From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Jan Beulich <JBeulich@suse.com>,
xen-devel <xen-devel@lists.xenproject.org>
Subject: Re: [PATCH] document IOMMU related command line options
Date: Fri, 4 Jul 2014 15:53:23 +0100 [thread overview]
Message-ID: <53B6BFE3.8040603@citrix.com> (raw)
In-Reply-To: <53B6D9B50200007800020CB5@mail.emea.novell.com>
[-- Attachment #1.1: Type: text/plain, Size: 3149 bytes --]
On 04/07/14 15:43, Jan Beulich wrote:
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
Awesome. This has been high on my docs todo list for a long time.
>
> --- a/docs/misc/xen-command-line.markdown
> +++ b/docs/misc/xen-command-line.markdown
> @@ -667,9 +667,101 @@ debug hypervisor only).
>
> ### ioapic\_ack
> ### iommu
> -### iommu\_inclusive\_mapping
> +> `= List of [ <boolean> | force | required | intremap | qinval | snoop | sharept | dom0-passthrough | dom0-strict | amd-iommu-perdev-intremap | workaround_bios_bug | verbose | debug ]`
> +
> +> Sub-options:
> +
> +> `<boolean>`
> +
> +> Default: `on`
> +
> +>> Control the use of IOMMU(s) in the system.
> +
> +> All other sub-options are of boolean kind and can be prefixed with `no-` to
> +> effect the inverse meaning.
> +
> +> `force` or `required`
> +
> +> Default: `false`
> +
> +>> Don't continue booting unless IOMMU support is found and can be initialized
> +>> successfully.
> +
> +> `intremap`
> +
> +> Default: `true`
> +
> +>> Control the use of interrupt remapping (DMA remapping will always be enabled
> +>> if IOMMU functionality is enabled).
> +
> +> `qinval` (VT-d)
> +
> +> Default: `true`
> +
> +>> Control the use of Queued Invalidation.
> +
> +> `snoop` (Intel)
Can we have consistent use of Intel vs VT-d? Probably VT-d is better.
Other than this,
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
> +
> +> Default: `true`
> +
> +>> Control the use of Snoop Control.
> +
> +> `sharept`
> +
> +> Default: `true`
> +
> +>> Control whether CPU and IOMMU page tables should be shared.
> +
> +> `dom0-passthrough`
> +
> +> Default: `false`
> +
> +>> Control whether to disable DMA remapping for Dom0.
> +
> +> `dom0-strict`
> +
> +> Default: `false`
> +
> +>> Control whether to set up DMA remapping only for the memory Dom0 actually
> +>> got assigned. Implies `no-dom0-passthrough`.
> +
> +> `amd-iommu-perdev-intremap`
> +
> +> Default: `true`
> +
> +>> Control whether to set up interrupt remapping data structures per device
> +>> rather that once for the entire system. Turning this off is making PCI
> +>> device pass-through insecure and hence unsupported.
> +
> +> `workaround_bios_bug` (VT-d)
> +
> +> Default: `false`
> +
> +>> Causes DRHD entries without any PCI discoverable devices under them to be
> +>> ignored (normally IOMMU setup fails if any of the devices listed by a DRHD
> +>> entry aren't PCI discoverable).
> +
> +> `verbose`
> +
> +> Default: `false`
> +
> +>> Increase IOMMU code's verbosity.
> +
> +> `debug`
> +
> +> Default: `false`
> +
> +>> Enable IOMMU debugging code (implies `verbose`).
> +
> +### iommu\_inclusive\_mapping (VT-d)
> > `= <boolean>`
>
> +> Default: `false`
> +
> +Use this to work around firmware issues providing correct RMRR entries. Rather
> +than only mapping RAM pages for IOMMU accesses for Dom0, with this option all
> +pages not marked as unusable in the E820 table will get a mapping established.
> +
> ### irq\_ratelimit
> > `= <integer>`
>
>
>
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
[-- Attachment #1.2: Type: text/html, Size: 4295 bytes --]
[-- Attachment #2: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next prev parent reply other threads:[~2014-07-04 14:53 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-07-04 14:43 [PATCH] document IOMMU related command line options Jan Beulich
2014-07-04 14:53 ` Andrew Cooper [this message]
2014-07-23 7:11 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=53B6BFE3.8040603@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=JBeulich@suse.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.