> On Jan 8, 2018, at 16:44, Anthony Liguori <anth...@codemonkey.ws> wrote:
>> On Mon, Jan 8, 2018 at 1:01 PM, Rich Persaud <pers...@gmail.com> wrote:
>> On a similarly pragmatic note: would a variation of Anthony's vixen patch 
>> series be suitable for pre-PVH Xen 4.6 - 4.9?  These versions are currently 
>> documented as security-supported (Oct 2018 - July 2020).
>> 
>> There are production environments where upgrading to Xen 4.10 in a timeframe 
>> of days or weeks is not practical.
>> 
>> Will PCI passthrough for PV guests be supported in any of the solutions that 
>> are being considered?  If not, it would be helpful to document this in the 
>> Spectre/Meltdown XSA and/or FAQ, including timeline or complexity estimates 
>> for the return of security support for Xen PV driver domains.  SUPPORT.md 
>> will also need an update.
> 
> It's not particularly hard to plumb through I think

An earlier discussion [1] suggested that it was feasible but not easy.  This 
feature is used for device driver (e.g. NIC or USB) domains in OpenXT and Qubes 
deployments.


> but if you are using PCI passthrough for PV, then you really shouldn't worry 
> about
> Spectre/Meltdown.  That PV guest can already read all of physical
> memory (since no IOMMU is used) and they can also write to all
> physical memory which is far worse than what you can do with
> Spectre/Meltdown.

We may be using different terminology?  OpenXT and Qubes typically require 
IOMMU for PV driver domains.  XSM can [2] enforce a policy which requires that 
an IOMMU be present before a driver domain is started.   

Rich

[1] https://lists.xenproject.org/archives/html/xen-devel/2018-01/msg00475.html

[2] https://www.mail-archive.com/xen-devel@lists.xen.org/msg118728.html

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to