[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v14 07/11] x86/mm: add an extra command to HYPERVISOR_mmu_update...
>>> On 28.11.17 at 16:08, <paul.durrant@xxxxxxxxxx> wrote: > @@ -1905,7 +1906,8 @@ static int mod_l1_entry(l1_pgentry_t *pl1e, > l1_pgentry_t nl1e, > } > > /* Translate foreign guest address. */ > - if ( paging_mode_translate(pg_dom) ) > + if ( cmd != MMU_PT_UPDATE_NO_TRANSLATE && > + paging_mode_translate(pg_dom) ) > { > p2m_type_t p2mt; > p2m_query_t q = l1e_get_flags(nl1e) & _PAGE_RW ? Now that they're public - it was this change which led to the recognition of the issue XSA-248 describes (which in turn led to the other three). Without the fix for XSA-248 you'd have introduced a worse issue here, allowing writable mappings of page table pages rather than just r/o ones (leading to hypervisor crashes). Especially with the bypass of acquiring a writable page ref in get_page_from_l1e() for domains controlling shadow-external domains we need to be extremely careful with assigning page ownership. Before this series goes in I'd therefor like to ask you and others (especially people on the Cc list) to double check that the bypass introduced above doesn't allow for other (security) badness. I think I've sufficiently convinced myself that it doesn't, but this clearly wants double checking. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |