ` [dpdk-dev] [PATCH v12 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-05-06 10:27 ` Burakov, Anatoly
2020-05-06 11:35 ` Wang, Haiyue
2020-05-06 11:39 ` Burakov, Anatoly
2020-05-06 11:44 ` Wang, Haiyue
2020-05-06 11:35 ` [dpdk-dev] [PATCH v13 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-05-06 11:35 ` [dpdk-dev] [PATCH v13 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-05-06 11:35 ` [dpdk-dev] [PATCH v13 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-05-06 16:51 ` Andrew Rybchenko
2020-05-06 16:56 ` Wang, Haiyue
2020-05-06 16:58 ` Andrew Rybchenko
2020-05-06 17:06 ` Wang, Haiyue
2020-05-28 1:22 ` [dpdk-dev] [PATCH v14 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-05-28 1:22 ` [dpdk-dev] [PATCH v14 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-05-28 1:22 ` [dpdk-dev] [PATCH v14 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-05-29 1:26 ` Ye Xiaolong
2020-05-29 1:38 ` Wang, Haiyue
2020-05-29 1:37 ` [dpdk-dev] [PATCH v15 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-05-29 1:37 ` [dpdk-dev] [PATCH v15 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-05-29 1:37 ` [dpdk-dev] [PATCH v15 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-06-17 6:33 ` [dpdk-dev] [PATCH v16 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-06-17 6:33 ` [dpdk-dev] [PATCH v16 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-06-17 6:33 ` [dpdk-dev] [PATCH v16 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-06-22 20:39 ` Harman Kalra [this message]
2020-06-25 7:33 ` David Marchand
2020-06-25 10:49 ` Wang, Haiyue
2020-07-03 14:57 ` [dpdk-dev] [PATCH v17 0/2] support for VFIO-PCI VF token interface Haiyue Wang
2020-07-03 14:57 ` [dpdk-dev] [PATCH v17 1/2] eal: add uuid dependent header files explicitly Haiyue Wang
2020-07-06 14:32 ` David Marchand
2020-07-03 14:57 ` [dpdk-dev] [PATCH v17 2/2] eal: support for VFIO-PCI VF token Haiyue Wang
2020-07-07 12:05 ` David Marchand
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200622203914.GA60728@outlook.office365.com \
--to=hkalra@marvell.com \
--cc=anatoly.burakov@intel.com \
--cc=arybchenko@solarflare.com \
--cc=david.marchand@redhat.com \
--cc=dev@dpdk.org \
--cc=haiyue.wang@intel.com \
--cc=jerinj@marvell.com \
--cc=thomas@monjalon.net \
--cc=xiaolong.ye@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).