summaryrefslogtreecommitdiffstats
path: root/security/security.c
diff options
context:
space:
mode:
authorKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>2015-11-03 00:13:27 +0100
committerKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>2015-12-18 16:48:39 +0100
commit408fb0e5aa7fda0059db282ff58c3b2a4278baa0 (patch)
tree777fad3ba2e341d7d7ac6d939bb94e99ba621920 /security/security.c
parentxen/pciback: For XEN_PCI_OP_disable_msi[|x] only disable if device has MSI(X)... (diff)
downloadlinux-408fb0e5aa7fda0059db282ff58c3b2a4278baa0.tar.xz
linux-408fb0e5aa7fda0059db282ff58c3b2a4278baa0.zip
xen/pciback: Don't allow MSI-X ops if PCI_COMMAND_MEMORY is not set.
commit f598282f51 ("PCI: Fix the NIU MSI-X problem in a better way") teaches us that dealing with MSI-X can be troublesome. Further checks in the MSI-X architecture shows that if the PCI_COMMAND_MEMORY bit is turned of in the PCI_COMMAND we may not be able to access the BAR (since they are memory regions). Since the MSI-X tables are located in there.. that can lead to us causing PCIe errors. Inhibit us performing any operation on the MSI-X unless the MEMORY bit is set. Note that Xen hypervisor with: "x86/MSI-X: access MSI-X table only after having enabled MSI-X" will return: xen_pciback: 0000:0a:00.1: error -6 enabling MSI-X for guest 3! When the generic MSI code tries to setup the PIRQ without MEMORY bit set. Which means with later versions of Xen (4.6) this patch is not neccessary. This is part of XSA-157 CC: stable@vger.kernel.org Reviewed-by: Jan Beulich <jbeulich@suse.com> Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Diffstat (limited to 'security/security.c')
0 files changed, 0 insertions, 0 deletions