* [PATCH] document IOMMU related command line options
@ 2014-07-04 14:43 Jan Beulich
2014-07-04 14:53 ` Andrew Cooper
0 siblings, 1 reply; 3+ messages in thread
From: Jan Beulich @ 2014-07-04 14:43 UTC (permalink / raw)
To: xen-devel
[-- Attachment #1: Type: text/plain, Size: 2650 bytes --]
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/docs/misc/xen-command-line.markdown
+++ b/docs/misc/xen-command-line.markdown
@@ -667,9 +667,101 @@ debug hypervisor only).
### ioapic\_ack
### iommu
-### iommu\_inclusive\_mapping
+> `= List of [ <boolean> | force | required | intremap | qinval | snoop | sharept | dom0-passthrough | dom0-strict | amd-iommu-perdev-intremap | workaround_bios_bug | verbose | debug ]`
+
+> Sub-options:
+
+> `<boolean>`
+
+> Default: `on`
+
+>> Control the use of IOMMU(s) in the system.
+
+> All other sub-options are of boolean kind and can be prefixed with `no-` to
+> effect the inverse meaning.
+
+> `force` or `required`
+
+> Default: `false`
+
+>> Don't continue booting unless IOMMU support is found and can be initialized
+>> successfully.
+
+> `intremap`
+
+> Default: `true`
+
+>> Control the use of interrupt remapping (DMA remapping will always be enabled
+>> if IOMMU functionality is enabled).
+
+> `qinval` (VT-d)
+
+> Default: `true`
+
+>> Control the use of Queued Invalidation.
+
+> `snoop` (Intel)
+
+> Default: `true`
+
+>> Control the use of Snoop Control.
+
+> `sharept`
+
+> Default: `true`
+
+>> Control whether CPU and IOMMU page tables should be shared.
+
+> `dom0-passthrough`
+
+> Default: `false`
+
+>> Control whether to disable DMA remapping for Dom0.
+
+> `dom0-strict`
+
+> Default: `false`
+
+>> Control whether to set up DMA remapping only for the memory Dom0 actually
+>> got assigned. Implies `no-dom0-passthrough`.
+
+> `amd-iommu-perdev-intremap`
+
+> Default: `true`
+
+>> Control whether to set up interrupt remapping data structures per device
+>> rather that once for the entire system. Turning this off is making PCI
+>> device pass-through insecure and hence unsupported.
+
+> `workaround_bios_bug` (VT-d)
+
+> Default: `false`
+
+>> Causes DRHD entries without any PCI discoverable devices under them to be
+>> ignored (normally IOMMU setup fails if any of the devices listed by a DRHD
+>> entry aren't PCI discoverable).
+
+> `verbose`
+
+> Default: `false`
+
+>> Increase IOMMU code's verbosity.
+
+> `debug`
+
+> Default: `false`
+
+>> Enable IOMMU debugging code (implies `verbose`).
+
+### iommu\_inclusive\_mapping (VT-d)
> `= <boolean>`
+> Default: `false`
+
+Use this to work around firmware issues providing correct RMRR entries. Rather
+than only mapping RAM pages for IOMMU accesses for Dom0, with this option all
+pages not marked as unusable in the E820 table will get a mapping established.
+
### irq\_ratelimit
> `= <integer>`
[-- Attachment #2: doc-iommu-option.patch --]
[-- Type: text/plain, Size: 2691 bytes --]
document IOMMU related command line options
Signed-off-by: Jan Beulich <jbeulich@suse.com>
--- a/docs/misc/xen-command-line.markdown
+++ b/docs/misc/xen-command-line.markdown
@@ -667,9 +667,101 @@ debug hypervisor only).
### ioapic\_ack
### iommu
-### iommu\_inclusive\_mapping
+> `= List of [ <boolean> | force | required | intremap | qinval | snoop | sharept | dom0-passthrough | dom0-strict | amd-iommu-perdev-intremap | workaround_bios_bug | verbose | debug ]`
+
+> Sub-options:
+
+> `<boolean>`
+
+> Default: `on`
+
+>> Control the use of IOMMU(s) in the system.
+
+> All other sub-options are of boolean kind and can be prefixed with `no-` to
+> effect the inverse meaning.
+
+> `force` or `required`
+
+> Default: `false`
+
+>> Don't continue booting unless IOMMU support is found and can be initialized
+>> successfully.
+
+> `intremap`
+
+> Default: `true`
+
+>> Control the use of interrupt remapping (DMA remapping will always be enabled
+>> if IOMMU functionality is enabled).
+
+> `qinval` (VT-d)
+
+> Default: `true`
+
+>> Control the use of Queued Invalidation.
+
+> `snoop` (Intel)
+
+> Default: `true`
+
+>> Control the use of Snoop Control.
+
+> `sharept`
+
+> Default: `true`
+
+>> Control whether CPU and IOMMU page tables should be shared.
+
+> `dom0-passthrough`
+
+> Default: `false`
+
+>> Control whether to disable DMA remapping for Dom0.
+
+> `dom0-strict`
+
+> Default: `false`
+
+>> Control whether to set up DMA remapping only for the memory Dom0 actually
+>> got assigned. Implies `no-dom0-passthrough`.
+
+> `amd-iommu-perdev-intremap`
+
+> Default: `true`
+
+>> Control whether to set up interrupt remapping data structures per device
+>> rather that once for the entire system. Turning this off is making PCI
+>> device pass-through insecure and hence unsupported.
+
+> `workaround_bios_bug` (VT-d)
+
+> Default: `false`
+
+>> Causes DRHD entries without any PCI discoverable devices under them to be
+>> ignored (normally IOMMU setup fails if any of the devices listed by a DRHD
+>> entry aren't PCI discoverable).
+
+> `verbose`
+
+> Default: `false`
+
+>> Increase IOMMU code's verbosity.
+
+> `debug`
+
+> Default: `false`
+
+>> Enable IOMMU debugging code (implies `verbose`).
+
+### iommu\_inclusive\_mapping (VT-d)
> `= <boolean>`
+> Default: `false`
+
+Use this to work around firmware issues providing correct RMRR entries. Rather
+than only mapping RAM pages for IOMMU accesses for Dom0, with this option all
+pages not marked as unusable in the E820 table will get a mapping established.
+
### irq\_ratelimit
> `= <integer>`
[-- Attachment #3: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] document IOMMU related command line options
2014-07-04 14:43 [PATCH] document IOMMU related command line options Jan Beulich
@ 2014-07-04 14:53 ` Andrew Cooper
2014-07-23 7:11 ` Jan Beulich
0 siblings, 1 reply; 3+ messages in thread
From: Andrew Cooper @ 2014-07-04 14:53 UTC (permalink / raw)
To: Jan Beulich, xen-devel
[-- Attachment #1.1: Type: text/plain, Size: 3149 bytes --]
On 04/07/14 15:43, Jan Beulich wrote:
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
Awesome. This has been high on my docs todo list for a long time.
>
> --- a/docs/misc/xen-command-line.markdown
> +++ b/docs/misc/xen-command-line.markdown
> @@ -667,9 +667,101 @@ debug hypervisor only).
>
> ### ioapic\_ack
> ### iommu
> -### iommu\_inclusive\_mapping
> +> `= List of [ <boolean> | force | required | intremap | qinval | snoop | sharept | dom0-passthrough | dom0-strict | amd-iommu-perdev-intremap | workaround_bios_bug | verbose | debug ]`
> +
> +> Sub-options:
> +
> +> `<boolean>`
> +
> +> Default: `on`
> +
> +>> Control the use of IOMMU(s) in the system.
> +
> +> All other sub-options are of boolean kind and can be prefixed with `no-` to
> +> effect the inverse meaning.
> +
> +> `force` or `required`
> +
> +> Default: `false`
> +
> +>> Don't continue booting unless IOMMU support is found and can be initialized
> +>> successfully.
> +
> +> `intremap`
> +
> +> Default: `true`
> +
> +>> Control the use of interrupt remapping (DMA remapping will always be enabled
> +>> if IOMMU functionality is enabled).
> +
> +> `qinval` (VT-d)
> +
> +> Default: `true`
> +
> +>> Control the use of Queued Invalidation.
> +
> +> `snoop` (Intel)
Can we have consistent use of Intel vs VT-d? Probably VT-d is better.
Other than this,
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
> +
> +> Default: `true`
> +
> +>> Control the use of Snoop Control.
> +
> +> `sharept`
> +
> +> Default: `true`
> +
> +>> Control whether CPU and IOMMU page tables should be shared.
> +
> +> `dom0-passthrough`
> +
> +> Default: `false`
> +
> +>> Control whether to disable DMA remapping for Dom0.
> +
> +> `dom0-strict`
> +
> +> Default: `false`
> +
> +>> Control whether to set up DMA remapping only for the memory Dom0 actually
> +>> got assigned. Implies `no-dom0-passthrough`.
> +
> +> `amd-iommu-perdev-intremap`
> +
> +> Default: `true`
> +
> +>> Control whether to set up interrupt remapping data structures per device
> +>> rather that once for the entire system. Turning this off is making PCI
> +>> device pass-through insecure and hence unsupported.
> +
> +> `workaround_bios_bug` (VT-d)
> +
> +> Default: `false`
> +
> +>> Causes DRHD entries without any PCI discoverable devices under them to be
> +>> ignored (normally IOMMU setup fails if any of the devices listed by a DRHD
> +>> entry aren't PCI discoverable).
> +
> +> `verbose`
> +
> +> Default: `false`
> +
> +>> Increase IOMMU code's verbosity.
> +
> +> `debug`
> +
> +> Default: `false`
> +
> +>> Enable IOMMU debugging code (implies `verbose`).
> +
> +### iommu\_inclusive\_mapping (VT-d)
> > `= <boolean>`
>
> +> Default: `false`
> +
> +Use this to work around firmware issues providing correct RMRR entries. Rather
> +than only mapping RAM pages for IOMMU accesses for Dom0, with this option all
> +pages not marked as unusable in the E820 table will get a mapping established.
> +
> ### irq\_ratelimit
> > `= <integer>`
>
>
>
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
[-- Attachment #1.2: Type: text/html, Size: 4295 bytes --]
[-- Attachment #2: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [PATCH] document IOMMU related command line options
2014-07-04 14:53 ` Andrew Cooper
@ 2014-07-23 7:11 ` Jan Beulich
0 siblings, 0 replies; 3+ messages in thread
From: Jan Beulich @ 2014-07-23 7:11 UTC (permalink / raw)
To: Andrew Cooper; +Cc: xen-devel
>>> On 04.07.14 at 16:53, <andrew.cooper3@citrix.com> wrote:
> On 04/07/14 15:43, Jan Beulich wrote:
>> +> `qinval` (VT-d)
>> +
>> +> Default: `true`
>> +
>> +>> Control the use of Queued Invalidation.
>> +
>> +> `snoop` (Intel)
>
> Can we have consistent use of Intel vs VT-d? Probably VT-d is better.
Actually I considered consistency here, and intentionally didn't go
that route: Some of the (sub-)options are VT-d related, while other
are more like general Intel ones (e.g. here VT-d/EPT interaction).
Jan
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2014-07-23 7:11 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2014-07-04 14:43 [PATCH] document IOMMU related command line options Jan Beulich
2014-07-04 14:53 ` Andrew Cooper
2014-07-23 7:11 ` Jan Beulich
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.