[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 1/2] VT-d: apply quirks at device setup time rather than only at boot
> Accessing extended config space may not be possible at boot time, e.g. > when the memory space used by MMCFG is reserved only via ACPI tables, but > not in the E820/UEFI memory maps (which we need Dom0 to tell us about). > Consequently the change here still leaves the issue unaddressed for systems > where the extended config space remains inaccessible (due to firmware bugs, > i.e. not properly reserving the address space of those regions). > > With the respective messages now potentially getting logged more than once, > we ought to consider whether we should issue them only if we in fact were > required to do any masking (i.e. if the relevant mask bits weren't already > set). > > This is CVE-2013-3495 / XSA-59. > > Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Yang Zhang <yang.z.zhang@xxxxxxxxx> > > --- a/xen/drivers/passthrough/vtd/extern.h > +++ b/xen/drivers/passthrough/vtd/extern.h > @@ -99,7 +99,7 @@ void platform_quirks_init(void); void > vtd_ops_preamble_quirk(struct iommu* iommu); void > vtd_ops_postamble_quirk(struct iommu* iommu); void me_wifi_quirk(struct > domain *domain, u8 bus, u8 devfn, int map); -void pci_vtd_quirk(struct pci_dev > *pdev); > +void pci_vtd_quirk(const struct pci_dev *); > int platform_supports_intremap(void); > int platform_supports_x2apic(void); > > --- a/xen/drivers/passthrough/vtd/iommu.c > +++ b/xen/drivers/passthrough/vtd/iommu.c > @@ -1483,6 +1483,9 @@ static int domain_context_mapping( > break; > } > > + if ( !ret && devfn == pdev->devfn ) > + pci_vtd_quirk(pdev); > + > return ret; > } > > @@ -1922,6 +1925,8 @@ static int intel_iommu_enable_device(str > struct acpi_drhd_unit *drhd = acpi_find_matched_drhd_unit(pdev); > int ret = drhd ? ats_device(pdev, drhd) : -ENODEV; > > + pci_vtd_quirk(pdev); > + > if ( ret <= 0 ) > return ret; > > @@ -1994,12 +1999,7 @@ static int intel_iommu_remove_device(u8 > > static int __hwdom_init setup_hwdom_device(u8 devfn, struct pci_dev *pdev) > { > - int err; > - > - err = domain_context_mapping(pdev->domain, devfn, pdev); > - if ( !err && devfn == pdev->devfn ) > - pci_vtd_quirk(pdev); > - return err; > + return domain_context_mapping(pdev->domain, devfn, pdev); > } > > void clear_fault_bits(struct iommu *iommu) > --- a/xen/drivers/passthrough/vtd/quirks.c > +++ b/xen/drivers/passthrough/vtd/quirks.c > @@ -385,7 +385,7 @@ void me_wifi_quirk(struct domain *domain > * - This can cause system failure upon non-fatal VT-d faults > * - Potential security issue if malicious guest trigger VT-d faults > */ > -void __hwdom_init pci_vtd_quirk(struct pci_dev *pdev) > +void pci_vtd_quirk(const struct pci_dev *pdev) > { > int seg = pdev->seg; > int bus = pdev->bus; Best regards Yang _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |