From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mx1.redhat.com (mx1.redhat.com [209.132.183.28]) by dpdk.org (Postfix) with ESMTP id 43A2736E for ; Wed, 30 Sep 2015 23:54:02 +0200 (CEST) Received: from int-mx10.intmail.prod.int.phx2.redhat.com (int-mx10.intmail.prod.int.phx2.redhat.com [10.5.11.23]) by mx1.redhat.com (Postfix) with ESMTPS id A03258F2FE; Wed, 30 Sep 2015 21:54:01 +0000 (UTC) Received: from redhat.com (ovpn-116-83.ams2.redhat.com [10.36.116.83]) by int-mx10.intmail.prod.int.phx2.redhat.com (8.14.4/8.14.4) with SMTP id t8ULrvYa002406; Wed, 30 Sep 2015 17:53:58 -0400 Date: Thu, 1 Oct 2015 00:53:56 +0300 From: "Michael S. Tsirkin" To: Stephen Hemminger Message-ID: <20151001005104-mutt-send-email-mst@redhat.com> References: <560BD284.7040505@cloudius-systems.com> <20150930151632-mutt-send-email-mst@redhat.com> <560BDA81.6070807@cloudius-systems.com> <20150930182155-mutt-send-email-mst@redhat.com> <560C26DC.80209@cloudius-systems.com> <20150930215027-mutt-send-email-mst@redhat.com> <560C32CC.90708@cloudius-systems.com> <20150930222910-mutt-send-email-mst@redhat.com> <560C417D.1050409@cloudius-systems.com> <20150930143648.4b98db81@urahara> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20150930143648.4b98db81@urahara> X-Scanned-By: MIMEDefang 2.68 on 10.5.11.23 Cc: "dev@dpdk.org" Subject: Re: [dpdk-dev] Having troubles binding an SR-IOV VF to uio_pci_generic on Amazon instance X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Sep 2015 21:54:02 -0000 On Wed, Sep 30, 2015 at 02:36:48PM -0700, Stephen Hemminger wrote: > On Wed, 30 Sep 2015 23:09:33 +0300 > Vlad Zolotarov wrote: > > > > > > > On 09/30/15 22:39, Michael S. Tsirkin wrote: > > > On Wed, Sep 30, 2015 at 10:06:52PM +0300, Vlad Zolotarov wrote: > > >>>> How would iommu > > >>>> virtualization change anything? > > >>> Kernel can use an iommu to limit device access to memory of > > >>> the controlling application. > > >> Ok, this is obvious but what it has to do with enabling using MSI/MSI-X > > >> interrupts support in uio_pci_generic? kernel may continue to limit the > > >> above access with this support as well. > > > It could maybe. So if you write a patch to allow MSI by at the same time > > > creating an isolated IOMMU group and blocking DMA from device in > > > question anywhere, that sounds reasonable. > > > > No, I'm only planning to add MSI and MSI-X interrupts support for > > uio_pci_generic device. > > The rest mentioned above should naturally be a matter of a different > > patch and writing it is orthogonal to the patch I'm working on as has > > been extensively discussed in this thread. > > > > > > > > > I have a generic MSI and MSI-X driver (posted earlier on this list). > About to post to upstream kernel. If Linux holds out and refuses to support insecure interfaces, hypervisor vendors will add secure ones. If Linux lets them ignore guest security, they will. -- MST