|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3] AMD/intremap: Prevent use of per-device vector maps until irq logic is fixed
>>> On 27.06.13 at 01:28, Suravee Suthikulanit <suravee.suthikulpanit@xxxxxxx>
wrote:
> On 6/26/2013 4:54 AM, Andrew Cooper wrote:
>> On 04/06/13 17:38, Andrew Cooper wrote:
>>> XSA-36 changed the default vector map mode from global to per-device. This
>>> is
>>> because a global vector map does not prevent one PCI device from
> impersonating
>>> another and launching a DoS on the system.
>>>
>>> However, the per-device vector map logic is broken for devices with multiple
>>> MSI-X vectors, which can either result in a failed ASSERT() or
>>> misprogramming
>>> of a guests interrupt remapping tables. The core problem is not trivial to
>>> fix.
>>>
>>> In an effort to get AMD systems back to a non-regressed state, introduce a
> new
>>> type of vector map called per-device-global. This uses per-device vector
>>> maps
>>> in the IOMMU, but uses a single used_vector map for the core IRQ logic.
>>>
>>> This patch is intended to be removed as soon as the per-device logic is
>>> fixed
>>> correctly.
>>>
>>> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>> Can we get a decision on this? The 4.3 is looming and multi MSI-X PCI
>> functions are *still* broken on AMD systems, in all stable versions of
>> Xen, regressed by XSA-36.
>>
>> From my understanding of the points so far, we have agreed that this
>> patch is suitable for 4.3 and previous, with Jan's multi-MSI series
>> being the correct solution going forwards into 4.4.
> Since the feedback suggesting that cleaning up is probably not
> necessary, the only thing is probably the use of the word "BUG". Could
> it be replaced with "Workaround" instead?
I'd just drop the "BUG:". And I can certainly do so while applying.
So in cases where you want something trivial changed, you could
simply give an ack saying under what conditions that ack applies.
Jan
>> The only query at the moment is for the exact wording, which has had no
>> attention for a week.
>>
>> ~Andrew
>>
>>> ---
>>> Changes since v2:
>>> * Do not override command line.
>>> * reuse OPT_IRQ_VECTOR_MAP_GLOBAL.
>>>
>>> Changes since v1:
>>> * Correct stupid mistake in commit message, making it confusing to read
>>>
>>> diff -r 2d37d2d652a8 -r a017d74f346d
> xen/drivers/passthrough/amd/pci_amd_iommu.c
>>> --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>> +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>> @@ -223,8 +223,19 @@ int __init amd_iov_detect(void)
>>> {
>>> if ( amd_iommu_perdev_intremap )
>>> {
>>> - printk("AMD-Vi: Enabling per-device vector maps\n");
>>> - opt_irq_vector_map = OPT_IRQ_VECTOR_MAP_PERDEV;
>>> + /* Per-device vector map logic is broken for devices with
> multiple
>>> + * MSI-X interrupts (and would also be for multiple MSI, if Xen
>>> + * supported it).
>>> + *
>>> + * Until this is fixed, use global vector tables as far as the
> irq
>>> + * logic is concerned to avoid the buggy behaviour of
>>> per-device
>>> + * maps in map_domain_pirq(), and use per-device tables as far
> as
>>> + * intremap code is concerned to avoid the security issue.
>>> + */
>>> + printk(XENLOG_WARNING "AMD-Vi BUG: per-device vector map logic
>>> is
> broken. "
>>> + "Using per-device-global maps instead until a fix is
> found\n");
>>> +
>>> + opt_irq_vector_map = OPT_IRQ_VECTOR_MAP_GLOBAL;
>>> }
>>> else
>>> {
>>> @@ -235,6 +246,12 @@ int __init amd_iov_detect(void)
>>> else
>>> {
>>> printk("AMD-Vi: Not overriding irq_vector_map setting\n");
>>> +
>>> + if ( opt_irq_vector_map != OPT_IRQ_VECTOR_MAP_GLOBAL )
>>> + {
>>> + printk(XENLOG_WARNING "AMD-Vi BUG: per-device vector map logic
>>> is
> broken. "
>>> + "Use irq_vector_map=global to work around.");
>>> + }
>>> }
>>> if ( !amd_iommu_perdev_intremap )
>>> printk(XENLOG_WARNING "AMD-Vi: Using global interrupt remap table
> is not recommended (see XSA-36)!\n");
>>>
>>> _______________________________________________
>>> Xen-devel mailing list
>>> Xen-devel@xxxxxxxxxxxxx
>>> http://lists.xen.org/xen-devel
>>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |