Re: Interrupt remapping quirk tainting the kernel

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Mon, Mar 31, 2014 at 04:18:05PM +0200, Jean Delvare wrote:
> Hi Neil,
> 
> Le Monday 31 March 2014 à 06:56 -0400, Neil Horman a écrit :
> > On Mon, Mar 31, 2014 at 10:17:48AM +0200, Jean Delvare wrote:
> > > Hi Neil and all,
> > > 
> > > I have (once again) a question about this commit:
> > > 
> > > From: Neil Horman <nhorman@xxxxxxxxxxxxx>
> > > Date: Tue, 16 Apr 2013 20:38:32 +0000
> > > Subject: iommu/vt-d: add quirk for broken interrupt remapping on 55XX chipsets
> > > Git-commit: 03bbcb2e7e292838bb0244f5a7816d194c911d62
> > > 
> > > When interrupt remapping is disabled by this quirk, the kernel gets
> > > tainted. What is the rationale for doing that?
> > > 
> > > The user can boot with intremap=off. That will also disable interrupt
> > > remapping, as the quirk does, but not taint the kernel. If this is
> > > considered OK then I fail to see why the quirk should behave differently
> > > and taint the kernel.
> > > 
> > > Thanks,
> > The quirk is intented to flag to the user the fact that BIOS has not followed
> > the recommended procedure that was laied out in the intel published errata
> > sheet.  Arguably you could say that we should still taint the kernel in the
> > event that intremap=off is still specified, but it seems pragmatic not to do so,
> > as the use of that option suggsts the administrator has asserted a workaround to
> > the problem that is identical to the fix (in the event that the BIOS vendor has
> > not released an update).
> 
> That doesn't really answer my question. While I understand that the
> preferred fix is that the BIOS disables the feature, how bad are we if
> it does not and the kernel has to do it?
> 
For exactly the reason Prarit indicated.  Because the way its currently coded
gives me valuable information when debugging systems.  It tells me that the
customer is running with a bios that exposes a bug in the hardware, that while
we can work around dynamically, we should still inform them of.

> We normally taint the kernel when the situation is such that debugging
> the kernel would be a waste of time.
Um, no.  Thats absolutely not the reason we taint the kernel.  If you are using
the kernel taint as an excuse to shurg off support responsibiilty, you're doing
it wrong.

> For example, because a binary
> driver was loaded, or a module was forcibly unloaded, etc.
That just means that those things happeend, which may be (and very likely are)
relevant to the debugging process.  It means that you need to ask the bug
reporter about it, get in touch with the module vendor, Attempt to recreate
without the tainting actions, etc.  It by no means indicates debugging is
"useless"

> How does that
> apply here? If the quirk kicks in, aren't we just as safe as if the BIOS
> had disabled the feature? If not, then I would like to understand why,
> and document it properly.
> 
Yes, we are just as safe, but see above, the reasons we taint the kernel aren't
the reasons you think.

Regards
Neil

> Thanks,
> -- 
> Jean Delvare
> SUSE L3 Support
> 
> 
--
To unsubscribe from this list: send the line "unsubscribe linux-pci" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html




[Index of Archives]     [DMA Engine]     [Linux Coverity]     [Linux USB]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Greybus]

  Powered by Linux