Re: [Xen-devel] [PATCH 1/2] xen-pciback: limit guest control of command register

2015-03-11 Thread David Vrabel
On 11/03/15 13:51, Jan Beulich wrote: > Otherwise the guest can abuse that control to cause e.g. PCIe > Unsupported Request responses (by disabling memory and/or I/O decoding > and subsequently causing [CPU side] accesses to the respective address > ranges), which (depending on system

[PATCH 1/2] xen-pciback: limit guest control of command register

2015-03-11 Thread Jan Beulich
Otherwise the guest can abuse that control to cause e.g. PCIe Unsupported Request responses (by disabling memory and/or I/O decoding and subsequently causing [CPU side] accesses to the respective address ranges), which (depending on system configuration) may be fatal to the host. Note that to

Re: [Xen-devel] [PATCH 1/2] xen-pciback: limit guest control of command register

2015-03-11 Thread David Vrabel
On 11/03/15 13:51, Jan Beulich wrote: Otherwise the guest can abuse that control to cause e.g. PCIe Unsupported Request responses (by disabling memory and/or I/O decoding and subsequently causing [CPU side] accesses to the respective address ranges), which (depending on system configuration)

[PATCH 1/2] xen-pciback: limit guest control of command register

2015-03-11 Thread Jan Beulich
Otherwise the guest can abuse that control to cause e.g. PCIe Unsupported Request responses (by disabling memory and/or I/O decoding and subsequently causing [CPU side] accesses to the respective address ranges), which (depending on system configuration) may be fatal to the host. Note that to