[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <18cf09c6-5331-b5df-c421-aade717f9766@linux.ibm.com>
Date: Wed, 20 Jan 2021 09:02:07 -0500
From: Matthew Rosato <mjrosato@...ux.ibm.com>
To: Pierre Morel <pmorel@...ux.ibm.com>, alex.williamson@...hat.com,
cohuck@...hat.com, schnelle@...ux.ibm.com
Cc: borntraeger@...ibm.com, hca@...ux.ibm.com, gor@...ux.ibm.com,
gerald.schaefer@...ux.ibm.com, linux-s390@...r.kernel.org,
kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/4] vfio-pci/zdev: Fixing s390 vfio-pci ISM support
On 1/20/21 4:02 AM, Pierre Morel wrote:
>
>
> On 1/19/21 9:02 PM, Matthew Rosato wrote:
>> Today, ISM devices are completely disallowed for vfio-pci passthrough as
>> QEMU will reject the device due to an (inappropriate) MSI-X check.
>> However, in an effort to enable ISM device passthrough, I realized
>> that the
>> manner in which ISM performs block write operations is highly
>> incompatible
>> with the way that QEMU s390 PCI instruction interception and
>> vfio_pci_bar_rw break up I/O operations into 8B and 4B operations -- ISM
>> devices have particular requirements in regards to the alignment, size
>> and
>> order of writes performed. Furthermore, they require that legacy/non-MIO
>> s390 PCI instructions are used, which is also not guaranteed when the I/O
>> is passed through the typical userspace channels.
>>
>> As a result, this patchset proposes a new VFIO region to allow a guest to
>> pass certain PCI instruction intercepts directly to the s390 host kernel
>> PCI layer for execution, pinning the guest buffer in memory briefly in
>> order to execute the requested PCI instruction.
>>
>> Changes from RFC -> v1:
>> - No functional changes, just minor commentary changes -- Re-posting
>> along
>> with updated QEMU set.
>>
>
> Hi,
>
> there are is a concerns about this patch series:
> As the title says it is strongly related to ISM hardware.
>
> Why being so specific?
Because prior investigations have shown that the region can only be
safely used by a device type that does not implement MSI-X (use of this
region by a vfio-pci device that has MSI-X capability interferes with
vfio-pci MSI-X masking, since we are bypassing the typical VFIO bar
regions and vfio-pci MSI-X masking is triggered by those region accesses).
So, in lieu of another suggestion that would overcome that issue (nobody
has suggested anything thus far), the proposal is to limit the region's
use to fix the specific problem at hand (ISM devices won't function
properly if passed through). That doesn't preclude this region from
being used for a different device type later, but ISM is why we are
introducing it now.
Powered by blists - more mailing lists