> On Fri, Sep 20, 2024 at 07:35:28PM +0530, Srujana Challa wrote:
> > This patchset introduces support for an UNSAFE, no-IOMMU mode in the
> > vhost-vdpa driver. When enabled, this mode provides no device
> > isolation, no DMA translation, no host kernel protection, and cannot
> > be used for device assignment to virtual machines. It requires RAWIO
> > permissions and will taint the kernel.
> >
> > This mode requires enabling the
> "enable_vhost_vdpa_unsafe_noiommu_mode"
> > option on the vhost-vdpa driver and also negotiate the feature flag
> > VHOST_BACKEND_F_NOIOMMU. This mode would be useful to get better
> > performance on specifice low end machines and can be leveraged by
> > embedded platforms where applications run in controlled environment.
> 
> ... and is completely broken and dangerous.
Based on the discussions in this thread 
https://www.spinics.net/lists/kvm/msg357569.html,
we have decided to proceed with this implementation. Could you please share any
alternative ideas or suggestions you might have?
Thanks.  

Reply via email to