Displaying 15 results from an estimated 15 matches for "iommu_passthrough".
2012 Oct 24
5
[PATCH v3] IOMMU: keep disabled until iommu_setup() is called
...iommu_enable = 0;
else if ( !strcmp(s, "force") || !strcmp(s, "required") )
force_iommu = val;
else if ( !strcmp(s, "workaround_bios_bug") )
@@ -395,7 +396,7 @@ int __init iommu_setup(void)
if ( iommu_dom0_strict )
iommu_passthrough = 0;
- if ( iommu_enabled )
+ if ( iommu_enable )
{
rc = iommu_hardware_setup();
iommu_enabled = (rc == 0);
@@ -409,8 +410,6 @@ int __init iommu_setup(void)
if ( !iommu_enabled )
{
iommu_snoop = 0;
- iommu_qinval = 0;
- iommu_intremap...
2016 Apr 19
2
[PATCH RFC] fixup! virtio: convert to use DMA api
...kernel is too old. It might be annoying, since old kernels do work on
> actual Q35 hardware, but it at least seems to be that it might be
> okay.
>
> --Andy
Yes but we need a mode that makes both old and new kernels work, and
that should be the default for a while. this is what the
IOMMU_PASSTHROUGH flag was about: old kernels ignore it and bypass DMA
API, new kernels go "oh compatibility mode" and bypass the IOMMU
within DMA API.
--
MST
2016 Apr 19
2
[PATCH RFC] fixup! virtio: convert to use DMA api
...kernel is too old. It might be annoying, since old kernels do work on
> actual Q35 hardware, but it at least seems to be that it might be
> okay.
>
> --Andy
Yes but we need a mode that makes both old and new kernels work, and
that should be the default for a while. this is what the
IOMMU_PASSTHROUGH flag was about: old kernels ignore it and bypass DMA
API, new kernels go "oh compatibility mode" and bypass the IOMMU
within DMA API.
--
MST
2012 Oct 18
3
[PATCH 1/1] keep iommu disabled until iommu_setup is called
...t;) )
force_iommu = 1;
else if ( !strcmp(s, "workaround_bios_bug") )
@@ -312,6 +314,7 @@
{
int rc = -ENODEV;
bool_t force_intremap = force_iommu && iommu_intremap;
+ iommu_enabled = iommu_enabled_default;
if ( iommu_dom0_strict )
iommu_passthrough = 0;
2010 Dec 13
0
[PATCH, RFC] x86/iommu: don''t map RAM holes above 4G
...uld currently exist for any such ranges
sitting beyon the end of RAM.
Signed-off-by: Jan Beulich <jbeulich@novell.com>
--- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
+++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
@@ -230,8 +230,16 @@ static void __init amd_iommu_dom0_init(s
if ( !iommu_passthrough && !need_iommu(d) )
{
/* Set up 1:1 page table for dom0 */
- for ( i = 0; i < max_page; i++ )
- amd_iommu_map_page(d, i, i, IOMMUF_readable|IOMMUF_writable);
+ for ( i = 0; i < max_pdx; i++ )
+ {
+ unsigned long pfn = pdx_to_pfn...
2016 Apr 19
0
[PATCH RFC] fixup! virtio: convert to use DMA api
...nnoying, since old kernels do work on
>> actual Q35 hardware, but it at least seems to be that it might be
>> okay.
>>
>> --Andy
>
> Yes but we need a mode that makes both old and new kernels work, and
> that should be the default for a while. this is what the
> IOMMU_PASSTHROUGH flag was about: old kernels ignore it and bypass DMA
> API, new kernels go "oh compatibility mode" and bypass the IOMMU
> within DMA API.
I thought that PLATFORM served that purpose. Woudn't the host
advertise PLATFORM support and, if the guest doesn't ack it, the host
dev...
2016 Apr 19
2
[PATCH RFC] fixup! virtio: convert to use DMA api
...t; >> actual Q35 hardware, but it at least seems to be that it might be
> >> okay.
> >>
> >> --Andy
> >
> > Yes but we need a mode that makes both old and new kernels work, and
> > that should be the default for a while. this is what the
> > IOMMU_PASSTHROUGH flag was about: old kernels ignore it and bypass DMA
> > API, new kernels go "oh compatibility mode" and bypass the IOMMU
> > within DMA API.
>
> I thought that PLATFORM served that purpose. Woudn't the host
> advertise PLATFORM support and, if the guest doesn...
2016 Apr 19
2
[PATCH RFC] fixup! virtio: convert to use DMA api
...t; >> actual Q35 hardware, but it at least seems to be that it might be
> >> okay.
> >>
> >> --Andy
> >
> > Yes but we need a mode that makes both old and new kernels work, and
> > that should be the default for a while. this is what the
> > IOMMU_PASSTHROUGH flag was about: old kernels ignore it and bypass DMA
> > API, new kernels go "oh compatibility mode" and bypass the IOMMU
> > within DMA API.
>
> I thought that PLATFORM served that purpose. Woudn't the host
> advertise PLATFORM support and, if the guest doesn...
2016 Apr 18
2
[PATCH RFC] fixup! virtio: convert to use DMA api
...ot;notify_on_empty", _state, _field, \
VIRTIO_F_NOTIFY_ON_EMPTY, true), \
DEFINE_PROP_BIT64("any_layout", _state, _field, \
- VIRTIO_F_ANY_LAYOUT, true)
+ VIRTIO_F_ANY_LAYOUT, true), \
+ DEFINE_PROP_BIT64("iommu_passthrough", _state, _field, \
+ VIRTIO_F_IOMMU_PASSTHROUGH, false), \
+ DEFINE_PROP_BIT64("iommu_platform", _state, _field, \
+ VIRTIO_F_IOMMU_PLATFORM, false)
hwaddr virtio_queue_get_desc_addr(VirtIODevice *vdev, int n);
hwaddr virtio_queue_get...
2016 Apr 18
2
[PATCH RFC] fixup! virtio: convert to use DMA api
...ot;notify_on_empty", _state, _field, \
VIRTIO_F_NOTIFY_ON_EMPTY, true), \
DEFINE_PROP_BIT64("any_layout", _state, _field, \
- VIRTIO_F_ANY_LAYOUT, true)
+ VIRTIO_F_ANY_LAYOUT, true), \
+ DEFINE_PROP_BIT64("iommu_passthrough", _state, _field, \
+ VIRTIO_F_IOMMU_PASSTHROUGH, false), \
+ DEFINE_PROP_BIT64("iommu_platform", _state, _field, \
+ VIRTIO_F_IOMMU_PLATFORM, false)
hwaddr virtio_queue_get_desc_addr(VirtIODevice *vdev, int n);
hwaddr virtio_queue_get...
2016 Apr 19
2
[PATCH RFC] fixup! virtio: convert to use DMA api
On Mon, Apr 18, 2016 at 12:24:15PM -0700, Andy Lutomirski wrote:
> On Mon, Apr 18, 2016 at 11:29 AM, David Woodhouse <dwmw2 at infradead.org> wrote:
> > For x86, you *can* enable virtio-behind-IOMMU if your DMAR tables tell
> > the truth, and even legacy kernels ought to cope with that.
> > FSVO 'ought to' where I suspect some of them will actually crash with a
2016 Apr 19
2
[PATCH RFC] fixup! virtio: convert to use DMA api
On Mon, Apr 18, 2016 at 12:24:15PM -0700, Andy Lutomirski wrote:
> On Mon, Apr 18, 2016 at 11:29 AM, David Woodhouse <dwmw2 at infradead.org> wrote:
> > For x86, you *can* enable virtio-behind-IOMMU if your DMAR tables tell
> > the truth, and even legacy kernels ought to cope with that.
> > FSVO 'ought to' where I suspect some of them will actually crash with a
2013 Mar 19
7
[PATCH 0/3] IOMMU errata treatment adjustments
1: IOMMU: properly check whether interrupt remapping is enabled
2: AMD IOMMU: only disable when certain IVRS consistency checks fail
3: VT-d: deal with 5500/5520/X58 errata
Patch 1 and 2 are version 2 of a previously submitted, then
withdrawn patch following up after XSA-36. Patch 3 is version 3 of
a patch previously sent by Malcolm and Andrew.
Signed-off-by: Jan Beulich
2016 Apr 18
5
[PATCH RFC 0/3] virtio-pci: iommu support
...e unless IOMMU_PLATFORM is set
or the no-iommu mode is enabled
- while I'm not sure how it will be used, it seems like a good idea to
also have ability to distinguish between a legacy device and one
where iommu is bypassed intentionally. To this end, add another feature bit
IOMMU_PASSTHROUGH. We don't acknowledge it if IOMMU_PLATFORM is set.
TODO:
- I'm not sure whether there are setups that mix IOMMU
and no-IOMMU configs. If so, failing on probe might not
be the right thing to do, should fail binding to IOMMU group instead.
Michael S. Tsirkin (3):
virtio: add featu...
2016 Apr 18
5
[PATCH RFC 0/3] virtio-pci: iommu support
...e unless IOMMU_PLATFORM is set
or the no-iommu mode is enabled
- while I'm not sure how it will be used, it seems like a good idea to
also have ability to distinguish between a legacy device and one
where iommu is bypassed intentionally. To this end, add another feature bit
IOMMU_PASSTHROUGH. We don't acknowledge it if IOMMU_PLATFORM is set.
TODO:
- I'm not sure whether there are setups that mix IOMMU
and no-IOMMU configs. If so, failing on probe might not
be the right thing to do, should fail binding to IOMMU group instead.
Michael S. Tsirkin (3):
virtio: add featu...