Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread Joerg Roedel
On Thu, Feb 07, 2013 at 09:02:38PM +, David Woodhouse wrote: > Backtraces add visibility and have proven to be extremely useful in the > past for getting people to actually *fix* broken BIOSes. > > When kerneloops.org was running, it also gave very good statistics which > helped to apply press

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread David Woodhouse
On Thu, 2013-02-07 at 18:27 +0100, Joerg Roedel wrote: > > Second, I think that it should be a pr_warn instead of a full WARN. When > IRQ remapping could not be enabled it's most likely because of the BIOS > or the hardware. So a message in the kernel log will do and the > backtrace provides no ad

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread Joerg Roedel
On Thu, Feb 07, 2013 at 09:53:45AM -0800, Andy Lutomirski wrote: > On Thu, Feb 7, 2013 at 9:27 AM, Joerg Roedel wrote: > > Hmm, looking into the intel_irq_remapping.c version in the tip tree > > makes me wonder even more. > > Is this the version I'm based on (intel_irq_remapping: Clean up x2apic

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread Andy Lutomirski
On Thu, Feb 7, 2013 at 9:27 AM, Joerg Roedel wrote: > On Thu, Feb 07, 2013 at 08:29:42AM -0800, Andy Lutomirski wrote: >> On Thu, Feb 7, 2013 at 3:33 AM, Joerg Roedel wrote: >> > On Wed, Feb 06, 2013 at 07:08:24PM -0800, Andy Lutomirski wrote: >> >> - if (x2apic_present) >> >> - W

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread Joerg Roedel
On Thu, Feb 07, 2013 at 08:29:42AM -0800, Andy Lutomirski wrote: > On Thu, Feb 7, 2013 at 3:33 AM, Joerg Roedel wrote: > > On Wed, Feb 06, 2013 at 07:08:24PM -0800, Andy Lutomirski wrote: > >> - if (x2apic_present) > >> - WARN(1, KERN_WARNING > >> - "Failed to e

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread Andy Lutomirski
On Thu, Feb 7, 2013 at 3:33 AM, Joerg Roedel wrote: > On Wed, Feb 06, 2013 at 07:08:24PM -0800, Andy Lutomirski wrote: >> - if (x2apic_present) >> - WARN(1, KERN_WARNING >> - "Failed to enable irq remapping. You are vulnerable >> to irq-injection attacks.\n");

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-07 Thread Joerg Roedel
On Wed, Feb 06, 2013 at 07:08:24PM -0800, Andy Lutomirski wrote: > - if (x2apic_present) > - WARN(1, KERN_WARNING > - "Failed to enable irq remapping. You are vulnerable to > irq-injection attacks.\n"); > - > + irq_remapping_is_secure = 0; > return -1

Re: [PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-06 Thread Andy Lutomirski
On Wed, Feb 6, 2013 at 7:08 PM, Andy Lutomirski wrote: > We currently report IOMMU_CAP_INTR_REMAP whenever interrupt remapping > is enabled. Users of that capability expect it to mean that remapping > is secure (i.e. compatibility format interrupts are blocked). Explicitly > check whether CFIs a

[PATCH] intel_iommu: Disable vfio and kvm interrupt assignment when unsafe

2013-02-06 Thread Andy Lutomirski
We currently report IOMMU_CAP_INTR_REMAP whenever interrupt remapping is enabled. Users of that capability expect it to mean that remapping is secure (i.e. compatibility format interrupts are blocked). Explicitly check whether CFIs are blocked and, if not, don't report the capability. Cc: Alex W