lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 26 Jun 2014 18:08:25 +0000 From: "Chalamarla, Tirumalesh" <Tirumalesh.Chalamarla@...iumnetworks.com> To: Joerg Roedel <joro@...tes.org>, Will Deacon <will.deacon@....com> CC: "stuart.yoder@...escale.com" <stuart.yoder@...escale.com>, "kvm@...r.kernel.org" <kvm@...r.kernel.org>, open list <linux-kernel@...r.kernel.org>, "iommu@...ts.linux-foundation.org" <iommu@...ts.linux-foundation.org>, "alex.williamson@...hat.com" <alex.williamson@...hat.com>, "moderated list:ARM SMMU DRIVER" <linux-arm-kernel@...ts.infradead.org>, "tech@...tualopensystems.com" <tech@...tualopensystems.com>, "kvmarm@...ts.cs.columbia.edu" <kvmarm@...ts.cs.columbia.edu>, Christoffer Dall <christoffer.dall@...aro.org> Subject: RE: [RFC PATCH v6 04/20] iommu/arm-smmu: add capability IOMMU_CAP_INTR_REMAP Forgive me if this discussion is not relative here, but I thought it is. How is VFIO restricting devices from writing to MSI/MSI-X, Is all the vector area is mapped by VFIO to trap the accesses. I am asking this because we might need to emulate ITS somewhere either in KVM or VFIO to provide direct access to devices. And I don't see any mentions on that. I think this flag needs to be set by ITS emulation. Regards, Tirumalesh. -----Original Message----- From: kvmarm-bounces@...ts.cs.columbia.edu [mailto:kvmarm-bounces@...ts.cs.columbia.edu] On Behalf Of Joerg Roedel Sent: Monday, June 16, 2014 8:39 AM To: Will Deacon Cc: stuart.yoder@...escale.com; kvm@...r.kernel.org; open list; iommu@...ts.linux-foundation.org; alex.williamson@...hat.com; moderated list:ARM SMMU DRIVER; tech@...tualopensystems.com; kvmarm@...ts.cs.columbia.edu; Christoffer Dall Subject: Re: [RFC PATCH v6 04/20] iommu/arm-smmu: add capability IOMMU_CAP_INTR_REMAP On Mon, Jun 16, 2014 at 04:25:26PM +0100, Will Deacon wrote: > Ok, thanks. In which case, I think this is really a combined property > of the SMMU and the interrupt controller, so we might need some extra > code so that the SMMU can check that the interrupt controller for the > device is also capable of interrupt remapping. Right, that this is part of IOMMU code has more or less historic reasons on x86. Interrupt remapping is purely implemented in the IOMMU there, so on ARM some clue-code between interrupt controler and smmu is needed. Joerg _______________________________________________ kvmarm mailing list kvmarm@...ts.cs.columbia.edu https://lists.cs.columbia.edu/mailman/listinfo/kvmarm -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists