On 11/15/11 12:10 PM, "Scott Wood" <scottwood@xxxxxxxxxxxxx> wrote: > On 11/15/2011 12:34 AM, David Gibson wrote: <snip> >>> +static int allow_unsafe_intrs; >>> +module_param(allow_unsafe_intrs, int, 0); >>> +MODULE_PARM_DESC(allow_unsafe_intrs, >>> + "Allow use of IOMMUs which do not support interrupt remapping"); >> >> This should not be a global option, but part of the AMD/Intel IOMMU >> specific code. In general it's a question of how strict the IOMMU >> driver is about isolation when it determines what the groups are, and >> only the IOMMU driver can know what the possibilities are for its >> class of hardware. > > It's also a concern that is specific to MSIs. In any case, I'm not sure > that the ability to cause a spurious IRQ is bad enough to warrant > disabling the entire subsystem by default on certain hardware. I think the issue is more that the ability to create fake MSI interrupts can lead to bigger exploits. Originally we didn't have this parameter. It was added it to reflect the fact that MSI's triggered by guests are dangerous without the isolation that interrupt remapping provides. That is, it *should* be inconvenient to run without interrupt mapping HW support. -Aaron > Probably best to just print a warning on module init if there are any > known isolation holes, and let the admin decide whom (if anyone) to let > use this. If the hole is bad enough that it must be confirmed, it > should require at most a sysfs poke. > > -Scott > -- To unsubscribe from this list: send the line "unsubscribe kvm" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html