lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 19 Apr 2016 19:04:43 +0300 From: "Michael S. Tsirkin" <mst@...hat.com> To: Andy Lutomirski <luto@...capital.net> Cc: Cornelia Huck <cornelia.huck@...ibm.com>, Christian Borntraeger <borntraeger@...ibm.com>, "qemu-devel@...gnu.org Developers" <qemu-devel@...gnu.org>, David Woodhouse <dwmw2@...radead.org>, Wei Liu <wei.liu2@...rix.com>, Alex Williamson <alex.williamson@...hat.com>, peterx@...hat.com, Stefan Hajnoczi <stefanha@...hat.com>, Linux Virtualization <virtualization@...ts.linux-foundation.org>, qemu-block@...gnu.org, Kevin Wolf <kwolf@...hat.com>, Amit Shah <amit.shah@...hat.com>, "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>, Jason Wang <jasowang@...hat.com>, Paolo Bonzini <pbonzini@...hat.com>, kvm list <kvm@...r.kernel.org> Subject: Re: [PATCH RFC] fixup! virtio: convert to use DMA api On Tue, Apr 19, 2016 at 09:00:27AM -0700, Andy Lutomirski wrote: > On Apr 19, 2016 2:13 AM, "Michael S. Tsirkin" <mst@...hat.com> wrote: > > > > > > I guess you are right in that we should split this part out. > > What I wanted is really the combination > > PASSTHROUGH && !PLATFORM so that we can say "ok we don't > > need to guess, this device actually bypasses the IOMMU". > > What happens when you use a device like this on Xen or with a similar > software translation layer? I think you don't use it on Xen since virtio doesn't bypass an IOMMU there. If you do you have misconfigured your device. -- MST
Powered by blists - more mailing lists