From: Demi Marie Obenour <demi@invisiblethingslab.com>
To: Jan Beulich <jbeulich@suse.com>
Cc: xen-devel@lists.xenproject.org, linux-kernel@vger.kernel.org,
linux-efi@vger.kernel.org, "Juergen Gross" <jgross@suse.com>,
"Stefano Stabellini" <sstabellini@kernel.org>,
"Oleksandr Tyshchenko" <oleksandr_tyshchenko@epam.com>,
"Ard Biesheuvel" <ardb@kernel.org>,
"Kees Cook" <keescook@chromium.org>,
"Anton Vorontsov" <anton@enomsg.org>,
"Colin Cross" <ccross@android.com>,
"Tony Luck" <tony.luck@intel.com>,
"Marek Marczykowski-Górecki" <marmarek@invisiblethingslab.com>
Subject: Re: [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered
Date: Fri, 30 Sep 2022 12:38:44 -0400 [thread overview]
Message-ID: <Yzcbs6TYsFQU/I4f@itl-email> (raw)
In-Reply-To: <282a225d-8782-0321-6f0e-19dd4510dc42@suse.com>
[-- Attachment #1: Type: text/plain, Size: 1792 bytes --]
On Fri, Sep 30, 2022 at 08:44:21AM +0200, Jan Beulich wrote:
> On 30.09.2022 01:02, Demi Marie Obenour wrote:
> > Memory of type EFI_CONVENTIONAL_MEMORY, EFI_LOADER_CODE, EFI_LOADER_DATA,
> > EFI_BOOT_SERVICES_CODE, and EFI_BOOT_SERVICES_DATA may be clobbered by
> > Xen before Linux gets to start using it. Therefore, Linux under Xen
> > must not use EFI tables from such memory. Most of the remaining EFI
> > memory types are not suitable for EFI tables, leaving only
> > EFI_ACPI_RECLAIM_MEMORY, EFI_RUNTIME_SERVICES_DATA, and
> > EFI_RUNTIME_SERVICES_CODE. When running under Xen, Linux should only
> > use tables that are located in one of these types of memory.
> >
> > This patch ensures this, and also adds a function
> > (xen_config_table_memory_region_max()) that will be used later to
> > replace the usage of the EFI memory map in esrt.c when running under
> > Xen. This function can also be used in mokvar-table.c and efi-bgrt.c,
> > but I have not implemented this.
> >
> > Signed-off-by: Demi Marie Obenour <demi@invisiblethingslab.com>
>
> In Xen we don't clobber EfiBootServices{Code,Data} when xen.efi was passed
> "-mapbs". Should we perhaps extend the interface such that Dom0 can then
> also use tables located in such regions, perhaps by faking
> EFI_MEMORY_RUNTIME in the attributes returned by XEN_FW_EFI_MEM_INFO?
I can add a check for EFI_MEMORY_RUNTIME, but only if I can require a Xen
version with https://lore.kernel.org/xen-devel/cc0fbcb4-5ea3-178c-e691-9acb7cc9a3a7@suse.com/t/#u.
This is easy in Qubes OS via RPM dependencies, but I am not sure if it
is suitable for upstream without a mechanism for dom0 to verify that the
patch has been included.
--
Sincerely,
Demi Marie Obenour (she/her/hers)
Invisible Things Lab
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2022-09-30 16:39 UTC|newest]
Thread overview: 34+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-09-29 23:02 [PATCH v4 0/2] EFI improvements for Xen dom0 Demi Marie Obenour
2022-09-29 23:02 ` [PATCH v4 1/2] Avoid using EFI tables Xen may have clobbered Demi Marie Obenour
2022-09-30 6:44 ` Jan Beulich
2022-09-30 16:30 ` Ard Biesheuvel
2022-09-30 17:11 ` Demi Marie Obenour
2022-09-30 18:27 ` Ard Biesheuvel
2022-09-30 18:50 ` Demi Marie Obenour
2022-10-01 0:30 ` Demi Marie Obenour
2022-10-04 8:22 ` Jan Beulich
2022-10-04 15:46 ` Demi Marie Obenour
2022-10-05 6:15 ` Jan Beulich
2022-10-05 18:11 ` Demi Marie Obenour
2022-10-05 21:28 ` Ard Biesheuvel
2022-10-06 1:40 ` Demi Marie Obenour
2022-10-06 7:31 ` Ard Biesheuvel
2022-10-06 14:43 ` Demi Marie Obenour
2022-10-06 16:19 ` Ard Biesheuvel
2022-10-06 17:22 ` Demi Marie Obenour
2022-10-06 17:56 ` Ard Biesheuvel
2022-10-06 9:22 ` Jan Beulich
2022-09-30 16:38 ` Demi Marie Obenour [this message]
2022-09-30 16:25 ` Ard Biesheuvel
2022-09-30 18:15 ` Demi Marie Obenour
2022-09-30 18:42 ` Ard Biesheuvel
2022-09-30 19:00 ` Demi Marie Obenour
2022-09-29 23:02 ` [PATCH v4 2/2] Support ESRT in Xen dom0 Demi Marie Obenour
2022-09-30 16:36 ` Ard Biesheuvel
2022-09-30 18:21 ` Demi Marie Obenour
2022-09-30 19:11 ` Ard Biesheuvel
2022-09-30 20:20 ` Demi Marie Obenour
2022-09-30 20:59 ` Ard Biesheuvel
2022-09-30 21:24 ` Ard Biesheuvel
2022-09-30 22:22 ` Demi Marie Obenour
2022-09-30 22:25 ` Demi Marie Obenour
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Yzcbs6TYsFQU/I4f@itl-email \
--to=demi@invisiblethingslab.com \
--cc=anton@enomsg.org \
--cc=ardb@kernel.org \
--cc=ccross@android.com \
--cc=jbeulich@suse.com \
--cc=jgross@suse.com \
--cc=keescook@chromium.org \
--cc=linux-efi@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=marmarek@invisiblethingslab.com \
--cc=oleksandr_tyshchenko@epam.com \
--cc=sstabellini@kernel.org \
--cc=tony.luck@intel.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox