|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] x86/memshr: properly check grant references
They need to be range checked against the current table limit in any
event.
Reported-by: Huawei PSIRT <psirt@xxxxxxxxxx>
Move the code to where it belongs, eliminating a number of duplicate
definitions. Add locking. Produce proper error codes, and consume them
instead of making one up. Check grant type. Convert parameter types at
once.
Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
---
Note that likely there's more work needed subsequently: The grant isn't
being marked in use for the duration of the use of the GFN. But I'll
leave that to someone actually knowing how to properly to test this.
--- a/xen/arch/x86/mm/mem_sharing.c
+++ b/xen/arch/x86/mm/mem_sharing.c
@@ -753,75 +753,25 @@ int mem_sharing_debug_gfn(struct domain
return num_refs;
}
-#define SHGNT_PER_PAGE_V1 (PAGE_SIZE / sizeof(grant_entry_v1_t))
-#define shared_entry_v1(t, e) \
- ((t)->shared_v1[(e)/SHGNT_PER_PAGE_V1][(e)%SHGNT_PER_PAGE_V1])
-#define SHGNT_PER_PAGE_V2 (PAGE_SIZE / sizeof(grant_entry_v2_t))
-#define shared_entry_v2(t, e) \
- ((t)->shared_v2[(e)/SHGNT_PER_PAGE_V2][(e)%SHGNT_PER_PAGE_V2])
-#define STGNT_PER_PAGE (PAGE_SIZE / sizeof(grant_status_t))
-#define status_entry(t, e) \
- ((t)->status[(e)/STGNT_PER_PAGE][(e)%STGNT_PER_PAGE])
-
-static grant_entry_header_t *
-shared_entry_header(struct grant_table *t, grant_ref_t ref)
-{
- ASSERT (t->gt_version != 0);
- if ( t->gt_version == 1 )
- return (grant_entry_header_t*)&shared_entry_v1(t, ref);
- else
- return &shared_entry_v2(t, ref).hdr;
-}
-
-static int mem_sharing_gref_to_gfn(struct domain *d,
- grant_ref_t ref,
- unsigned long *gfn)
-{
- if ( d->grant_table->gt_version < 1 )
- return -1;
-
- if ( d->grant_table->gt_version == 1 )
- {
- grant_entry_v1_t *sha1;
- sha1 = &shared_entry_v1(d->grant_table, ref);
- *gfn = sha1->frame;
- }
- else
- {
- grant_entry_v2_t *sha2;
- sha2 = &shared_entry_v2(d->grant_table, ref);
- *gfn = sha2->full_page.frame;
- }
-
- return 0;
-}
-
-
int mem_sharing_debug_gref(struct domain *d, grant_ref_t ref)
{
- grant_entry_header_t *shah;
+ int rc;
uint16_t status;
- unsigned long gfn;
+ gfn_t gfn;
- if ( d->grant_table->gt_version < 1 )
+ rc = mem_sharing_gref_to_gfn(d->grant_table, ref, &gfn, &status);
+ if ( rc )
{
- MEM_SHARING_DEBUG(
- "Asked to debug [dom=%d,gref=%d], but not yet inited.\n",
- d->domain_id, ref);
- return -EINVAL;
- }
- (void)mem_sharing_gref_to_gfn(d, ref, &gfn);
- shah = shared_entry_header(d->grant_table, ref);
- if ( d->grant_table->gt_version == 1 )
- status = shah->flags;
- else
- status = status_entry(d->grant_table, ref);
+ MEM_SHARING_DEBUG("Asked to debug [dom=%d,gref=%u]: error %d.\n",
+ d->domain_id, ref, rc);
+ return rc;
+ }
MEM_SHARING_DEBUG(
"==> Grant [dom=%d,ref=%d], status=%x. ",
d->domain_id, ref, status);
- return mem_sharing_debug_gfn(d, gfn);
+ return mem_sharing_debug_gfn(d, gfn_x(gfn));
}
int mem_sharing_nominate_page(struct domain *d,
@@ -1422,23 +1372,24 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_P
case XENMEM_sharing_op_nominate_gref:
{
grant_ref_t gref = mso.u.nominate.u.grant_ref;
- unsigned long gfn;
+ gfn_t gfn;
shr_handle_t handle;
rc = -EINVAL;
if ( !mem_sharing_enabled(d) )
goto out;
- if ( mem_sharing_gref_to_gfn(d, gref, &gfn) < 0 )
+ rc = mem_sharing_gref_to_gfn(d->grant_table, gref, &gfn, NULL);
+ if ( rc < 0 )
goto out;
- rc = mem_sharing_nominate_page(d, gfn, 3, &handle);
+ rc = mem_sharing_nominate_page(d, gfn_x(gfn), 3, &handle);
mso.u.nominate.handle = handle;
}
break;
case XENMEM_sharing_op_share:
{
- unsigned long sgfn, cgfn;
+ gfn_t sgfn, cgfn;
struct domain *cd;
shr_handle_t sh, ch;
@@ -1470,35 +1421,38 @@ int mem_sharing_memop(XEN_GUEST_HANDLE_P
grant_ref_t gref = (grant_ref_t)
(XENMEM_SHARING_OP_FIELD_GET_GREF(
mso.u.share.source_gfn));
- if ( mem_sharing_gref_to_gfn(d, gref, &sgfn) < 0 )
+ rc = mem_sharing_gref_to_gfn(d->grant_table, gref, &sgfn,
+ NULL);
+ if ( rc < 0 )
{
rcu_unlock_domain(cd);
- rc = -EINVAL;
goto out;
}
- } else {
- sgfn = mso.u.share.source_gfn;
}
+ else
+ sgfn = _gfn(mso.u.share.source_gfn);
if ( XENMEM_SHARING_OP_FIELD_IS_GREF(mso.u.share.client_gfn) )
{
grant_ref_t gref = (grant_ref_t)
(XENMEM_SHARING_OP_FIELD_GET_GREF(
mso.u.share.client_gfn));
- if ( mem_sharing_gref_to_gfn(cd, gref, &cgfn) < 0 )
+ rc = mem_sharing_gref_to_gfn(cd->grant_table, gref, &cgfn,
+ NULL);
+ if ( rc < 0 )
{
rcu_unlock_domain(cd);
- rc = -EINVAL;
goto out;
}
- } else {
- cgfn = mso.u.share.client_gfn;
}
+ else
+ cgfn = _gfn(mso.u.share.client_gfn);
sh = mso.u.share.source_handle;
ch = mso.u.share.client_handle;
- rc = mem_sharing_share_pages(d, sgfn, sh, cd, cgfn, ch);
+ rc = mem_sharing_share_pages(d, gfn_x(sgfn), sh,
+ cd, gfn_x(cgfn), ch);
rcu_unlock_domain(cd);
}
--- a/xen/common/grant_table.c
+++ b/xen/common/grant_table.c
@@ -3438,6 +3438,53 @@ void grant_table_init_vcpu(struct vcpu *
v->maptrack_tail = MAPTRACK_TAIL;
}
+#ifdef CONFIG_HAS_MEM_SHARING
+int mem_sharing_gref_to_gfn(struct grant_table *gt, grant_ref_t ref,
+ gfn_t *gfn, uint16_t *status)
+{
+ int rc = 0;
+ uint16_t flags = 0;
+
+ grant_read_lock(gt);
+
+ if ( gt->gt_version < 1 )
+ rc = -EINVAL;
+ else if ( ref >= nr_grant_entries(gt) )
+ rc = -ENOENT;
+ else if ( gt->gt_version == 1 )
+ {
+ const grant_entry_v1_t *sha1 = &shared_entry_v1(gt, ref);
+
+ flags = sha1->flags;
+ *gfn = _gfn(sha1->frame);
+ }
+ else
+ {
+ const grant_entry_v2_t *sha2 = &shared_entry_v2(gt, ref);
+
+ flags = sha2->hdr.flags;
+ if ( flags & GTF_sub_page )
+ *gfn = _gfn(sha2->sub_page.frame);
+ else
+ *gfn = _gfn(sha2->full_page.frame);
+ }
+
+ if ( (flags & GTF_type_mask) != GTF_permit_access )
+ rc = -ENXIO;
+ else if ( !rc && status )
+ {
+ if ( gt->gt_version == 1 )
+ *status = flags;
+ else
+ *status = status_entry(gt, ref);
+ }
+
+ grant_read_unlock(gt);
+
+ return rc;
+}
+#endif
+
static void gnttab_usage_print(struct domain *rd)
{
int first = 1;
--- a/xen/include/xen/grant_table.h
+++ b/xen/include/xen/grant_table.h
@@ -149,4 +149,7 @@ static inline unsigned int grant_to_stat
GRANT_STATUS_PER_PAGE;
}
+int mem_sharing_gref_to_gfn(struct grant_table *gt, grant_ref_t ref,
+ gfn_t *gfn, uint16_t *status);
+
#endif /* __XEN_GRANT_TABLE_H__ */
Attachment:
x86-memshr-gref-check.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |