qemu-devel.nongnu.org archive mirror
 help / color / mirror / Atom feed
From: Alexey Kardashevskiy <aik@ozlabs.ru>
To: Gavin Shan <gwshan@linux.vnet.ibm.com>
Cc: qemu-ppc@nongnu.org, qemu-devel@nongnu.org,
	David Gibson <david@gibson.dropbear.id.au>
Subject: Re: [Qemu-devel] [PATCH RESEND v2 2/3] sPAPR: Support RTAS call ibm, {open, close}-errinjct
Date: Tue, 4 Aug 2015 17:23:30 +1000	[thread overview]
Message-ID: <55C06872.8060309@ozlabs.ru> (raw)
In-Reply-To: <20150804071644.GA16383@gwshan>

On 08/04/2015 05:16 PM, Gavin Shan wrote:
> On Tue, Aug 04, 2015 at 02:49:14PM +1000, Alexey Kardashevskiy wrote:
>> On 08/03/2015 01:32 PM, Gavin Shan wrote:
>>> On Mon, Aug 03, 2015 at 12:51:09PM +1000, David Gibson wrote:
>>>> On Mon, Aug 03, 2015 at 09:23:19AM +1000, Gavin Shan wrote:
>>>>> The patch supports RTAS calls "ibm,{open,close}-errinjct" to
>>>>> manupliate the token, which is passed to RTAS call "ibm,errinjct"
>>>>> to indicate the valid context for error injection. Each VM is
>>>>> permitted to have only one token at once and we simply have one
>>>>> random number for that.
>>>>>
>>>>> Signed-off-by: Gavin Shan <gwshan@linux.vnet.ibm.com>
>>>>> ---
>>>>>   hw/ppc/spapr_rtas.c    | 71 ++++++++++++++++++++++++++++++++++++++++++++++++++
>>>>>   include/hw/ppc/spapr.h |  9 ++++++-
>>>>>   2 files changed, 79 insertions(+), 1 deletion(-)
>>>>>
>>>>> diff --git a/hw/ppc/spapr_rtas.c b/hw/ppc/spapr_rtas.c
>>>>> index e99e25f..0a9c904 100644
>>>>> --- a/hw/ppc/spapr_rtas.c
>>>>> +++ b/hw/ppc/spapr_rtas.c
>>>>> @@ -604,6 +604,73 @@ out:
>>>>>       rtas_st(rets, 0, rc);
>>>>>   }
>>>>>
>>>>> +static void rtas_ibm_open_errinjct(PowerPCCPU *cpu,
>>>>> +                                   sPAPRMachineState *spapr,
>>>>> +                                   uint32_t token, uint32_t nargs,
>>>>> +                                   target_ulong args, uint32_t nret,
>>>>> +                                   target_ulong rets)
>>>>> +{
>>>>> +    int32_t ret;
>>>>> +
>>>>> +    /* Sanity check on number of arguments */
>>>>> +    if ((nargs != 0) || (nret != 2)) {
>>>>> +        ret = RTAS_OUT_PARAM_ERROR;
>>>>> +        goto out;
>>>>> +    }
>>>>> +
>>>>> +    /* Check if we already had token */
>>>>> +    if (spapr->errinjct_token) {
>>>>> +        ret = RTAS_OUT_TOKEN_OPENED;
>>>>> +        goto out;
>>>>> +    }
>>>>> +
>>>>> +    /* Grab random number as token */
>>>>> +    spapr->errinjct_token = random();
>>>>
>>>> I don't quite understand the function of this token.   Using random()
>>>> seems a very, very odd way of doing things.  Is it supposed to be a
>>>> security thing?
>>>>
>>>
>>> Yes, the token is allocated by "ibm,open-errinjct". The token will be
>>> passed to subsequent "ibm,errinjct" and "ibm,close-errinjct". From this
>>> perspecitve, the token owner is allowed to do error injection and it's
>>> for security. Apart from having random number as the token, is there
>>> better (fast) way to produce it?
>>>
>>>>> +    if (spapr->errinjct_token == 0) {
>>>>> +        ret = RTAS_OUT_BUSY;
>>>>
>>>> AFAICT, this gives a 1 in RAND_MAX chance of returning RTAS_OUT_BUSY
>>>> for no particular reason.
>>>>
>>>
>>> Yes, "0" represents invalid token (not opened). Maybe here we can retry
>>> for a bit more like below. 0 returned from 10 successive random() would
>>> be rare.
>>>
>>>      uint32_t retries;
>>>
>>>      while (!spapr->errinjct_token && retries++ < 10)
>>>          spapr->errinjct_token = random();
>>>      if (!spapr->errinjct_token) {
>>>          ret = RTAS_OUT_BUSY;
>>>          goto out;
>>>      }
>>
>>
>> No. QEMU is using rand() (not random()) and since it returns up to RAND_MAX
>> which is 0x7fffffff, you could do something simple like this:
>>
>> spapr->errinjct_token = (rand % 32767) + 1
>>
>
> Good idea. I'll have it in next revision.
>
> Thanks,
> Gavin
>
>>
>> But for debugging purposes it makes more sense just to initialize it to 1 and
>> then increment it in every call of rtas_ibm_open_errinjct().


Why rand() and not this? You do not protect against a guest attack by 
limiting a number of the rtas calls so the token just needs to be unique 
and that's it, and later in gdb is is going to be easier to trace these 
tokens if need for this ever arises.



-- 
Alexey

  reply	other threads:[~2015-08-04  7:23 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-08-02 23:23 [Qemu-devel] [PATCH RESEND v2 0/3] sPAPR: Support EEH Error Injection Gavin Shan
2015-08-02 23:23 ` [Qemu-devel] [PATCH RESEND v2 1/3] linux-headers: Add eeh.h Gavin Shan
2015-08-02 23:23 ` [Qemu-devel] [PATCH RESEND v2 2/3] sPAPR: Support RTAS call ibm, {open, close}-errinjct Gavin Shan
2015-08-03  2:51   ` David Gibson
2015-08-03  3:32     ` Gavin Shan
2015-08-04  4:49       ` Alexey Kardashevskiy
2015-08-04  7:16         ` Gavin Shan
2015-08-04  7:23           ` Alexey Kardashevskiy [this message]
2015-08-04 10:55             ` Gavin Shan
2015-08-05  2:05               ` David Gibson
2015-08-02 23:23 ` [Qemu-devel] [PATCH RESEND v2 3/3] sPAPR: Support RTAS call ibm, errinjct Gavin Shan
2015-08-03  3:01   ` David Gibson
2015-08-03  4:08     ` Gavin Shan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55C06872.8060309@ozlabs.ru \
    --to=aik@ozlabs.ru \
    --cc=david@gibson.dropbear.id.au \
    --cc=gwshan@linux.vnet.ibm.com \
    --cc=qemu-devel@nongnu.org \
    --cc=qemu-ppc@nongnu.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).