Linux IOMMU Development
 help / color / mirror / Atom feed
From: Alex Williamson <alex.williamson-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
To: David Woodhouse <dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>
Cc: iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org,
	torvalds-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org
Subject: Re: [GIT PULL] Intel IOMMU for 4.1
Date: Sun, 26 Apr 2015 11:33:11 -0600	[thread overview]
Message-ID: <1430069591.8301.91.camel@redhat.com> (raw)
In-Reply-To: <1430038266.4833.14.camel-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>

On Sun, 2015-04-26 at 09:51 +0100, David Woodhouse wrote:
> Linus,
> 
> Please pull the following changes (since v3.19) from
> 
>         git://git.infradead.org/intel-iommu.git
> 
> This lays a little of the groundwork for upcoming Shared Virtual
> Memory support — fixing some bogus #defines for capability bits and
> adding the new ones, and starting to use the new wider page tables
> where we can, in anticipation of actually filling in the new fields
> therein.
> 
> It also allows graphics devices to be assigned to VM guests again.
> This got broken in 3.17 by disallowing assignment of RMRR-afflicted
> devices. Like USB, we do understand why there's an RMRR for graphics
> devices — and unlike USB, it's actually sane. So we can make an
> exception for graphics devices, just as we do USB controllers.
> 
> Finally, tone down the warning about the X2APIC_OPT_OUT bit, due to
> persistent requests. X2APIC_OPT_OUT was added to the spec as a nasty
> hack to allow broken BIOSes to forbid us from using X2APIC when they
> do stupid and invasive things and would break if we did.
> 
> Someone noticed that since Windows doesn't have full IOMMU support for
> DMA protection, setting the X2APIC_OPT_OUT bit made Windows avoid
> initialising the IOMMU on the graphics unit altogether.
> 
> This means that it would be available for use in "driver mode", where
> the IOMMU registers are made available through a BAR of the graphics
> device and the graphics driver can do SVM all for itself.
> 
> So they started setting the X2APIC_OPT_OUT bit on *all* platforms with
> SVM capabilities. And even the platforms which *might*, if the planets
> had been aligned correctly, possibly have had SVM capability but which
> in practice actually don't.
> 
> 
> David Woodhouse (4):
>       iommu/vt-d: kill bogus ecap_niotlb_iunits()
>       iommu/vt-d: Allow RMRR on graphics devices too

Curious why these weren't posted to the mailing list.  This one in
particular not only ignores RMRR on IGD, but any PCI class display
device.  We may understand why IGD has RMRRs, but we certainly don't
understand enough to ignore RMRRs for other GPUs, should they exist.
Thanks,

Alex

>       iommu/vt-d: Add new extended capabilities from v2.3 VT-d specification
>       iommu/vt-d: support extended root and context entries
> 
> Fenghua Yu (1):
>       iommu/vt-d: Print x2apic opt out info instead of printing a warning
> 
>  drivers/iommu/intel-iommu.c         | 142 +++++++++++++++++-------------------
>  drivers/iommu/intel_irq_remapping.c |   5 +-
>  include/linux/intel-iommu.h         |  18 ++++-
>  3 files changed, 82 insertions(+), 83 deletions(-)
> 
> 
> _______________________________________________
> iommu mailing list
> iommu@lists.linux-foundation.org
> https://lists.linuxfoundation.org/mailman/listinfo/iommu



_______________________________________________
iommu mailing list
iommu@lists.linux-foundation.org
https://lists.linuxfoundation.org/mailman/listinfo/iommu

  parent reply	other threads:[~2015-04-26 17:33 UTC|newest]

Thread overview: 12+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-04-26  8:51 [GIT PULL] Intel IOMMU for 4.1 David Woodhouse
     [not found] ` <1430038266.4833.14.camel-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>
2015-04-26 17:33   ` Alex Williamson [this message]
     [not found]     ` <1430069591.8301.91.camel-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2015-04-26 17:55       ` David Woodhouse
     [not found]         ` <1430070924.13479.5.camel-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>
2015-04-26 18:16           ` Alex Williamson
     [not found]             ` <1430072207.8301.103.camel-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2015-04-27 14:00               ` Linda Knippers
     [not found]                 ` <553E4109.5060903-VXdhtT5mjnY@public.gmane.org>
2015-04-27 15:39                   ` Alex Williamson
     [not found]                     ` <1430149195.4472.43.camel-H+wXaHxf7aLQT0dZR+AlfA@public.gmane.org>
2015-04-27 15:48                       ` Linus Torvalds
     [not found]                         ` <CA+55aFx+QhMZpCtnG2sHib+kk5BR+PeEa99-CCushSA5oAqVxw-JsoAwUIsXosN+BqQ9rBEUg@public.gmane.org>
2015-04-27 16:09                           ` Linda Knippers
2015-04-27 16:16                           ` Alex Williamson
2015-04-27 17:28                           ` David Woodhouse
2015-04-27 17:12                       ` David Woodhouse
     [not found]                         ` <1430154752.6377.19.camel-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org>
2015-04-27 17:30                           ` Alex Williamson

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1430069591.8301.91.camel@redhat.com \
    --to=alex.williamson-h+wxahxf7alqt0dzr+alfa@public.gmane.org \
    --cc=dwmw2-wEGCiKHe2LqWVfeAwA7xHQ@public.gmane.org \
    --cc=iommu-cunTk1MwBs9QetFLy7KEm3xJsTq8ys+cHZ5vskTnxNA@public.gmane.org \
    --cc=torvalds-de/tnXTf+JLsfHDXvbKv3WD2FQJk+8+b@public.gmane.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox