lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20171027063745.GA19799@infradead.org>
Date:   Thu, 26 Oct 2017 23:37:45 -0700
From:   Christoph Hellwig <hch@...radead.org>
To:     sbates@...thlin.com
Cc:     corbet@....net, bhelgaas@...gle.com, paulmck@...ux.vnet.ibm.com,
        tglx@...utronix.de, akpm@...ux-foundation.org, mingo@...nel.org,
        cdall@...aro.org, marc.zyngier@....com, zohar@...ux.vnet.ibm.com,
        linux-doc@...r.kernel.org, linux-kernel@...r.kernel.org,
        linux-pci@...r.kernel.org, logang@...tatee.com, tom@...pey.com
Subject: Re: [PATCH] pci: Add a acs_disable option for pci kernel parameter

On Thu, Oct 26, 2017 at 08:37:49PM -0600, sbates@...thlin.com wrote:
> From: Stephen Bates <sbates@...thlin.com>
> 
> On some servers the BIOS sets up ACS on any valid pci_dev in the
> system. The kernel has no way of backing this out since the kernel
> only turns ACS capabilities on.
> 
> This patch adds a new boot option to the pci kernel parameter called
> "acs_disable" that will disable ACS. This is useful for PCI peer to
> peer communication but can cause problems when IOVA isolation is
> required and an IOMMU is enabled. Use with care.

Eww.  Can we please add smbios quirks for the systems where you've
observed this? (we probably also want to keep the option just in case).

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ