[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20170622112709.51bd4885@w520.home>
Date: Thu, 22 Jun 2017 11:27:09 -0600
From: Alex Williamson <alex.williamson@...hat.com>
To: Nitin Saxena <nitin.lnx@...il.com>
Cc: linux-kernel@...r.kernel.org, qemu-devel <qemu-devel@...gnu.org>,
Peter Xu <peterx@...hat.com>
Subject: Re: Query on VFIO in Virtual machine
On Thu, 22 Jun 2017 22:42:19 +0530
Nitin Saxena <nitin.lnx@...il.com> wrote:
> Thanks Alex.
>
> >> Without an iommu in the VM, you'd be limited to no-iommu support for VM userspace,
> So are you trying to say VFIO NO-IOMMU should work inside VM. Does
> that mean VFIO NO-IOMMU in VM and VFIO IOMMU in host for same device
> is a legitimate configuration? I did tried this configuration and the
> application (in VM) seems to get container_fd, group_fd, device_fd
> successfully but after VFIO_DEVICE_RESET ioctl the PCI link breaks
> from VM as well as from host. This could be specific to PCI endpoint
> device which I can dig.
>
> I will be happy if VFIO NO-IOMMU in VM and IOMMU in host for same
> device is legitimate configuration.
Using no-iommu in the guest should work in that configuration, however
there's no isolation from the user to the rest of VM memory, so the VM
kernel will be tainted. Host memory does have iommu isolation. Device
reset from VM userspace sounds like another bug to investigate. Thanks,
Alex
Powered by blists - more mailing lists