[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v7][PATCH 06/16] hvmloader/pci: skip reserved ranges
On Wed, Jul 15, 2015 at 12:34 PM, Chen, Tiejun <tiejun.chen@xxxxxxxxx> wrote: >>> Maybe I can move this chunk of codes downward those actual allocation >>> to check if RDM conflicts with the final allocation, and then just >>> disable those associated devices by writing PCI_COMMAND without BUG() >>> like this draft code, >> >> >> And what would keep the guest from re-enabling the device? >> > > We can't but IMO, > > #1. We're already posting that warning messages. > > #2. Actually this is like this sort of case like, as you known, even in the > native platform, some broken devices are also disabled by BIOS, right? So I > think this is OS's responsibility or risk to force enabling such a broken > device. > > #3. Its really rare possibility in real world. Well the real question is if the guest re-enabling the device would cause a security problem; I think the answer to that must be "no" (or at least, "it's not any worse than it was before"). The guest OS has the device disabled, and the RMRRs in the e820 map; if it re-enables the device over the "BIOS" (which hvmloader sort of acts as), then it should know what it's doing. Would it be possible, on a collision, to have one last "stab" at allocating the BAR somewhere else, without relocating memory (or relocating any other BARs)? At very least then an administrator could work around this kind of thing by setting the mmio_hole larger in the domain config. -George _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |