[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <alpine.DEB.2.21.1907091638350.1634@nanos.tec.linutronix.de>
Date: Tue, 9 Jul 2019 16:43:42 +0200 (CEST)
From: Thomas Gleixner <tglx@...utronix.de>
To: Paolo Bonzini <pbonzini@...hat.com>
cc: Andrew Cooper <andrew.cooper3@...rix.com>,
LKML <linux-kernel@...r.kernel.org>, x86@...nel.org,
Nadav Amit <namit@...are.com>,
Ricardo Neri <ricardo.neri-calderon@...ux.intel.com>,
Stephane Eranian <eranian@...gle.com>,
Feng Tang <feng.tang@...el.com>,
Andy Lutomirski <luto@...nel.org>,
Alex Williamson <alex.williamson@...hat.com>
Subject: Re: [patch V2 04/25] x86/apic: Make apic_pending_intr_clear() more
robust
On Sun, 7 Jul 2019, Thomas Gleixner wrote:
> On Fri, 5 Jul 2019, Paolo Bonzini wrote:
> > On 05/07/19 22:25, Thomas Gleixner wrote:
> > > The more interesting question is whether this is all relevant. If I
> > > understood the issue correctly then this is mitigated by proper interrupt
> > > remapping.
> >
> > Yes, and for Linux we're good I think. VFIO by default refuses to use
> > the IOMMU if interrupt remapping is absent or disabled, and KVM's own
>
> Confused. If it does not use IOMMU, what does it do? Hand in the device as
> is and let the guest fiddle with it unconstrained or does it actually
> refuse to pass through?
Read through it and it refuses to attach unless the allow_unsafe_interrupts
option is set, but again we can't protect against wilful ignorance.
So the default prevents abuse on systems without IOMMU and irq remapping,
so there is not much to worry about AFAICT.
Setting TPR to 1 and fixing the comments/changelogs still makes sense
independently.
Thanks,
tglx
Powered by blists - more mailing lists