]> xenbits.xensource.com Git - qemu-xen-4.1-testing.git/commit
passthrough: fix security issue with stubdoms
authorIan Jackson <ian.jackson@eu.citrix.com>
Wed, 21 Oct 2009 15:42:15 +0000 (16:42 +0100)
committerIan Jackson <Ian.Jackson@eu.citrix.com>
Wed, 21 Oct 2009 15:42:15 +0000 (16:42 +0100)
commitb4bb8b3f09d1c873f522f6aebe1f125a6d1854d0
tree5aff209258e4742a497cdde8029e822071e71f26
parenta3285ff385d2568f0226f15fee2b9808ec3b6deb
passthrough: fix security issue with stubdoms

this patch series fixes the outstanding security problem with stubdoms
and pci passthrough.
The idea is to allow mmio, irq and ioport remapping not only if the
current domain IS_PRIV_FOR but also if the current domain has
permissions over those mmio areas, irqs and ioports.
This way a stubdom can only remap resources that currently "owns".
This patch series also moves the de\assign_device hypercalls from the
list of hypercalls made by qemu\stubdom to xend.

The two patches must be applied at the same time otherwise pci
passthrough won't work for HVM guests.

[PATCH 2 of 2] qemu: do not call xc_assign_device

This patch removes the call to xc_assign_device from qemu.

Signed-off-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
hw/pass-through.c