Re: [PATCH 00/11 v3] Cleanup IOMMU passthrough setting (and disable IOMMU Passthrough when SME is active)

2019-08-23 Thread Joerg Roedel
On Mon, Aug 19, 2019 at 03:22:45PM +0200, Joerg Roedel wrote: > Joerg Roedel (11): > iommu: Remember when default domain type was set on kernel command line > iommu: Add helpers to set/get default domain type > iommu: Use Functions to set default domain type in > iommu_set_

Re: [PATCH v8 RESEND 27/38] iommu/amd: Allow the AMD IOMMU to work with memory encryption

2017-06-28 Thread Joerg Roedel
name suggests that it checks whether the iommu hardware supports SME. How about renaming it to amd_iommu_sme_check()? With that change the patch is: Acked-by: Joerg Roedel -- To unsubscribe from this list: send the line "unsubscribe linux-doc" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html

Re: [PATCH v6 26/34] iommu/amd: Allow the AMD IOMMU to work with memory encryption

2017-06-21 Thread Joerg Roedel
On Thu, Jun 15, 2017 at 11:41:12AM +0200, Borislav Petkov wrote: > On Wed, Jun 14, 2017 at 03:40:28PM -0500, Tom Lendacky wrote: > > > WARNING: Use of volatile is usually wrong: see > > > Documentation/process/volatile-considered-harmful.rst > > > #134: FILE: drivers/iommu/amd_iommu.c:866: > > > +

Re: [PATCH v5 untested] kvm: better MWAIT emulation for guests

2017-03-21 Thread Joerg Roedel
On Wed, Mar 15, 2017 at 11:22:18PM +0200, Michael S. Tsirkin wrote: > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > index d1efe2c..18e53bc 100644 > --- a/arch/x86/kvm/svm.c > +++ b/arch/x86/kvm/svm.c > @@ -1198,8 +1198,6 @@ static void init_vmcb(struct vcpu_svm *svm) > set_intercept(

Re: [RFC PATCH v3 04/20] x86: Handle reduction in physical address size with SME

2016-11-15 Thread Joerg Roedel
On Wed, Nov 09, 2016 at 06:35:13PM -0600, Tom Lendacky wrote: > +/* > + * AMD Secure Memory Encryption (SME) can reduce the size of the physical > + * address space if it is enabled, even if memory encryption is not active. > + * Adjust x86_phys_bits if SME is enabled. > + */ > +static void phys_bi

Re: [RFC PATCH v3 14/20] iommu/amd: Disable AMD IOMMU if memory encryption is active

2016-11-14 Thread Joerg Roedel
On Wed, Nov 09, 2016 at 06:37:32PM -0600, Tom Lendacky wrote: > + /* For now, disable the IOMMU if SME is active */ > + if (sme_me_mask) > + return -ENODEV; > + Please print a message here telling the user why the IOMMU got disabled. Thanks, Joerg -- To unsubscribe

Re: [PATCH] Documentation: DMA-API: Clarify semantics of dma_set_mask_and_coherent

2016-10-24 Thread Joerg Roedel
On Fri, Oct 21, 2016 at 03:09:16PM -0600, Jonathan Corbet wrote: > On Mon, 17 Oct 2016 16:26:23 +0100 > Punit Agrawal wrote: > > > The dma mapping api howto gives the impression that using the > > dma_set_mask_and_coherent (and related DMA APIs) will cause the kernel > > to check all the componen

Re: [RFC v1 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)

2016-04-19 Thread Joerg Roedel
Hi Thomas, On Fri, Apr 15, 2016 at 03:03:12PM -0700, Thomas Garnier wrote: > +/* > + * Create PGD aligned trampoline table to allow real mode initialization > + * of additional CPUs. Consume only 1 additonal low memory page. > + */ > +void __meminit kaslr_trampoline_init(unsigned long page_size_ma

Re: [RFC v1 3/4] x86, boot: Implement ASLR for kernel memory sections (x86_64)

2016-04-18 Thread Joerg Roedel
On Fri, Apr 15, 2016 at 03:03:12PM -0700, Thomas Garnier wrote: > +#if defined(CONFIG_KASAN) > +static const unsigned long memory_rand_end = KASAN_SHADOW_START; > +#elfif defined(CONFIG_X86_ESPFIX64) > +static const unsigned long memory_rand_end = ESPFIX_BASE_ADDR; > +#elfif defined(CONFIG_EFI) > +

Re: [PATCH] Intel-IOMMU.txt: fix link

2016-01-29 Thread Joerg Roedel
On Tue, Jan 26, 2016 at 06:33:04PM +0200, Michael S. Tsirkin wrote: > Looks like the VT-D spec at intel.com got moved. > Update the link. > > Signed-off-by: Michael S. Tsirkin > --- > Documentation/Intel-IOMMU.txt | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) Applied, thanks. -- To u