| 
    
 [Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v13 0/4] add per-domain IOMMU control
 Hi Paul Here a minimal patch, leaving 'force pt share' in place. Does this avoid the problem?I may mistake, but looks like 80ff3d338dc93260b41ffeeebb0f852c2edef9ce iommu: tidy up iommu_use_hap_pt() and need_iommu_pt_sync() macros triggers ASSERT_UNREACHABLE on Arm if no IOMMU has been found (I builtwith my platform's IOMMU driver disabled: # CONFIG_IPMMU_VMSA is not set) .So, iommu_setup() calls clear_iommu_hap_pt_share() with iommu_hap_pt_share being set (CONFIG_IOMMU_FORCE_PT_SHARE=y) which, actually, triggers ASSERT.---8<--- diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c index e8763c7fdf..f88a285e7f 100644 --- a/xen/common/sysctl.c +++ b/xen/common/sysctl.c@@ -268,9 +268,11 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl) With the patch applied, the issue I have faced (during Xen boot) is gone away. But, I haven't analyzed your "per-domain IOMMU control series" yet to have opinion regarding your patch itself. I noticed the following:When iommu_enabled = false (my case, when IOMMU driver is disable), I can't create guest VM if "dtdev" property is present and contains DMA masters in the domain config: Parsing config from /xt/dom.cfg/domd.cfg ERROR: passthrough not supported on this platform Even if I add passthrough = "disabled", it still denies: Parsing config from /xt/dom.cfg/domd.cfg ERROR: passthrough disabled but devices are specified Looks like, correct behavior... -- Regards, Oleksandr Tyshchenko _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel 
 
 
  | 
  
![]()  | 
            
         Lists.xenproject.org is hosted with RackSpace, monitoring our  |