[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] Validate EFI memory descriptors


  • To: Demi Marie Obenour <demi@xxxxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 8 Dec 2022 11:16:38 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=fzz9lgGD0AApeGNJj5117oc4rF1/6frUAJwbcmRxewE=; b=DmLXu45TtX2bghOewzbfHKiCR/lSzE4abbbuXi1tz57sA0L8dB9W4CqZQCuUCf5YGe5VD5W9yYq49NAbAfZ1ZvZTPWOQnsyo4DrAHmXtLVQMEvzuZdSAf2nV4HxwQoAtxPyjCKTPB06iU7zrLA5afMhkL16zAlfJ7VoUCHKLaHCD6UqlDp5+LNXzp+0f9n1umfuaCxdnV1oXCyrgkHR4HZ+yi1j7F6OntEg119dQxJC4ev9erIIz6Lpn4o0ADy6aSXiIoqxGzs6X0cGvAPWrBJTJwToRl7WbFJ3RyWYeiKF0/+xgKNkKkB7LEGZ4QBIJ32ZqwcOSKb6qrc8r84NBhQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=igBJC4BqSYUQ1uF+cXqyDkCcx1QhSD6m8f7ye7NQXyFY53Q2yOUOWGT0HOnZ7R4hc0D8iqmKvw0auusjZysORKZBo93jIqsYYxFa0PnrMTyxsyJkcDgLR9j8cpeWUbOEWNuGa6ppDHjcTW41ANKJx5rgRyGtQz7/96QYeaIT26mhk3p1TvleuboTuHXWjmALd17gcjpOKIBj9ckON8Tu+3EMeGbbuTk40lyiQyPwdvRfh77AD8xcwk7B/b9zethOJQt2VhFOQ1JetRZfCLJnYUa5UfGWNW5Vbi/JwOOnUcXacEamaxtrNJ51s9ladI+VgLjDTFe1WPyvIdCgfFkiaQ==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>, Ard Biesheuvel <ardb@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 08 Dec 2022 10:16:47 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 08.12.2022 10:36, Demi Marie Obenour wrote:
> On Thu, Dec 08, 2022 at 09:02:57AM +0100, Jan Beulich wrote:
>> Tainting the hypervisor in the event of finding an issue is certainly
>> an option.
> 
> I probably will not add such a mechanism, but if one exists I would be
> happy to use it.

See common/kernel.c:add_taint(). What you would need to introduce is a
new TAINT_* constant (and its associated handling), unless we wanted to
reuse (abuse) an existing one (yet none looks to even come just close).

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.