From: Julien Grall <julien.grall@arm.com>
To: Stefano Stabellini <sstabellini@kernel.org>
Cc: wei.liu2@citrix.com, Wei Chen <wei.chen@arm.com>,
xen-devel@lists.xen.org
Subject: Re: [for-4.7 2/2] xen/arm: p2m: Release the p2m lock before undoing the mappings
Date: Tue, 17 May 2016 13:48:39 +0100 [thread overview]
Message-ID: <573B1327.2080205@arm.com> (raw)
In-Reply-To: <alpine.DEB.2.10.1605171322000.2494@sstabellini-ThinkPad-X260>
Hi Stefano,
On 17/05/16 13:27, Stefano Stabellini wrote:
> On Tue, 17 May 2016, Julien Grall wrote:
>> On 17/05/16 12:24, Stefano Stabellini wrote:
>>> I think you are right. Especially with backports in mind, it would be
>>> better to introduce an __apply_p2m_changes function which assumes that
>>> the p2m lock has already been taken by the caller. Then you can base the
>>> implementation of apply_p2m_changes on it.
>>
>>> On Tue, 17 May 2016, Wei Chen wrote:
>>>> Hi Julien,
>>>>
>>>> I have some concern about this patch. Because we released the spinlock
>>>> before remove the mapped memory. If somebody acquires the spinlock
>>>> before we remove the mapped memory, this mapped memory region can be
>>>> accessed by guest.
>>>>
>>>> The apply_p2m_changes is no longer atomic. Is it a security risk?
>>
>> Accesses to the page table have never been atomic, as soon as an entry is
>> written in the page tables, the guest vCPUs or a prefetcher could read it.
>>
>> The spinlock is only here to protect the page tables against concurrent
>> modifications. Releasing the lock is not an issue as Xen does not promise any
>> ordering for the p2m changes.
>
> I understand that. However I am wondering whether it might be possible
> for the guest to run commands which cause concurrent p2m change requests
> on purpose, inserting something else between the first phase and the
> second phase of apply_p2m_changes, causing problems to the hypervisor.
Removing and inserting entries are 2 distinct steps.
> Or maybe not even on purpose, but causing problem to itself nonetheless.
Each vCPU can only trigger one command at the time. So concurrent p2m
changes would involve 2 vCPUs.
Even if vCPU A send the command before vCPU B, nothing prevents Xen to
serve B before A.
The only way a guest could harm itself would be to have the 2 requests
modifying the same regions in the page tables. However, per-above this
behavior is undefined no matter the implementation of apply_p2m_changes.
> Honestly it is true that it doesn't look like Xen could run into
> troubles. But still this is a change in behaviour compared to the
> current code (which I know doesn't actually work) and I wanted to flag
> it.
This code has always been buggy, and I suspect the goal was to call back
without the lock.
There is no reason to keep the lock more than necessary. Releasing the
lock allow other p2m changes to be executed rather than spinning while
the long execution (INSERTION + REMOVAL) is done.
Regards,
--
Julien Grall
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next prev parent reply other threads:[~2016-05-17 12:48 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-05-16 14:08 [for-4.7 0/2] xen/arm: Bug fixes in the P2M code Julien Grall
2016-05-16 14:08 ` [for-4.7 1/2] xen/arm: p2m: apply_p2m_changes: Do not undo more than necessary Julien Grall
2016-05-17 6:40 ` Wei Chen
2016-05-17 7:29 ` Julien Grall
2016-05-17 11:18 ` Stefano Stabellini
2016-05-16 14:08 ` [for-4.7 2/2] xen/arm: p2m: Release the p2m lock before undoing the mappings Julien Grall
2016-05-17 5:45 ` Wei Chen
2016-05-17 6:21 ` Wei Chen
2016-05-17 11:24 ` Stefano Stabellini
2016-05-17 11:35 ` Julien Grall
2016-05-17 12:27 ` Stefano Stabellini
2016-05-17 12:48 ` Julien Grall [this message]
2016-05-18 10:10 ` Stefano Stabellini
2016-05-18 10:31 ` Julien Grall
2016-05-18 10:45 ` Julien Grall
2016-05-18 10:39 ` [for-4.7 0/2] xen/arm: Bug fixes in the P2M code Stefano Stabellini
2016-05-18 10:46 ` Wei Liu
2016-05-18 10:58 ` Julien Grall
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=573B1327.2080205@arm.com \
--to=julien.grall@arm.com \
--cc=sstabellini@kernel.org \
--cc=wei.chen@arm.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).