[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Disable IOMMU in Dom0


  • To: Stefano Stabellini <sstabellini@xxxxxxxxxx>
  • From: Roman Skakun <Roman_Skakun@xxxxxxxx>
  • Date: Tue, 31 Aug 2021 19:54:15 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=nDLNefUNb4PsIQ89YPEUs7LFlJsYZuT9SUaTQZvUryY=; b=L5sPeqdLXDTDMvb+E3oV/AnQzPYvEl9fSPAi2Q3Dtl/4/W6gq3bG/AhftDe3kfw6GyNWBgrJ/CSnbtZldvh14naR+kAApQ16NlaJy4UQxF5NdgSXTiDpFAnI91Ko/Y/NjLOn3gtcOJ75C5bdimjZ4NdiDMUb+Mcb8Rsx3DU1cMN/rE3kPLrc2FyU3XPK/+6iNjsyaxHUnKLHXOjz0eMeso5xh6OmHYf2F2amIxX7ki5Vph1bAWfhTrIgvntnEl7NEAGslZocmlU1F65AuvTkZWLq0jcBV85IkktVDwKKgJFnNdOu53GqO/WRbzBA5QlXkty364pwJYcuWDXbSqGYmQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=DlJlAJBINhEkjaZ2HoesFo6PtA1LV1zcQmePsaGr3Tn+mfRx20BAfz4tDlTeb5avMPGsUQOLdpCzoDWqP+voFaR981u+/t4dXDncZ4j7vZJCxfuHyB/RUUrpXg8kF1WjNrNYGJ1Eha6e8hTMebCkHk0GMg9ibN10TzxxMZdFCORONHVuPfGi6M1wqMbRsGCklm82wmQpXjXgfs3RiWVQ/LAfOlVKBPuTiiV6q8nd6dIosF/G8uYyw0oSXrIundkpxsob6xnvcmAy8SNGxcaqUz7EgzbXnkCYNfXkH4cNSCycDfJ/VYZGfowf3Jvd5TNeiPZS7i3B49FF2C8AcePpqQ==
  • Authentication-results: kernel.org; dkim=none (message not signed) header.d=none;kernel.org; dmarc=none action=none header.from=epam.com;
  • Cc: Julien Grall <julien@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Andrii Anisov <Andrii_Anisov@xxxxxxxx>, Roman Skakun <rm.skakun@xxxxxxxxx>, Roman Skakun <Roman_Skakun@xxxxxxxx>
  • Delivery-date: Tue, 31 Aug 2021 19:54:31 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHXnnd7IVjUu+L6S0mPq9naNxJ1FQ==
  • Thread-topic: Disable IOMMU in Dom0

Hi, Stefano!

I have seen your negotiation of disabling xen-swiotlb for devices which are 
controlled by IOMMU in Dom0:
https://patchwork.kernel.org/project/xen-devel/patch/alpine.DEB.2.21.2102161333090.3234@sstabellini-ThinkPad-T480s/

As I was thinking to create a common implementation because I have the issue
when device controlled by IOMMU using xen-swiotlb fops and bounce buffer as the 
result.
https://lore.kernel.org/xen-devel/060b5741-922c-115c-7e8c-97d8aa5f46f4@xxxxxxx/T/

Do you have any future plans to finish implementation for upstream?

Cheers!


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.