[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Requesting for freeze exception for VT-d posted-interrupts




> -----Original Message-----
> From: Wei Liu [mailto:wei.liu2@xxxxxxxxxx]
> Sent: Wednesday, July 15, 2015 11:47 PM
> To: Jan Beulich
> Cc: Wei Liu; andrew.cooper3@xxxxxxxxxx; George Dunlap; Wu, Feng; Tian, Kevin;
> Zhang, Yang Z; Wang, Yong Y; xen-devel@xxxxxxxxxxxxx
> Subject: Re: Requesting for freeze exception for VT-d posted-interrupts
> 
> On Tue, Jul 14, 2015 at 05:01:33PM +0100, Jan Beulich wrote:
> > >>> On 14.07.15 at 17:02, <wei.liu2@xxxxxxxxxx> wrote:
> > > On Tue, Jul 14, 2015 at 03:46:46PM +0100, Jan Beulich wrote:
> > >> >>> On 14.07.15 at 16:17, <wei.liu2@xxxxxxxxxx> wrote:
> > >> > On Tue, Jul 14, 2015 at 11:09:15AM +0100, Jan Beulich wrote:
> > >> >> >>> On 14.07.15 at 11:21, <wei.liu2@xxxxxxxxxx> wrote:
> > >> >> > On Tue, Jul 14, 2015 at 05:51:02AM +0000, Wu, Feng wrote:
> > >> >> >> Is it possible to get to 4.6 if making this feature default off?
> > >> >> >
> > >> >> > Note that I'm not the only one who makes the decision and I can't
> speak
> > >> >> > for maintainers. The first thing you ought to do is to convince
> > >> >> > maintainers, not me.
> > >> >> >
> > >> >> > If you ask for my opinion -- I don't see a point in releasing 
> > >> >> > feature
> > >> >> > with security flaw in design, even if it is off by default.
> > >> >>
> > >> >> It was actually me who suggested that by flagging this experimental
> > >> >> and defaulting it to off, chances would increase for this to be 
> > >> >> allowed
> > >> >> in without said issue fixed.
> > >> >
> > >> > Are you satisfied with that?  Currently I only know from this email
> > >> > there is concern with regard to security but I don't know what it is 
> > >> > and
> > >> > how big an impact it can possibly have.
> > >> >
> > >> > I could maybe go dig up that series and try to understand what is the
> > >> > security implication, but it would take a long time and I'm not sure I
> > >> > have the right technical background to make the call.
> > >>
> > >> The thing is that the way vCPU-s are being put on lists attached to
> > >> pCPU-s, in a pathological case (which can be "helped" by a malicious
> > >> tool stack) all vCPU-s could pile up on one such list. List traversal (in
> > >> an interrupt handler) could then take (almost) arbitrarily long.
> > >
> > > You mentioned "malicious toolstack", does that mean this feature, if on,
> > > doesn't expose new attack vector to malicious guest?
> >
> > I think getting a guest to affect this would be more involved, but
> > I can't entirely exclude it.
> >
> > > And what do you mean by "malicious toolstack"? I don't see patches
> > > related to toolstack.
> >
> > This is because the tool stack can control placement of vCPU-s on
> > pCPU-s, not because new tool stack code is being added.
> >
> 
> I fished out the thread and tried my best to digest that.
> 
> It does seem that it requires tool stack help to pin too many vcpus to a
> pcpu to trigger a problem.  Another possibility I can think of is that
> the scheduler piling too many vcpus on one pcpu.
> 
> All in all, neither of the above two approaches can be used directly by
> a malicious guest, so the concern with regard to security is not as big
> as I thought.
> 
> Jan, I agree with you this feature should be marked as experimental if
> we are to merge it for 4.6.
> 
> Wu, note the decision has not been made because the patch series is not
> in shape yet, in theory you do have time to address all issues by
> Friday if you want to try. I will revisit this on Friday.

Wei, Thanks a lot for your analysis, I will try my best to address the issues
before Friday.

Thanks,
Feng

> 
> Wei.
> 
> > Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.