Red Hat Bugzilla – Bug 1335825
[RFE] IOMMU support in DPDK for Vhost-user using IOTLB caching
Last modified: 2018-06-21 09:37:50 EDT
DPDK should properly support IOMMU when using Vhost-user, in order to allow guests to securely access vhost-user ports from user space. This will be implemented using the IOTLB caching approach in vhost user.
*** Bug 1283262 has been marked as a duplicate of this bug. ***
V1 of the series posted upstream: http://dpdk.org/ml/archives/dev/2017-August/073918.html
Series merged upstream, will be in DPDK v17.11-rc1.
The change being in DPDK's vhost-user library, moving to Openvswitch component. The change is released in DPDK v17.11 LTS.
The openvwitch component is delivered through the fast datapath channel, it is not documented in release notes.
Tested in openvswitch-2.9.0-37.el7fdp.x86_64 Bound vfio without the iommu override. was able to pass traffic between nic's. openvswitch-2.9.0-37.el7fdp.x86_64 [root@localhost ~]# rpm -qa |grep dpdk dpdk-17.11-10.el7fdb.x86_64 dpdk-tools-17.11-10.el7fdb.x86_64 [root@localhost ~]# root@localhost ~]# dmesg |grep IOMMU [ 0.000000] DMAR: IOMMU enabled [ 0.155453] DMAR-IR: IOAPIC id 0 under DRHD base 0xfed90000 IOMMU 0 [root@localhost ~]# [root@localhost ~]# cat /sys/module/vfio/parameters/enable_unsafe_noiommu_mode N [root@localhost ~]# driverctl -v list-overrides 0000:00:03.0 vfio-pci (Virtio network device) 0000:00:09.0 vfio-pci (Virtio network device) [root@localhost ~]# Passing traffic with Xena 2544 test suite.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2018:1962