[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86: protect MSI-X table and pending bit array from guest writes



>>> On 21.09.10 at 17:17, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> wrote:
> On Mon, Sep 20, 2010 at 02:23:51PM +0100, Jan Beulich wrote:
>> These structures are used by Xen, and hence guests must not be able
>> to fiddle with them.
>> 
>> qemu-dm currently plays with the MSI-X table, requiring Dom0 to
>> still have write access. This is broken (explicitly allowing the guest
>> write access to the mask bit) and should be fixed in qemu-dm, at which
>> time Dom0 won't need any special casing anymore.
>> 
>> The changes are made under the assumption that p2m_mmio_direct will
>> only ever be used for order 0 pages.
>> 
>> An open question is whether dealing with pv guests (including the
>> IOMMU-less case) is necessary, as handling mappings a domain may
>> already have in place at the time the first interrupt gets set up
>> would require scanning all of the guest's L1 page table pages.
> 
> When the PCI passthrough is utilized for PV guests we utilize
> the xc_domain_iomem_permission, xc_domain_ioport_permission, and
> xc_physdev_map_pirq before we even start the guest.
> With your patch, will the MFN regions that are specified by the
> iomem_permission still be visible to the PV domain?

Yes, just that the page(s) containing MSI-X table and PBA won't
be writeable anymore (if the guest tries to map them so, they'll
get mapped read-only). And yes, the MSI-X table should be
ignored by pv guests altogether, and the PBA (afaict) isn't being
used by Linux up to now.

Jan


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.