|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V2] x86/altp2m: Added xc_altp2m_set_mem_access_multi()
On 03/10/2017 09:31 AM, Jan Beulich wrote:
>>>> On 09.03.17 at 18:15, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>> On 03/09/2017 06:56 PM, Jan Beulich wrote:
>>>>>> On 09.03.17 at 10:38, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>>>> @@ -4535,6 +4536,30 @@ static int do_altp2m_op(
>>>> a.u.set_mem_access.view);
>>>> break;
>>>>
>>>> + case HVMOP_altp2m_set_mem_access_multi:
>>>> + if ( a.u.set_mem_access_multi.pad ||
>>>> + a.u.set_mem_access_multi.opaque >=
>>>> a.u.set_mem_access_multi.nr
>> )
>>>> + {
>>>> + rc = -EINVAL;
>>>> + break;
>>>> + }
>>>> + rc = p2m_set_mem_access_multi(d,
>>>> a.u.set_mem_access_multi.pfn_list,
>>>> +
>>>> a.u.set_mem_access_multi.access_list,
>>>> + a.u.set_mem_access_multi.nr,
>>>> + a.u.set_mem_access_multi.opaque,
>>>> + MEMOP_CMD_MASK,
>>>> + a.u.set_mem_access_multi.view);
>>>> + if ( rc > 0 )
>>>> + {
>>>> + a.u.set_mem_access_multi.opaque = rc;
>>>> + if ( __copy_to_guest(arg, &a, 1) )
>>>> + rc = -EFAULT;
>>>> + else
>>>> + rc = hypercall_create_continuation(__HYPERVISOR_hvm_op,
>> "lh",
>>>> + HVMOP_altp2m, arg);
>>>> + }
>>>> + break;
>>>
>>> Okay, so this is a hvmop, in which case I'm fine with the continuation
>>> model used.
>>>
>>> However - is this interface supposed to be usable by a guest on itself?
>>> Arguably the same question would apply to some of the other sub-op
>>> too, but anyway.
>>
>> Not for any of our use cases. The whole point is for dom0 (or another
>> suitably privileged domain) to monitor another guest that consequently
>> can't, by design, evade detection of bad behaviour by acting at a higher
>> privilege level than the protection software. It wouldn't make sense for
>> a domain to be doing this on itself.
>
> In which case this should be a domctl.
Fair enough, if nobody objects I'll then just modify
XENMEM_access_op_set_access_multi to take a view_id as well an just
piggyback on that. It already does the right thing underneath.
Thanks,
Razvan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |