[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 3/3] domctl: tighten XEN_DOMCTL_*_permission
>>> On 30.04.14 at 19:17, <andrew.cooper3@xxxxxxxxxx> wrote: > On 30/04/14 15:24, Jan Beulich wrote: >> --- a/xen/arch/x86/domctl.c >> +++ b/xen/arch/x86/domctl.c >> @@ -72,13 +72,11 @@ long arch_do_domctl( >> unsigned int np = domctl->u.ioport_permission.nr_ports; >> int allow = domctl->u.ioport_permission.allow_access; >> >> - ret = -EINVAL; >> - if ( (fp + np) > 65536 ) >> - break; >> - >> - if ( np == 0 ) >> - ret = 0; >> - else if ( xsm_ioport_permission(XSM_HOOK, d, fp, fp + np - 1, >> allow) > ) >> + if ( (fp + np - 1) < fp || (fp + np) > 0x10000 ) >> + ret = -EINVAL; >> + else if ( !ioports_access_permitted(current->domain, >> + fp, fp + np - 1) || >> + xsm_ioport_permission(XSM_HOOK, d, fp, fp + np - 1, >> allow) ) > > I don't see what the ioport permissions of the current domain have to do > with whether a domain is permitted to change the permissions for another > domain. > > I would expect that any domain builder domains would have no ioport > permissions at all, which would cause this hypercall to unconditionally > fail with -EPERM even if the domain builder domain is permitted to > assign ioport permissions to the domain it is building. My perspective is quite different - a building/controlling domain shouldn't be able to assign any resources it doesn't itself have control over. Which matches up with XEN_DOMCTL_{memory,ioport}_mapping, which too check requester permissions before doing the permission assignment (albeit there seems to be a tendency to agreement that the combination of permission granting and mapping is undesirable). Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |