[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v4 3/6] automation: prevent QEMU access to /dev/mem in PCI passthrough tests
On Fri, 24 Nov 2023, Marek Marczykowski-Górecki wrote: > /dev/mem access doesn't work in dom0 in lockdown and in stubdomain. > Simulate this environment with removing /dev/mem device node. Full test > for lockdown and stubdomain will come later, when all requirements will > be in place. > > Signed-off-by: Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx> Nice! I was going to suggest to do the same for other PCI Passthrough tests but this is the only one I believe? Acked-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> > --- > This can be applied only after QEMU change is committed. Otherwise the > test will fail. > --- > automation/scripts/qubes-x86-64.sh | 2 ++ > 1 file changed, 2 insertions(+) > > diff --git a/automation/scripts/qubes-x86-64.sh > b/automation/scripts/qubes-x86-64.sh > index d81ed7b931cf..7eabc1bd6ad4 100755 > --- a/automation/scripts/qubes-x86-64.sh > +++ b/automation/scripts/qubes-x86-64.sh > @@ -163,6 +163,8 @@ ifconfig eth0 up > ifconfig xenbr0 up > ifconfig xenbr0 192.168.0.1 > > +# ensure QEMU wont have access /dev/mem > +rm -f /dev/mem > # get domU console content into test log > tail -F /var/log/xen/console/guest-domU.log 2>/dev/null | sed -e > \"s/^/(domU) /\" & > xl create /etc/xen/domU.cfg > -- > git-series 0.9.1 >
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |