[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v18 06/11] x86/hvm/ioreq: add a new mappable resource type...
>>> On 22.03.18 at 12:55, <paul.durrant@xxxxxxxxxx> wrote: > ... XENMEM_resource_ioreq_server > > This patch adds support for a new resource type that can be mapped using > the XENMEM_acquire_resource memory op. > > If an emulator makes use of this resource type then, instead of mapping > gfns, the IOREQ server will allocate pages from the emulating domain's > heap. These pages will never be present in the P2M of the guest at any > point (and are not even shared with the guest) and so are not vulnerable to > any direct attack by the guest. "allocate pages from the emulating domain's heap" is a sub-optimal (at least slightly misleading) description, due to your use of MEMF_no_refcount together with the fact that domain's don't really have their own heaps. > +static int hvm_alloc_ioreq_mfn(struct hvm_ioreq_server *s, bool buf) > +{ > + struct hvm_ioreq_page *iorp = buf ? &s->bufioreq : &s->ioreq; > + > + if ( iorp->page ) > + { > + /* > + * If a guest frame has already been mapped (which may happen > + * on demand if hvm_get_ioreq_server_info() is called), then > + * allocating a page is not permitted. > + */ > + if ( !gfn_eq(iorp->gfn, INVALID_GFN) ) > + return -EPERM; > + > + return 0; > + } > + > + /* > + * Allocated IOREQ server pages are assigned to the emulating > + * domain, not the target domain. This is safe because the emulating > + * domain cannot be destroyed until the ioreq server is destroyed. > + * Also we must use MEMF_no_refcount otherwise page allocation > + * could fail if the emulating domain has already reached its > + * maximum allocation. > + */ > + iorp->page = alloc_domheap_page(s->emulator, MEMF_no_refcount); > + > + if ( !iorp->page ) > + return -ENOMEM; > + > + if ( !get_page_type(iorp->page, PGT_writable_page) ) > + goto fail; > + > + iorp->va = __map_domain_page_global(iorp->page); > + if ( !iorp->va ) > + goto fail; > + > + clear_page(iorp->va); > + return 0; > + > + fail: > + put_page_and_type(iorp->page); This is wrong in case it's the get_page_type() which failed. > +int arch_acquire_resource(struct domain *d, unsigned int type, > + unsigned int id, unsigned long frame, > + unsigned int nr_frames, xen_pfn_t mfn_list[], > + unsigned int *flags) > +{ > + int rc; > + > + switch ( type ) > + { > + case XENMEM_resource_ioreq_server: > + { > + ioservid_t ioservid = id; > + unsigned int i; > + > + rc = -EINVAL; > + if ( id != (unsigned int)ioservid ) > + break; > + > + rc = 0; > + for ( i = 0; i < nr_frames; i++ ) > + { > + mfn_t mfn; > + > + rc = hvm_get_ioreq_server_frame(d, id, frame + i, &mfn); > + if ( rc ) > + break; > + > + mfn_list[i] = mfn_x(mfn); > + } > + > + /* > + * The frames will be assigned to the tools domain that created > + * the ioreq server. > + */ s/will be/have been/ and perhaps drop "tools"? > --- a/xen/include/asm-arm/mm.h > +++ b/xen/include/asm-arm/mm.h > @@ -374,6 +374,14 @@ static inline void put_page_and_type(struct page_info > *page) > > void clear_and_clean_page(struct page_info *page); > > +static inline int arch_acquire_resource( > + struct domain *d, unsigned int type, unsigned int id, > + unsigned long frame,unsigned int nr_frames, xen_pfn_t mfn_list[], Missing blank. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |