[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 0/2] VT-d: correct / extend workaround(s) leaving an IOMMU disabled [and 1 more messages]
Jan Beulich writes ("[PATCH 0/2] VT-d: correct / extend workaround(s) leaving an IOMMU disabled"): > Ian - I'm also Cc-ing you since this feels like being on the edge > between a new feature and a bug fix. Thanks. I think 2/ is a new quirk (or, new behaviour for an existing quirk). I think I am happy to treat that as a bugfix, assuming we are reasonably confident that most systems (including in particular all systems without the quirk) will take unchanged codepaths. Is that right ? I don't understand 1/. It looks bugfixish to me but I am really not qualified. I am inclined to defer to your judgement, but it would help me if you explicitly addressed the overall risks/benefits. But when reading the patch I did notice one thing that struck me as undesriable: > --- a/xen/drivers/passthrough/vtd/iommu.c > +++ b/xen/drivers/passthrough/vtd/iommu.c > @@ -750,27 +750,43 @@ static void iommu_enable_translation(str > if ( force_iommu ) > - panic("BIOS did not enable IGD for VT properly, crash Xen > for security purpose\n"); > + panic(crash_fmt, msg); ... > + if ( force_iommu ) > + panic(crash_fmt, msg); Does this really mean that every exit path from iommu_enable_translation that doesn't enable the iommu has to have a check for force_iommu ? That seems like a recipe for missing one. And I think a missed one would be an XSA. Could we not structure the code some way to avoid this foreseeable human error ? Ian.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |