lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Thu, 4 Apr 2013 14:11:54 -0700 From: Yinghai Lu <yinghai@...nel.org> To: Bjorn Helgaas <bhelgaas@...gle.com> Cc: Neil Horman <nhorman@...driver.com>, Don Dutile <ddutile@...hat.com>, Linux Kernel Mailing List <linux-kernel@...r.kernel.org>, Prarit Bhargava <prarit@...hat.com>, Don Zickus <dzickus@...hat.com>, Asit Mallick <asit.k.mallick@...el.com>, David Woodhouse <dwmw2@...radead.org>, "linux-pci@...r.kernel.org" <linux-pci@...r.kernel.org> Subject: Re: [PATCH v4] irq: add quirk for broken interrupt remapping on 55XX chipsets On Thu, Apr 4, 2013 at 1:33 PM, Bjorn Helgaas <bhelgaas@...gle.com> wrote: >> See my last email to Bjorn. Doing this in early-quirks in such a way that we >> can detect an iommu that has interrupt remapping enabled (so we don't just >> unilaterally print this quirk all the time) requires that we be able to parse >> acpi tables very early in the boot. If you know of how to do that, I can make >> this happen. If not, I suppose another alternative would be to have the early >> quirk set a flag that tells us this is a bogus chip, and if we try to enable irq >> remapping with that flag set, we should fail, and report the error at that time, >> but I'm not sure I like that solution. > > I like that solution :) It seems very simple -- you don't have to > parse any tables or anything. You are right, we don't need to parse any acpi tables. just add one quirk in early-quirk.c to set disable_irq_remap = 1; Thanks Yinghai -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists