Received: by 2002:ad5:474a:0:0:0:0:0 with SMTP id i10csp4387484imu; Mon, 12 Nov 2018 10:09:41 -0800 (PST) X-Google-Smtp-Source: AJdET5fm023OwqwdffHmZ9Dzzijh87mvCB0L8iOwb2fPIb0hWk2BLqyYecvbglvxE17MEUQXoxtG X-Received: by 2002:a17:902:b78b:: with SMTP id e11mr1808250pls.90.1542046181614; Mon, 12 Nov 2018 10:09:41 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1542046181; cv=none; d=google.com; s=arc-20160816; b=wUaEF50RSb0sG8OuzUJPaCTfpW/M4uHwsdWJW+gUcvfAgEorWrtt5NhhrhTBNNigdE 9HBOgXbCgRRAMkRqzPNvuMXp+Qnvci44ittlk2fQ1J+Osc/+Bg/IOrolNtl8dwI0tKkU xXmCL8muIOqslRa8q8uNXdgE/5RiiVVV+xRBq4o2MS8UZnpuf9YiI9hYXNnU6c0K+Bq5 6h7jpBauEDMGLr+RG3OUqdB2RHOr7KBHMHor7n9x/ko8oFoahs84Zd5PlX0cd3W+3tpZ cQPXF1/msiKgxq2bOw5T1ys8tlgFfLMS6gE/ay/r/x5gcfXVr1KN/DJeNYZCacd1ifsh dJjw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:subject:cc:to:from:date; bh=fl4hN6w5DhGzhBC2W/QS7+WN3P2/eBYvUYlUzIFT40Y=; b=p31w8ZtCBZQrOc3Nh6ouaRAcAFU62XB3+aKH46iUsyS10rAVbI+c+qxu0mXzWaac5U nbtJsPPwTrPJdx+IX7+KwcrugVsGXQ86E43dprgEWuXSBXWqR5dyG03xqm4dWJqThebW f0umm/13hBPl5zi6XoQy853I0LJsABAC9UAOwMzEYz8pOE+ESEUdEfnyb1baGvmrHuMl V960SU2V6l7h2uGH+CALnKFLo6EpZnWgHXA7JOFC24i2pI49uThLF+LfrqCEfLeNnVPN +EO4ircoFv/sW8jL+8DHuWUWP31SFyg7r4TbtI5m+YUY9tmEBGcJ0eDMaNvbnPZlmyz4 YfNw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id o1-v6si19009201pld.229.2018.11.12.10.09.24; Mon, 12 Nov 2018 10:09:41 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729607AbeKMEDY (ORCPT + 99 others); Mon, 12 Nov 2018 23:03:24 -0500 Received: from mx1.redhat.com ([209.132.183.28]:42368 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727247AbeKMEDY (ORCPT ); Mon, 12 Nov 2018 23:03:24 -0500 Received: from smtp.corp.redhat.com (int-mx01.intmail.prod.int.phx2.redhat.com [10.5.11.11]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 75F89307D91B; Mon, 12 Nov 2018 18:09:03 +0000 (UTC) Received: from t450s.home (ovpn-116-133.phx2.redhat.com [10.3.116.133]) by smtp.corp.redhat.com (Postfix) with ESMTP id 599E6600D7; Mon, 12 Nov 2018 18:09:01 +0000 (UTC) Date: Mon, 12 Nov 2018 11:09:00 -0700 From: Alex Williamson To: Mika Westerberg Cc: iommu@lists.linux-foundation.org, Ashok Raj , Mario.Limonciello@dell.com, Michael Jamet , Christian Kellner , "Rafael J. Wysocki" , Yehezkel Bernat , Anthony Wong , Andreas Noever , Lukas Wunner , Jacob jun Pan , linux-pci@vger.kernel.org, Bjorn Helgaas , linux-acpi@vger.kernel.org, David Woodhouse , linux-kernel@vger.kernel.org Subject: Re: [PATCH 2/4] iommu/vt-d: Force IOMMU on for platform opt in hint Message-ID: <20181112110900.16cfee48@t450s.home> In-Reply-To: <20181112160628.86620-3-mika.westerberg@linux.intel.com> References: <20181112160628.86620-1-mika.westerberg@linux.intel.com> <20181112160628.86620-3-mika.westerberg@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.11 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.48]); Mon, 12 Nov 2018 18:09:04 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, 12 Nov 2018 19:06:26 +0300 Mika Westerberg wrote: > From: Lu Baolu > > Intel VT-d spec added a new DMA_CTRL_PLATFORM_OPT_IN_FLAG flag > in DMAR ACPI table for BIOS to report compliance about platform > initiated DMA restricted to RMRR ranges when transferring control > to the OS. The OS treats this as a hint that the IOMMU should be > enabled to prevent DMA attacks from possible malicious devices. Does this in any way suggest that there are additional recommended uses cases from Intel for RMRRs? My concern here is the incompatibility we have with RMRRs and device assignment as we currently cannot assign devices where the IOVA address space is encumbered by RMRR requirements. Unfortunately RMRRs do not indicate any sort or lifespan, so firmware enabling an RMRR simply to support some boot-time DMA encumbers the device with that RMRR for the life of that boot, unless we have VT-d code that decides it knows better. Thanks, Alex