[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: Ping: [PATCH 0/9] IOMMU: XSA-373 follow-on


  • To: Jan Beulich <jbeulich@xxxxxxxx>, Paul Durrant <paul@xxxxxxx>
  • From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
  • Date: Wed, 23 Jun 2021 06:58:18 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rKbibNmf6U+HXj1UKcHd0r7LDzPyMPoJUg6UneLdkKo=; b=jIYbxuv4PMKCQP42PsORapbsBaMNZIdcTavwT4cED0idzM8X8NjrWrXRP1F8rsfthn1ZtGOplUrzGScXaJGlnl6PXj407ZzE3e2LFv5wmY6Ub2x6UjOG+ZmNYod4VGujGXaDoNXN7anht/5R5Z6GuryAj7PksMADlTYvFrID9XmCCUikfHok0BL1TEmmFsfhymqCwNYz48ucFu0XrGNFJ8XXeo2XBQCoMC/hGIKp4orWNSdWAhjqsRoNXL6Tll2RPauGC4pK24UvGTya6djPECqhtL0bxgEyUyQOBMZwtMMUf2cAP6HBT54u+EnZE0/7DRPgFtCJyc6C0aGQdVAaOw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=i8fMbqibm7qsV2sRxiXvEjKlSxKPnx/BCRs8jAuODGkYxvD+Zm4hIORJp4bX96VJgLSDfXk7mrzr9F/pzEx7n4SnYYTCSZPCrIKBs21bmV/PrmUhR8DlxRmqw3AKBlVX2bYA9zp9CQBNVCc4QraqS17TMU/uIvoBwSVWsbrYszyMFEY4P0HETB8GIX2RebVhL+HbzJwEWEgIU0UycOKpOZDfeeH30kmxJiarU23R1JNWfjpKMouMlT6BExEyzjErWixPTYyZCAhhBsVqtPB1qLxRRbDXfO569cm6EgAZeMZJhjnrC9zzu/5ohagaj5o2lFUIODMiaKD0HdeJwrhQOw==
  • Authentication-results: suse.com; dkim=none (message not signed) header.d=none;suse.com; dmarc=none action=none header.from=intel.com;
  • Cc: "Cooper, Andrew" <andrew.cooper3@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 23 Jun 2021 06:58:39 +0000
  • Dlp-product: dlpe-windows
  • Dlp-reaction: no-action
  • Dlp-version: 11.5.1.3
  • Ironport-sdr: 8lOAmD+vDMOvBACwSeFHakU6vrziYgvhiXnqfpkCbUWRFJgigIB27QOPIE6G4ErsuYn10Gp2PT DrRo2fFE8Tfw==
  • Ironport-sdr: X5ekwXbp+GAE5lm5gNQm/LljaXnTKIojtQrpOC99tu/qXSNQa1L5xJbiCprGfkmqj3CNsfnkso 6kSwPudY2laQ==
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHXXRF3+9Tikxxns0WkinxCJ12rU6shPlYAgAABsLA=
  • Thread-topic: Ping: [PATCH 0/9] IOMMU: XSA-373 follow-on

> From: Jan Beulich <jbeulich@xxxxxxxx>
> Sent: Wednesday, June 23, 2021 2:52 PM
> 
> On 09.06.2021 11:25, Jan Beulich wrote:
> > A number of further adjustments were left out of the XSA, for not
> > being a security concern (anymore in some of the cases, with the
> > changes put in place there). This is the collection, possibly
> > looking a little random in what it contains.
> >
> > 1: AMD/IOMMU: redo awaiting of command completion
> > 2: AMD/IOMMU: re-work locking around sending of commands
> 
> For these two I have v2 largely ready.
> 
> > 3: VT-d: undo device mappings upon error
> > 4: VT-d: adjust domid map updating when unmapping context
> > 5: VT-d: clear_fault_bits() should clear all fault bits
> > 6: VT-d: don't lose errors when flushing TLBs on multiple IOMMUs
> > 7: VT-d: centralize mapping of QI entries
> > 8: VT-d: drop/move a few QI related constants
> 
> Kevin, any word on these?

will take a look later today or tomorrow.

> 
> > 9: IOMMU/PCI: don't let domain cleanup continue when device de-
> assignment failed
> 
> Paul, any feedback on this one?
> 
> Thanks, Jan


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.