|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 0/2] VT-d: correct / extend workaround(s) leaving an IOMMU disabled [and 1 more messages]
Jan Beulich writes ("[PATCH 0/2] VT-d: correct / extend workaround(s) leaving
an IOMMU disabled"):
> Ian - I'm also Cc-ing you since this feels like being on the edge
> between a new feature and a bug fix.
Thanks.
I think 2/ is a new quirk (or, new behaviour for an existing quirk).
I think I am happy to treat that as a bugfix, assuming we are
reasonably confident that most systems (including in particular all
systems without the quirk) will take unchanged codepaths. Is that
right ?
I don't understand 1/. It looks bugfixish to me but I am really not
qualified. I am inclined to defer to your judgement, but it would
help me if you explicitly addressed the overall risks/benefits.
But when reading the patch I did notice one thing that struck me as
undesriable:
> --- a/xen/drivers/passthrough/vtd/iommu.c
> +++ b/xen/drivers/passthrough/vtd/iommu.c
> @@ -750,27 +750,43 @@ static void iommu_enable_translation(str
> if ( force_iommu )
> - panic("BIOS did not enable IGD for VT properly, crash Xen
> for security purpose\n");
> + panic(crash_fmt, msg);
...
> + if ( force_iommu )
> + panic(crash_fmt, msg);
Does this really mean that every exit path from
iommu_enable_translation that doesn't enable the iommu has to have a
check for force_iommu ?
That seems like a recipe for missing one. And I think a missed one
would be an XSA. Could we not structure the code some way to avoid
this foreseeable human error ?
Ian.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |