>>> On 01.04.15 at 11:59, <m...@redhat.com> wrote:
> On Wed, Apr 01, 2015 at 10:41:12AM +0100, Andrew Cooper wrote:
>> On 01/04/15 10:20, Stefano Stabellini wrote:
>> > CC'ing the author of the patch and xen-devel.
>> > FYI I think that Jan is going to be on vacation for a couple of weeks.
>> >
>> > On Wed, 1 Apr 2015, Michael S. Tsirkin wrote:
>> >> On Tue, Mar 31, 2015 at 03:18:03PM +0100, Stefano Stabellini wrote:
>> >>> From: Jan Beulich <jbeul...@suse.com>
>> >>>
>> >>> Otherwise the guest can abuse that control to cause e.g. PCIe
>> >>> Unsupported Request responses (by disabling memory and/or I/O decoding
>> >>> and subsequently causing [CPU side] accesses to the respective address
>> >>> ranges), which (depending on system configuration) may be fatal to the
>> >>> host.
>> >>>
>> >>> This is CVE-2015-2756 / XSA-126.
>> >>>
>> >>> Signed-off-by: Jan Beulich <jbeul...@suse.com>
>> >>> Reviewed-by: Stefano Stabellini <stefano.stabell...@eu.citrix.com>
>> >>> Acked-by: Ian Campbell <ian.campb...@citrix.com>
>> >> The patch description seems somewhat incorrect to me.
>> >> UR should not be fatal to the system, and it's not platform
>> >> specific.
>> > I think that people have been able to repro this, but I'll let Jan
>> > comment on it.
>> 
>> Depending on how the BIOS sets up AER (if even available), a UR can very
>> easily be fatal to the system.
>> 
>> If firmware first mode is set, Xen (or indeed Linux) can't fix a
>> problematic setup.  Experimentally, doing so can cause infinite loops in
>> certain vendors SMM handlers.
> 
> I think it can, just disable UR reporting, this is up to OS.  This is
> what the PCI spec says - you have snipped the relevant part out from the
> mail you are replying to.

As already said by Andrew, the OS must not do such when the
system is in APEI firmware first mode.

Jan


Reply via email to