lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Z9xAnusUbAiAHT7s@macbook.local>
Date: Thu, 20 Mar 2025 17:21:50 +0100
From: Roger Pau Monné <roger.pau@...rix.com>
To: Nirmal Patel <nirmal.patel@...ux.intel.com>,
	Bjorn Helgaas <helgaas@...nel.org>
Cc: Juergen Gross <jgross@...e.com>, linux-kernel@...r.kernel.org,
	xen-devel@...ts.xenproject.org
Subject: Re: [PATCH v3 0/3] xen: Fix usage of devices behind a VMD bridge

Ping x2?

Thanks, Roger.

On Thu, Mar 06, 2025 at 09:48:07AM +0100, Roger Pau Monné wrote:
> Hello,
> 
> I've attempted to ping Nirmal directly on the VMD patch, but got no
> reply so far.
> 
> First version of this series was posted on 10/01, yet there hasn't
> been any feedback from Nirmal.  Would it be possible to merge this
> without Nirmal Ack due to timeout?
> 
> It's not even a new feature, just a bugfix that allows running with
> VMD devices when using Xen.
> 
> Thanks, Roger.
> 
> On Wed, Feb 19, 2025 at 10:20:54AM +0100, Roger Pau Monne wrote:
> > Hello,
> > 
> > The following series should fix the usage of devices behind a VMD bridge
> > when running Linux as a Xen PV hardware domain (dom0).  I've only been
> > able to test PV. I think PVH should also work but I don't have hardware
> > capable of testing it right now.
> > 
> > I don't expect the first two patches to be problematic, the last patch
> > is likely to be more controversial.  I've tested it internally and
> > didn't see any issues, but my testing of PV mode is mostly limited to
> > dom0.
> > 
> > Thanks, Roger.
> > 
> > Roger Pau Monne (3):
> >   xen/pci: Do not register devices with segments >= 0x10000
> >   PCI: vmd: Disable MSI remapping bypass under Xen
> >   PCI/MSI: Convert pci_msi_ignore_mask to per MSI domain flag
> > 
> >  arch/x86/pci/xen.c           |  8 ++------
> >  drivers/pci/controller/vmd.c | 20 +++++++++++++++++++
> >  drivers/pci/msi/msi.c        | 37 ++++++++++++++++++++----------------
> >  drivers/xen/pci.c            | 32 +++++++++++++++++++++++++++++++
> >  include/linux/msi.h          |  3 ++-
> >  kernel/irq/msi.c             |  2 +-
> >  6 files changed, 78 insertions(+), 24 deletions(-)
> > 
> > -- 
> > 2.46.0
> > 

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ