From: Weidong Han <weidong.han@intel.com>
To: Sander Eikelenboom <linux@eikelenboom.it>
Cc: "xen-devel@lists.xensource.com" <xen-devel@lists.xensource.com>,
"Kay, Allen M" <allen.m.kay@intel.com>,
"Cihula, Joseph" <joseph.cihula@intel.com>,
Noboru Iwamatsu <n_iwamatsu@jp.fujitsu.com>,
"keir.fraser@eu.citrix.com" <keir.fraser@eu.citrix.com>
Subject: Re: [PATCH] VT-d: improve RMRR validity checking
Date: Fri, 22 Jan 2010 20:15:11 +0800 [thread overview]
Message-ID: <4B5996CF.9020409@intel.com> (raw)
In-Reply-To: <1098023846.20100122101901@eikelenboom.it>
Sander Eikelenboom wrote:
> Hello Weidong,
>
> Wouldn't it be more clear to add an option to iommu= for this case ?
>
> if iommu=on,..,..,security
>
> With the security option specified:
> -it would be most strict in it's checks, since enforcing security with the iommu requires that as you have pointed out.
> -warn,fail or panic incase it can't enable all to enforce the security.
>
iommu=force is for security. It does as you described above. So I think
"security" option is not necessary.
> Without the security option specified (default)
> - it tries to work as with the security option specified
> - but incase of problems makes the assumption the iommu's main task is not security, but making as much of vt-d working to keep the passthrough functionality
> - it will only warn, that you will lose the security part, that it would be wise to let your bios be fixed, and not making it panic
> - and keep vt-d enabled
>
>
the default iommu=1 works like iommu=force if BIOS is correct. But in
fact we encountered some buggy BIOS, and then we added some workarounds
to make VT-d still be enabled, or warn and disable VT-d if the issue is
regarded as invalid and cannot be workarounded. These workarounds make
Xen more defensive to VT-d BIOS issues. The panic only occurs when
operating VT-d hardware fails, because it means the hardware is possibly
malfunctional.
In short, default iommu=1 can workaround known VT-d BIOS issues we
observed till now, while iommu=force ensures best security provided by VT-d.
Regards,
Weidong
> Regards,
>
> Sander
>
>
>
> Friday, January 22, 2010, 9:47:11 AM, you wrote:
>
>
>> diff -r 207fba95a7d5 xen/drivers/passthrough/vtd/dmar.c
>> --- a/xen/drivers/passthrough/vtd/dmar.c Fri Jan 22 13:12:45 2010 +0800
>> +++ b/xen/drivers/passthrough/vtd/dmar.c Fri Jan 22 22:32:10 2010 +0800
>> @@ -396,8 +396,49 @@ acpi_parse_one_drhd(struct acpi_dmar_ent
>>
>> if ( ret )
>> xfree(dmaru);
>> + else if ( force_iommu || dmaru->include_all )
>> + acpi_register_drhd_unit(dmaru);
>> else
>> - acpi_register_drhd_unit(dmaru);
>> + {
>> + u8 b, d, f;
>> + int i, invalid_cnt = 0;
>> +
>> + for ( i = 0; i < dmaru->scope.devices_cnt; i++ )
>> + {
>> + b = PCI_BUS(dmaru->scope.devices[i]);
>> + d = PCI_SLOT(dmaru->scope.devices[i]);
>> + f = PCI_FUNC(dmaru->scope.devices[i]);
>> +
>> + if ( pci_device_detect(b, d, f) == 0 )
>> + {
>> + dprintk(XENLOG_WARNING VTDPREFIX,
>> + " Non-existent device (%x:%x.%x) is reported "
>> + "in this DRHD's scope!\n", b, d, f);
>> + invalid_cnt++;
>> + }
>> + }
>> +
>> + if ( invalid_cnt )
>> + {
>> + xfree(dmaru);
>> + if ( invalid_cnt == dmaru->scope.devices_cnt )
>> + {
>> + dprintk(XENLOG_WARNING VTDPREFIX,
>> + " Ignore the DRHD due to all devices under "
>> + "its scope are not PCI discoverable!\n");
>> + }
>> + else
>> + {
>> + dprintk(XENLOG_WARNING VTDPREFIX,
>> + " The DRHD is invalid due to some devices under "
>> + "its scope are not PCI discoverable!\n");
>> + ret = -EINVAL;
>> + }
>> + }
>> + else
>> + acpi_register_drhd_unit(dmaru);
>> + }
>> +
>> return ret;
>> }
>>
>>
>
>
>
>
next prev parent reply other threads:[~2010-01-22 12:15 UTC|newest]
Thread overview: 76+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-01-21 2:46 [PATCH] VT-d: improve RMRR validity checking Han, Weidong
2010-01-21 8:25 ` Noboru Iwamatsu
2010-01-21 8:38 ` Han, Weidong
2010-01-21 10:03 ` Noboru Iwamatsu
2010-01-21 10:08 ` Noboru Iwamatsu
2010-01-21 10:19 ` Weidong Han
2010-01-21 10:27 ` Keir Fraser
2010-01-21 10:49 ` Weidong Han
2010-01-21 12:19 ` Noboru Iwamatsu
2010-01-21 12:46 ` Weidong Han
2010-01-21 14:01 ` Keir Fraser
2010-01-21 14:17 ` Sander Eikelenboom
2010-01-21 14:33 ` Keir Fraser
2010-01-22 2:12 ` Weidong Han
2010-01-22 2:38 ` Noboru Iwamatsu
2010-01-22 2:53 ` Weidong Han
2010-01-22 3:16 ` Noboru Iwamatsu
2010-01-22 8:47 ` Weidong Han
2010-01-22 9:19 ` Sander Eikelenboom
2010-01-22 12:15 ` Weidong Han [this message]
2010-01-22 12:32 ` Pasi Kärkkäinen
2010-01-23 12:40 ` Weidong Han
2010-01-23 13:08 ` Pasi Kärkkäinen
2010-01-23 14:33 ` Sander Eikelenboom
2010-01-23 14:54 ` [PATCH] VT-d: improve RMRR validity checking, documenting boot options Pasi Kärkkäinen
2010-01-25 16:40 ` Stephen Spector
2010-01-25 16:58 ` Documentation Xen-hypervisor and Dom0 xen-related boot options (was Re: [PATCH] VT-d: improve RMRR validity checking, documenting boot options) Sander Eikelenboom
2010-01-25 20:56 ` Stephen Spector
2010-01-27 11:33 ` Pasi Kärkkäinen
2010-01-25 7:06 ` [PATCH] VT-d: improve RMRR validity checking Noboru Iwamatsu
2010-01-25 7:56 ` Weidong Han
2010-01-25 9:02 ` Sander Eikelenboom
2010-01-25 9:11 ` Weidong Han
2010-01-25 9:22 ` Noboru Iwamatsu
2010-01-25 10:08 ` Weidong Han
2010-01-25 10:45 ` Sander Eikelenboom
2010-01-25 13:43 ` Keir Fraser
2010-01-25 13:57 ` Christian Tramnitz
2010-01-25 14:10 ` Weidong Han
2010-01-26 1:16 ` Noboru Iwamatsu
2010-01-26 5:51 ` Weidong Han
2010-01-26 6:38 ` Noboru Iwamatsu
2010-01-26 6:42 ` Weidong Han
2010-01-25 14:12 ` Weidong Han
2010-01-25 14:13 ` Han, Weidong
2010-03-09 21:39 ` Alex Williamson
2010-03-09 21:30 ` Konrad Rzeszutek Wilk
2010-03-09 21:57 ` Alex Williamson
2010-03-09 22:22 ` Konrad Rzeszutek Wilk
2010-03-09 23:05 ` Alex Williamson
2010-03-09 23:25 ` Alex Williamson
2010-03-10 2:13 ` Alex Williamson
2010-03-10 2:40 ` Weidong Han
2010-03-10 3:18 ` Alex Williamson
2010-03-10 3:28 ` Weidong Han
2010-03-10 3:37 ` Alex Williamson
2010-03-10 4:25 ` Weidong Han
2010-03-10 4:47 ` Alex Williamson
2010-03-10 7:03 ` Weidong Han
2010-03-10 13:56 ` Alex Williamson
2010-03-10 18:06 ` Alex Williamson
2010-03-11 2:11 ` Weidong Han
2010-03-11 2:32 ` Alex Williamson
2010-03-11 3:44 ` Weidong Han
2010-03-11 4:52 ` Alex Williamson
2010-03-11 8:30 ` Weidong Han
2010-01-21 15:28 ` Andrew Lyon
2010-01-21 15:04 ` Keir Fraser
2010-01-22 1:35 ` Noboru Iwamatsu
2010-01-21 10:13 ` Weidong Han
2010-01-21 12:09 ` Noboru Iwamatsu
2010-01-21 12:38 ` Weidong Han
2010-01-22 0:23 ` Noboru Iwamatsu
2010-01-21 8:45 ` Andrew Lyon
2010-01-21 10:03 ` Weidong Han
2010-01-21 9:15 ` Keir Fraser
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4B5996CF.9020409@intel.com \
--to=weidong.han@intel.com \
--cc=allen.m.kay@intel.com \
--cc=joseph.cihula@intel.com \
--cc=keir.fraser@eu.citrix.com \
--cc=linux@eikelenboom.it \
--cc=n_iwamatsu@jp.fujitsu.com \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).