|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 19/23] arch/x86: check remote MMIO remap permissions
>>> On 17.09.12 at 17:23, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> wrote:
> --- a/xen/arch/x86/mm.c
> +++ b/xen/arch/x86/mm.c
> @@ -754,6 +754,18 @@ get_page_from_l1e(
> return -EINVAL;
> }
>
> + if ( pg_owner != curr->domain &&
> + !iomem_access_permitted(curr->domain, mfn, mfn) )
On a second (or third?) look, I don't think this is right - the current
domain doesn't matter here at all. What does matter is who's page
tables the mapping is to be put in (i.e. l1e_owner), which of course
in certain cases ends up being the current domain.
Jan
> + {
> + if ( mfn != (PADDR_MASK >> PAGE_SHIFT) ) /* INVALID_MFN? */
> + {
> + MEM_LOG("Domain %u attempted to map I/O space %08lx in
> domain %u",
> + curr->domain->domain_id, mfn, pg_owner->domain_id);
> + return -EPERM;
> + }
> + return -EINVAL;
> + }
> +
> if ( !(l1f & _PAGE_RW) ||
> !rangeset_contains_singleton(mmio_ro_ranges, mfn) )
> return 0;
> --
> 1.7.11.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |