From: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
"Keir (Xen.org)" <keir@xen.org>, Jacob Shin <jacob.shin@amd.com>,
"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>
Subject: Re: [PATCH v3] AMD/intremap: Prevent use of per-device vector maps until irq logic is fixed
Date: Thu, 27 Jun 2013 06:20:21 -0500 [thread overview]
Message-ID: <51CC1FF5.1060906@amd.com> (raw)
In-Reply-To: <51CC185C02000078000E1116@nat28.tlf.novell.com>
On 6/27/2013 3:47 AM, Jan Beulich wrote:
>>>> On 27.06.13 at 01:28, Suravee Suthikulanit <suravee.suthikulpanit@amd.com>
> wrote:
>> On 6/26/2013 4:54 AM, Andrew Cooper wrote:
>>> On 04/06/13 17:38, Andrew Cooper wrote:
>>>> XSA-36 changed the default vector map mode from global to per-device. This is
>>>> because a global vector map does not prevent one PCI device from
>> impersonating
>>>> another and launching a DoS on the system.
>>>>
>>>> However, the per-device vector map logic is broken for devices with multiple
>>>> MSI-X vectors, which can either result in a failed ASSERT() or misprogramming
>>>> of a guests interrupt remapping tables. The core problem is not trivial to
>>>> fix.
>>>>
>>>> In an effort to get AMD systems back to a non-regressed state, introduce a
>> new
>>>> type of vector map called per-device-global. This uses per-device vector maps
>>>> in the IOMMU, but uses a single used_vector map for the core IRQ logic.
>>>>
>>>> This patch is intended to be removed as soon as the per-device logic is fixed
>>>> correctly.
>>>>
>>>> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
>>> Can we get a decision on this? The 4.3 is looming and multi MSI-X PCI
>>> functions are *still* broken on AMD systems, in all stable versions of
>>> Xen, regressed by XSA-36.
>>>
>>> From my understanding of the points so far, we have agreed that this
>>> patch is suitable for 4.3 and previous, with Jan's multi-MSI series
>>> being the correct solution going forwards into 4.4.
>> Since the feedback suggesting that cleaning up is probably not
>> necessary, the only thing is probably the use of the word "BUG". Could
>> it be replaced with "Workaround" instead?
> I'd just drop the "BUG:". And I can certainly do so while applying.
> So in cases where you want something trivial changed, you could
> simply give an ack saying under what conditions that ack applies.
>
> Jan
Acked with removing the word "BUG" as suggested by Jan.
Suravee
>
>>> The only query at the moment is for the exact wording, which has had no
>>> attention for a week.
>>>
>>> ~Andrew
>>>
>>>> ---
>>>> Changes since v2:
>>>> * Do not override command line.
>>>> * reuse OPT_IRQ_VECTOR_MAP_GLOBAL.
>>>>
>>>> Changes since v1:
>>>> * Correct stupid mistake in commit message, making it confusing to read
>>>>
>>>> diff -r 2d37d2d652a8 -r a017d74f346d
>> xen/drivers/passthrough/amd/pci_amd_iommu.c
>>>> --- a/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>>> +++ b/xen/drivers/passthrough/amd/pci_amd_iommu.c
>>>> @@ -223,8 +223,19 @@ int __init amd_iov_detect(void)
>>>> {
>>>> if ( amd_iommu_perdev_intremap )
>>>> {
>>>> - printk("AMD-Vi: Enabling per-device vector maps\n");
>>>> - opt_irq_vector_map = OPT_IRQ_VECTOR_MAP_PERDEV;
>>>> + /* Per-device vector map logic is broken for devices with
>> multiple
>>>> + * MSI-X interrupts (and would also be for multiple MSI, if Xen
>>>> + * supported it).
>>>> + *
>>>> + * Until this is fixed, use global vector tables as far as the
>> irq
>>>> + * logic is concerned to avoid the buggy behaviour of per-device
>>>> + * maps in map_domain_pirq(), and use per-device tables as far
>> as
>>>> + * intremap code is concerned to avoid the security issue.
>>>> + */
>>>> + printk(XENLOG_WARNING "AMD-Vi BUG: per-device vector map logic is
>> broken. "
>>>> + "Using per-device-global maps instead until a fix is
>> found\n");
>>>> +
>>>> + opt_irq_vector_map = OPT_IRQ_VECTOR_MAP_GLOBAL;
>>>> }
>>>> else
>>>> {
>>>> @@ -235,6 +246,12 @@ int __init amd_iov_detect(void)
>>>> else
>>>> {
>>>> printk("AMD-Vi: Not overriding irq_vector_map setting\n");
>>>> +
>>>> + if ( opt_irq_vector_map != OPT_IRQ_VECTOR_MAP_GLOBAL )
>>>> + {
>>>> + printk(XENLOG_WARNING "AMD-Vi BUG: per-device vector map logic is
>> broken. "
>>>> + "Use irq_vector_map=global to work around.");
>>>> + }
>>>> }
>>>> if ( !amd_iommu_perdev_intremap )
>>>> printk(XENLOG_WARNING "AMD-Vi: Using global interrupt remap table
>> is not recommended (see XSA-36)!\n");
>>>> _______________________________________________
>>>> Xen-devel mailing list
>>>> Xen-devel@lists.xen.org
>>>> http://lists.xen.org/xen-devel
>
>
prev parent reply other threads:[~2013-06-27 11:20 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-06-04 16:38 [PATCH v3] AMD/intremap: Prevent use of per-device vector maps until irq logic is fixed Andrew Cooper
2013-06-10 12:25 ` Jan Beulich
2013-06-14 8:45 ` Jan Beulich
2013-06-15 1:13 ` Suravee Suthikulanit
2013-06-17 8:19 ` Jan Beulich
2013-06-17 8:55 ` George Dunlap
2013-06-17 9:00 ` Jan Beulich
2013-06-17 10:01 ` Andrew Cooper
2013-06-26 9:54 ` Andrew Cooper
2013-06-26 23:28 ` Suravee Suthikulanit
2013-06-27 8:47 ` Jan Beulich
2013-06-27 9:13 ` Andrew Cooper
2013-06-27 11:20 ` Suravee Suthikulpanit [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=51CC1FF5.1060906@amd.com \
--to=suravee.suthikulpanit@amd.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=jacob.shin@amd.com \
--cc=keir@xen.org \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).