[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Mapping active GDT



On 03/13/2017 01:30 PM, Thomas Garnier wrote:
> On Mon, Mar 13, 2017 at 6:09 AM, Boris Ostrovsky
> <boris.ostrovsky@xxxxxxxxxx> wrote:
>> On 03/11/2017 08:06 AM, Andrew Cooper wrote:
>>> On 11/03/2017 03:58, Boris Ostrovsky wrote:
>>>> On 03/10/2017 09:39 PM, Boris Ostrovsky wrote:
>>>>> I am looking into GDT remap series [0] which crashes PV guests and it
>>>>> seems that the problem lies in the fact that we cannot establish new
>>>>> mapping to an already existing GDT.
>>>>>
>>>>> The mapping is created by
>>>>>
>>>>> +static inline void setup_fixmap_gdt(int cpu)
>>>>> +{
>>>>> +       __set_fixmap(get_cpu_gdt_ro_index(cpu),
>>>>> +                    __pa(get_cpu_gdt_rw(cpu)), PAGE_KERNEL);
>>>>> +}
>>>>>
>>>>> with get_cpu_gdt_rw(cpu) being the current GDT pointer. This results in
>>>>>
>>>>> (XEN) mm.c:2570:d94v0 Bad type (saw 5400000000000001 != exp
>>>>> 7000000000000000) for mfn 1538fb (pfn 3e809)
>>>>> (XEN) mm.c:1022:d94v0 Could not get page type PGT_writable_page
>>>>> (XEN) mm.c:1074:d94v0 Error getting mfn 1538fb (pfn 3e809) from L1 entry
>>>>> 80000001538fb063 for l1e_owner=94, pg_owner=94
>>> The problem here is that you are trying to create a writeable mapping to
>>> the GDT frame.
>>>
>>> Allowing the guest writeable access would be a security hole, as it is
>>> trivial to escalate privilege under those circumstances.
>> Right, and I saw the same failure symptoms (hypervisor errors) even when
>> I replaced PAGE_KERNEL with PAGE_KERNEL_RO.
>>
>> And then I realized that I was on a branch with other unrelated changes,
>> so I switched the branch and then things started to work. Thus my mea
>> culpa below.
>>
> So we are good? :) (Meaning I still need to push the fix for 32 bit
> but that's it).
>


No, it will need a few small changes. I am actually finishing the test
run (in the next hour or so) and will reply on the Linux thread.

-boris

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.