|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC][v2][PATCH 00/14] Fix RMRR
>>> On 28.05.15 at 07:48, <tiejun.chen@xxxxxxxxx> wrote:
> On 2015/5/22 17:46, Jan Beulich wrote:
>>>>> On 22.05.15 at 11:35, <tiejun.chen@xxxxxxxxx> wrote:
>>> As you know all devices are owned by Dom0 firstly before we create any
>>> DomU, right? Do we allow Dom0 still own a group device while assign another
>>> device in the same group?
>>
>> Clearly not, or - just like anything else putting the security of a system
>> at risk - only at explicit host admin request.
>>
>
> You're right.
>
> After we discussed internally, we're intending to cover this simply
> since the case of shared RMRR is a rare case according to our previous
> experiences. Furthermore, Xen doesn't have a good existing API to
> directly assign this sort of group devices and even Xen doesn't identify
> these devices, so currently we always assign devices one by one, right?
> This means we have to put more efforts to concern a good implementation
> to address something like, identification, atomic, hotplug and so on.
> Obviously, this would involve hypervisor and tools at the same time so
> this has a little bit of difficulty to work along with 4.6.
>
> So could we do this separately?
>
> #1. Phase 1 to 4.6
>
> #1.1. Do a simple implementation
>
> We just prevent from that device assignment if we're assigning this sort
> of group devices like this,
Right.
> @@ -2291,6 +2291,16 @@ static int intel_iommu_assign_device(
> PCI_BUS(bdf) == bus &&
> PCI_DEVFN2(bdf) == devfn )
> {
> + if ( rmrr->scope.devices_cnt > 1 )
> + {
> + reassign_device_ownership(d, hardware_domain, devfn, pdev);
I think if this is really needed here, the check comes too late.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |