-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Then as Stated you are already vulnerable to much more than interrupt
remapping will fix. So dont worry about it.

On 11/14/2013 06:00 PM, Giancarlo Razzolini wrote:
> Em 14-11-2013 14:18, InterNetX - Robert Garrett escreveu:
>> The issue you outlined below is not an openbsd issue, this is a
>> kvm issue. and depends greatly on the version of linux/whatever
>> you are using. The interrupt remapping you are talking about is
>> either a bios issue (likely) or an issue with the hypervisor.
>> 
>> it sounds like to me you are using or attempting to use SRIOV.
>> 
>> all of the issues that you mentioned are still relevent even
>> with "safe interrupts", as well as several you did not mention.
> Robert,
> 
> I do believe it is a specific issue with OpenBSD, because using
> the same hypervisor I can do pci passthrough, using the same
> versions, hardware, etc, to other operating systems using interrupt
> remapping.
> 
> I do have indeed SRIOV enabled on my bare metal bios. The thing is 
> that kvm specifically warns me that the guest do not support
> interrupt remapping, when using openbsd only. As I told before, it
> is not a problem for me right now, since I enable the unsafe
> interrupt assignment and the OS works normally.
> 
> Also, David, thanks for pointing out the patch, because since I 
> applied it, I did not experienced anymore lockups (so far). I am
> betting it was indeed the problem.
Comment: Using GnuPG with Thunderbird - http://www.enigmail.net/

iQEcBAEBAgAGBQJShdk4AAoJEMrvovfl62c8DVEIALQmLbVLlnEsayXgpvCNiO2g
gWF0+L4haMA7Rhf7FvRqOpXxCcZVhxk5ocEvSHLnyG1iYfh3tlnq1ts8rk9dfSHT
DP1QA0ReXvVJKW2r8UcLVfI62H6gA93TiFZWLzFioO6NZExKlfe3DCWDg3scBqg3
dZFE7fcQW5iUjOdKJzw79DBTN1FlQUxeZ5EAGXN19XZAezbHP08KmmyAkil7jvqf
DRFVRT7xnh0Vqa5H6Iz4KrQcasIPiLnt6ggxRzCxXL2EKu8K5Htwc9/LD4Jynz6y
YVPKEPrL0lJ03ocb+U47vSynTfFWjDbOdKeIikqhUFDccfwTWUtefSVGmTzzdgQ=
=tyuk
-----END PGP SIGNATURE-----

Reply via email to