'npdflr' via qubes-users:
Hello all,
As stated in the link: 
https://wiki.xen.org/wiki/Xen_PCI_Passthrough#How_can_I_check_if_PCI_device_supports_FLR_.28Function_Level_Reset.29_.3F
"For checking if PCI device supports FLR (Function Level Reset) one has to Run "lspci -vv" (in 
dom0) and check if the device has "FLReset+" in the DevCap field"

Does one have to attach a pci device to dom0 to run the command "lspci -vv"? If 
yes, then would there be any security issues because PCI devices are to be attached to 
domU (guests). [except some of them which are strictly required in dom0 (e.g., the host 
bridge) as stated in: https://www.qubes-os.org/doc/pci-devices/ ]

Please correct me if I have understood this incorrectly.

Thank you.

PCI devices are connected enough to dom0 that "sudo lspci -vv" will work. If they are "hidden", they get claimed by the pciback Xen driver so dom0 drivers don't try to initialize them. They don't actually disappear from lspci. The hardware sits there inert, and only gets initialized once the VM they are assigned to loads drivers for them. When the VM shuts down, dom0 again won't recognize it. If you want to make sure dom0 won't load drivers for a newly added PCI device, add pciback.hide=(BDF) to your kernel options line, where BDF is the format 01:00.0. It will be difficult to predict this in advance, so use some type of live boot and lspci to see where the device gets assigned. FLR is nice because it resets the hardware device before and after it gets handed back to dom0. However, not having FLR is somewhat of a theoretical vulnerability because a malicious device can't do much to dom0 without a driver it can interact with. Am leaving hardware level attacks out of scope of this, as FLR capability wouldn't matter as much as IOMMU containment. Hope that helps more than it confuses. I welcome corrections to any of my misunderstandings as well.

--
You received this message because you are subscribed to the Google Groups 
"qubes-users" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to qubes-users+unsubscr...@googlegroups.com.
To post to this group, send email to qubes-users@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/qubes-users/f843bcc7-3bfa-69cc-9644-2909d5dfb7c3%40danwin1210.me.
For more options, visit https://groups.google.com/d/optout.

Reply via email to