[RFC V2] virtio: Add platform specific DMA API translation for virito devices
Benjamin Herrenschmidt
benh at kernel.crashing.org
Wed May 30 08:13:54 AEST 2018
On Tue, 2018-05-29 at 07:03 -0700, Christoph Hellwig wrote:
> On Tue, May 29, 2018 at 09:56:24AM +1000, Benjamin Herrenschmidt wrote:
> > I don't think forcing the addition of an emulated iommu in the middle
> > just to work around the fact that virtio "cheats" and doesn't use the
> > dma API unless there is one, is the right "fix".
>
> Agreed.
>
> > The right long term fix is to always use the DMA API, reducing code
> > path etc... and just have a single point where virtio can "chose"
> > alternate DMA ops (via an arch hook to deal with our case).
>
> Also agreed.
>
> When Andi added vring_use_dma_api it was marked as temporary.
>
> So I'd much rather move to blacklisting platforms that needs this
> hack now than adding another exception.
>
> And then once we have the blacklist move it to a quirk in the arch
> code that just forces dma_direct_ops as the per-device dma ops.
>
> I don't really think this is crazy long term, but something we could
> do relatively quickly. Interestingly enough the original commit
> mentions PPC64 as a case where this quirk is needed.
Not sure why, it's not so much a platform issue today. It's qemu itself
who by defaults bypasses any iommu. I suppose ppc64 stood out because
unlike x86 we always have an iommu by default.
Anyway, Anshuman, I think that's the right approach, first make virtio
always use the DMA API with a quirk early to override the ops.
Christoph: the overriding of the ops isn't a platform thing. It's a
qemu thing, ie, from a Linux perspective, it's a feature of the
"device". So it should be done in virtio itself, not the platform code.
However, we do want the ability in platform code to force the bounce
buffering to solve our secure VM issue.
Cheers,
Ben.
More information about the Linuxppc-dev
mailing list