From: Paul Durrant <Paul.Durrant@citrix.com>
To: Xen-devel <xen-devel@lists.xen.org>
Cc: Stefano Stabellini <sstabellini@kernel.org>,
Wei Liu <wei.liu2@citrix.com>,
Andrew Cooper <Andrew.Cooper3@citrix.com>,
Julien Grall <julien.grall@arm.com>,
Jan Beulich <JBeulich@suse.com>,
Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH 2/5] x86/hvm: Switch hvm_allow_set_param() to use a whitelist
Date: Thu, 6 Sep 2018 09:08:27 +0000 [thread overview]
Message-ID: <4bf4acfc9c0a43cda81b7c6eb74bc96b@AMSPEX02CL03.citrite.net> (raw)
In-Reply-To: <1536171124-27053-3-git-send-email-andrew.cooper3@citrix.com>
> -----Original Message-----
> From: Andrew Cooper [mailto:andrew.cooper3@citrix.com]
> Sent: 05 September 2018 19:12
> To: Xen-devel <xen-devel@lists.xen.org>
> Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>; Jan Beulich
> <JBeulich@suse.com>; Wei Liu <wei.liu2@citrix.com>; Roger Pau Monne
> <roger.pau@citrix.com>; Paul Durrant <Paul.Durrant@citrix.com>; Stefano
> Stabellini <sstabellini@kernel.org>; Julien Grall <julien.grall@arm.com>
> Subject: [PATCH 2/5] x86/hvm: Switch hvm_allow_set_param() to use a
> whitelist
>
> There are holes in the HVM_PARAM space, some of which are from
> deprecated
> parameters, but toolstack and device models currently has (almost) blanket
s/has/have
> write access.
>
> Rearrange hvm_allow_get_param() to have a whitelist of toolstack-writeable
s/get/set
> parameters, with the default case failing with -EINVAL. This subsumes the
> HVM_NR_PARAMS check, as well as the MEMORY_EVENT_* deprecated
> block, and the
> BUFIOREQ_EVTCHN Xen-write-only value.
>
> No expected change for the defined, in-use params.
>
> Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
> ---
> CC: Jan Beulich <JBeulich@suse.com>
> CC: Wei Liu <wei.liu2@citrix.com>
> CC: Roger Pau Monné <roger.pau@citrix.com>
> CC: Paul Durrant <paul.durrant@citrix.com>
> CC: Stefano Stabellini <sstabellini@kernel.org>
> CC: Julien Grall <julien.grall@arm.com>
> ---
> xen/arch/x86/hvm/hvm.c | 53 +++++++++++++++++++++++++++++---------
> ------------
> 1 file changed, 31 insertions(+), 22 deletions(-)
>
> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> index 96a6323..d19ae35 100644
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4073,7 +4073,7 @@ static int hvm_allow_set_param(struct domain *d,
>
> switch ( a->index )
> {
> - /* The following parameters can be set by the guest. */
> + /* The following parameters can be set by the guest and toolstack. */
Personally I'm finding this indentation of comment incongruous. Such comments are logically outside of any particular case statement so I think they should have the same level of indentation as the case statements themselves.
> case HVM_PARAM_CALLBACK_IRQ:
> case HVM_PARAM_VM86_TSS:
> case HVM_PARAM_VM86_TSS_SIZED:
> @@ -4083,18 +4083,40 @@ static int hvm_allow_set_param(struct domain
> *d,
> case HVM_PARAM_CONSOLE_EVTCHN:
> case HVM_PARAM_X87_FIP_WIDTH:
> break;
> - /*
> - * The following parameters must not be set by the guest
> - * since the domain may need to be paused.
> - */
> +
> + /*
> + * The following parameters are intended for toolstack usage only.
> + * Some require the domain to be paused while others control
> + * permissions in Xen, and therefore may not set by the domain.
> + */
> + case HVM_PARAM_STORE_PFN:
> + case HVM_PARAM_PAE_ENABLED:
> + case HVM_PARAM_IOREQ_PFN:
> + case HVM_PARAM_BUFIOREQ_PFN:
> + case HVM_PARAM_VIRIDIAN:
> + case HVM_PARAM_TIMER_MODE:
> + case HVM_PARAM_HPET_ENABLED:
> case HVM_PARAM_IDENT_PT:
> case HVM_PARAM_DM_DOMAIN:
> case HVM_PARAM_ACPI_S_STATE:
> - /* The remaining parameters should not be set by the guest. */
> - default:
> + case HVM_PARAM_VPT_ALIGN:
> + case HVM_PARAM_CONSOLE_PFN:
> + case HVM_PARAM_NESTEDHVM:
> + case HVM_PARAM_PAGING_RING_PFN:
> + case HVM_PARAM_MONITOR_RING_PFN:
> + case HVM_PARAM_SHARING_RING_PFN:
> + case HVM_PARAM_TRIPLE_FAULT_REASON:
> + case HVM_PARAM_IOREQ_SERVER_PFN:
> + case HVM_PARAM_NR_IOREQ_SERVER_PAGES:
> + case HVM_PARAM_MCA_CAP:
> if ( d == current->domain )
> rc = -EPERM;
> break;
> +
> + /* Writeable only by Xen, hole, deprecated, or out-of-range. */
> + default:
> + rc = -EINVAL;
> + break;
> }
>
> if ( rc )
> @@ -4130,9 +4152,6 @@ static int hvmop_set_param(
> if ( copy_from_guest(&a, arg, 1) )
> return -EFAULT;
>
> - if ( a.index >= HVM_NR_PARAMS )
> - return -EINVAL;
> -
Again, I think an ASSERT here would be good.
> d = rcu_lock_domain_by_any_id(a.domid);
> if ( d == NULL )
> return -ESRCH;
> @@ -4209,15 +4228,7 @@ static int hvmop_set_param(
> case HVM_PARAM_ACPI_IOPORTS_LOCATION:
> rc = pmtimer_change_ioport(d, a.value);
> break;
> - case HVM_PARAM_MEMORY_EVENT_CR0:
> - case HVM_PARAM_MEMORY_EVENT_CR3:
> - case HVM_PARAM_MEMORY_EVENT_CR4:
> - case HVM_PARAM_MEMORY_EVENT_INT3:
> - case HVM_PARAM_MEMORY_EVENT_SINGLE_STEP:
> - case HVM_PARAM_MEMORY_EVENT_MSR:
> - /* Deprecated */
> - rc = -EOPNOTSUPP;
> - break;
Does anything rely on this EOPNOTSUPP vs the EINVAL that would be returned after this patch is applied?
Paul
> +
> case HVM_PARAM_NESTEDHVM:
> rc = xsm_hvm_param_nested(XSM_PRIV, d);
> if ( rc )
> @@ -4253,9 +4264,7 @@ static int hvmop_set_param(
> d->arch.hvm.params[HVM_PARAM_NESTEDHVM] )
> rc = -EINVAL;
> break;
> - case HVM_PARAM_BUFIOREQ_EVTCHN:
> - rc = -EINVAL;
> - break;
> +
> case HVM_PARAM_TRIPLE_FAULT_REASON:
> if ( a.value > SHUTDOWN_MAX )
> rc = -EINVAL;
> --
> 2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2018-09-06 9:08 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-09-05 18:11 [PATCH 0/5] xen: Fixes and improvements to HVM_PARAM handling Andrew Cooper
2018-09-05 18:12 ` [PATCH 1/5] x86/hvm: Switch hvm_allow_get_param() to use a whitelist Andrew Cooper
2018-09-06 8:56 ` Paul Durrant
2018-09-06 15:21 ` Andrew Cooper
2018-09-07 6:30 ` Jan Beulich
2018-09-07 8:55 ` Jan Beulich
2018-09-07 18:18 ` Andrew Cooper
2018-09-10 9:41 ` Jan Beulich
2018-09-07 15:42 ` Roger Pau Monné
2018-09-05 18:12 ` [PATCH 2/5] x86/hvm: Switch hvm_allow_set_param() " Andrew Cooper
2018-09-06 9:08 ` Paul Durrant [this message]
2018-09-06 15:27 ` Andrew Cooper
2018-09-07 16:01 ` Roger Pau Monné
2018-09-07 18:13 ` Andrew Cooper
2018-09-10 14:28 ` Roger Pau Monné
2018-09-05 18:12 ` [PATCH 3/5] x86/hvm: Make HVM_PARAM_{STORE, CONSOLE}_EVTCHN read-only to the guest Andrew Cooper
2018-09-06 9:16 ` Paul Durrant
2018-09-06 15:29 ` Andrew Cooper
2018-09-06 17:28 ` Julien Grall
2018-09-07 16:19 ` Paul Durrant
2018-09-07 16:03 ` Roger Pau Monné
2018-09-05 18:12 ` [PATCH 4/5] x86/hvm: Misc non-functional cleanup to the HVM_PARAM infrastructure Andrew Cooper
2018-09-06 9:26 ` Paul Durrant
2018-09-07 9:08 ` Jan Beulich
2018-09-07 16:23 ` Roger Pau Monné
2018-09-05 18:12 ` [PATCH 5/5] xen/ARM: Restrict access to most HVM_PARAM's Andrew Cooper
2018-09-06 9:29 ` Paul Durrant
2018-09-06 10:36 ` Julien Grall
2018-09-06 10:40 ` Andrew Cooper
2018-09-06 10:43 ` Paul Durrant
2018-09-06 10:40 ` Paul Durrant
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4bf4acfc9c0a43cda81b7c6eb74bc96b@AMSPEX02CL03.citrite.net \
--to=paul.durrant@citrix.com \
--cc=Andrew.Cooper3@citrix.com \
--cc=JBeulich@suse.com \
--cc=julien.grall@arm.com \
--cc=roger.pau@citrix.com \
--cc=sstabellini@kernel.org \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).