From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8037AC73C50 for ; Tue, 9 Jul 2019 14:43:49 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 5952621537 for ; Tue, 9 Jul 2019 14:43:49 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726436AbfGIOnr (ORCPT ); Tue, 9 Jul 2019 10:43:47 -0400 Received: from Galois.linutronix.de ([193.142.43.55]:45406 "EHLO Galois.linutronix.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726046AbfGIOnr (ORCPT ); Tue, 9 Jul 2019 10:43:47 -0400 Received: from [5.158.153.52] (helo=nanos.tec.linutronix.de) by Galois.linutronix.de with esmtpsa (TLS1.2:DHE_RSA_AES_256_CBC_SHA256:256) (Exim 4.80) (envelope-from ) id 1hkrLK-00005i-RW; Tue, 09 Jul 2019 16:43:42 +0200 Date: Tue, 9 Jul 2019 16:43:42 +0200 (CEST) From: Thomas Gleixner To: Paolo Bonzini cc: Andrew Cooper , LKML , x86@kernel.org, Nadav Amit , Ricardo Neri , Stephane Eranian , Feng Tang , Andy Lutomirski , Alex Williamson Subject: Re: [patch V2 04/25] x86/apic: Make apic_pending_intr_clear() more robust In-Reply-To: Message-ID: References: <20190704155145.617706117@linutronix.de> <20190704155608.636478018@linutronix.de> <958a67c2-4dc0-52e6-43b2-1ebd25a59232@citrix.com> <3e9c8e2b-db98-6796-5241-7405f8c57564@redhat.com> User-Agent: Alpine 2.21 (DEB 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, 7 Jul 2019, Thomas Gleixner wrote: > On Fri, 5 Jul 2019, Paolo Bonzini wrote: > > On 05/07/19 22:25, Thomas Gleixner wrote: > > > The more interesting question is whether this is all relevant. If I > > > understood the issue correctly then this is mitigated by proper interrupt > > > remapping. > > > > Yes, and for Linux we're good I think. VFIO by default refuses to use > > the IOMMU if interrupt remapping is absent or disabled, and KVM's own > > Confused. If it does not use IOMMU, what does it do? Hand in the device as > is and let the guest fiddle with it unconstrained or does it actually > refuse to pass through? Read through it and it refuses to attach unless the allow_unsafe_interrupts option is set, but again we can't protect against wilful ignorance. So the default prevents abuse on systems without IOMMU and irq remapping, so there is not much to worry about AFAICT. Setting TPR to 1 and fixing the comments/changelogs still makes sense independently. Thanks, tglx