|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC PATCH 21/24] ARM: vITS: handle INVALL command
Hi Stefano, On 10/11/16 20:42, Stefano Stabellini wrote: On Thu, 10 Nov 2016, Julien Grall wrote:On 10/11/16 00:21, Stefano Stabellini wrote:On Fri, 4 Nov 2016, Andre Przywara wrote:On 24/10/16 16:32, Vijay Kilari wrote: I agree on that. Once we agree on that, the two options we have are: I believe we had a similar discussion when Vijay worked on the vITS (see [1]). I would have hoped that this new proposal took into account the constraint mentioned back then. 1) We let the guest write anything to the table, then we do a full validation of the table on INVALL. We also do a validation of the table entries used as parameters for any other commands. 2) We map the table read-only, then do a validation of every guest write. INVALL becomes a NOP and parameters validation for many commands could be removed or at least reduced. Conceptually the two options should both lead to exactly the same result. Therefore I think the decision should be made purely on performance: which one is faster? If it is true that INVALL is only typically called once I suspect that 1) is faster, but I would like to see some simple benchmarks, such as the time that it takes to configure the ITS from scratch with the two approaches. The problem is not which one is faster but which one will not take down the hypervisor. The guest is allowed to create a command queue as big as 1MB, a command use 32 bytes, so the command queue can fit up 32640 commands. Now imagine a malicious guest filling up the command queue with INVALL and then notify the via (via GITS_CWRITER). Based on patch #5, all those commands will be handled in one. So you have to multiple the time of one command by 32640 times. Given that the hypervisor is not preemptible, it likely means a DOS.A similar problem would happen if an vITS command is translate to an ITS command (see the implementation of INVALL). Multiple malicious guest could slow down the other guest by filling up the host command queue. Worst, a command from a normal guest could be discarded because the host ITS command queue is full (see its_send_command in gic-its.c). That's why in the approach we had on the previous series was "host ITS command should be limited when emulating guest ITS command". From my recall, in that series the host and guest LPIs was fully separated (enabling a guest LPIs was not enabling host LPIs). That said, a design doc explaining all the constraints and code flow would have been really helpful. It took me a while to digest and understand the interaction between each part of the code. The design document would have also been a good place to discuss about problems that span across multiple patches (like the command queue emulation). That said, even if 1) turns out to be faster and the approach of choice, the idea of making the tables read-only in stage-2 could still be useful to simplify parameters validation and protect Xen from concurrent changes of the table entries from another guest vcpu. If the tables as RW, we need to be very careful in Xen and use barriers to avoid re-reading any guest table entry twice, as the guest could be changing it in parallel to exploit the hypervisor. Yes, and this is true for all the tables (PROPBASER, BASER,...) that reside on guest memory. Most of them should not be touched by the guest. This is the same for the command queue (patch #12), accessing the command directly from the guest memory is not safe. A guest could modify the value behind our back. Regards, [1] https://xenbits.xen.org/people/ianc/vits/draftG.html -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |