[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <1305625748.8008.98.camel@i7.infradead.org>
Date: Tue, 17 May 2011 10:49:08 +0100
From: "Woodhouse, David" <david.woodhouse@...el.com>
To: Alex Williamson <alex.williamson@...hat.com>
CC: "Song, Youquan" <youquan.song@...el.com>,
"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
"akpm@...ux-foundation.org" <akpm@...ux-foundation.org>,
"mingo@...e.hu" <mingo@...e.hu>,
"tglx@...utronix.de" <tglx@...utronix.de>,
"hpa@...or.com" <hpa@...or.com>,
"hpa@...ux.intel.com" <hpa@...ux.intel.com>,
"Kay, Allen M" <allen.m.kay@...el.com>,
"Siddha, Suresh B" <suresh.b.siddha@...el.com>,
"Liu, Kent" <kent.liu@...el.com>,
Youquan Song <youquan.song@...ux.intel.com>
Subject: Re: [PATCH v2] x86, vt-d: enable x2apic opt out
On Mon, 2011-05-16 at 21:32 +0100, Alex Williamson wrote:
> Just a guess, but the OEM probably hasn't updated their SMI handlers to
> understand x2apic yet and won't before the product ships because some
> other OS doesn't bother to use x2apic.
Yay, crappy closed-source BIOS holds back the platform yet again.
> We can still enable interrupt remapping w/o x2apic though, so I'm
> curious what other irq injection tricks you're referring to. Thanks,
http://www.invisiblethingslab.com/resources/2011/Software%20Attacks%20on%20Intel%20VT-d.pdf
--
David Woodhouse Open Source Technology Centre
David.Woodhouse@...el.com Intel Corporation
Download attachment "smime.p7s" of type "application/x-pkcs7-signature" (6242 bytes)
Powered by blists - more mailing lists