|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 3/3] domctl: tighten XEN_DOMCTL_*_permission
On Fri, 2014-05-02 at 08:49 +0100, Jan Beulich wrote:
> >>> On 30.04.14 at 19:17, <andrew.cooper3@xxxxxxxxxx> wrote:
> > On 30/04/14 15:24, Jan Beulich wrote:
> >> --- a/xen/arch/x86/domctl.c
> >> +++ b/xen/arch/x86/domctl.c
> >> @@ -72,13 +72,11 @@ long arch_do_domctl(
> >> unsigned int np = domctl->u.ioport_permission.nr_ports;
> >> int allow = domctl->u.ioport_permission.allow_access;
> >>
> >> - ret = -EINVAL;
> >> - if ( (fp + np) > 65536 )
> >> - break;
> >> -
> >> - if ( np == 0 )
> >> - ret = 0;
> >> - else if ( xsm_ioport_permission(XSM_HOOK, d, fp, fp + np - 1,
> >> allow)
> > )
> >> + if ( (fp + np - 1) < fp || (fp + np) > 0x10000 )
> >> + ret = -EINVAL;
> >> + else if ( !ioports_access_permitted(current->domain,
> >> + fp, fp + np - 1) ||
> >> + xsm_ioport_permission(XSM_HOOK, d, fp, fp + np - 1,
> >> allow) )
> >
> > I don't see what the ioport permissions of the current domain have to do
> > with whether a domain is permitted to change the permissions for another
> > domain.
> >
> > I would expect that any domain builder domains would have no ioport
> > permissions at all, which would cause this hypercall to unconditionally
> > fail with -EPERM even if the domain builder domain is permitted to
> > assign ioport permissions to the domain it is building.
>
> My perspective is quite different - a building/controlling domain shouldn't
> be able to assign any resources it doesn't itself have control over. Which
> matches up with XEN_DOMCTL_{memory,ioport}_mapping, which too
> check requester permissions before doing the permission assignment
> (albeit there seems to be a tendency to agreement that the combination
> of permission granting and mapping is undesirable).
AIUI that's pretty much how Daniel explained it to me as well.
Ian.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |