Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751999AbdFZNWM (ORCPT ); Mon, 26 Jun 2017 09:22:12 -0400 Received: from out3-smtp.messagingengine.com ([66.111.4.27]:49225 "EHLO out3-smtp.messagingengine.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751427AbdFZNWE (ORCPT ); Mon, 26 Jun 2017 09:22:04 -0400 X-ME-Sender: X-Sasl-enc: +T2QbWl8HmIwGv+LrXvjbTV5ayseEKAPCz3Soy5zBr4B 1498483323 Date: Mon, 26 Jun 2017 15:21:57 +0200 From: "'Marek =?utf-8?Q?Marczykowski-G=C3=B3recki'?=" To: Paul Durrant Cc: Juergen =?utf-8?B?R3Jvw58=?= , Andrew Cooper , "x86@kernel.org" , "linux-kernel@vger.kernel.org" , "stable@vger.kernel.org" , "xen-devel@lists.xenproject.org" , Boris Ostrovsky Subject: Re: [Xen-devel] [PATCH] x86/xen: allow userspace access during hypercalls Message-ID: <20170626132157.GW1268@mail-itl> References: <1498222072-18217-1-git-send-email-marmarek@invisiblethingslab.com> <6f8113d8-10a2-b23f-16c1-8b97b2fba0bb@suse.com> <20170626124505.GV1268@mail-itl> <2a846dd6006c46819c563113b6255d85@AMSPEX02CL03.citrite.net> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="OClFPYwZVEsRLy/w" Content-Disposition: inline In-Reply-To: <2a846dd6006c46819c563113b6255d85@AMSPEX02CL03.citrite.net> User-Agent: Mutt/1.8.0 (2017-02-23) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2414 Lines: 64 --OClFPYwZVEsRLy/w Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Mon, Jun 26, 2017 at 01:09:58PM +0000, Paul Durrant wrote: > > -----Original Message----- > > From: Xen-devel [mailto:xen-devel-bounces@lists.xen.org] On Behalf Of > > Marek Marczykowski-G=C3=B3recki > > Sent: 26 June 2017 13:45 > > To: Juergen Gro=C3=9F > > Cc: Andrew Cooper ; x86@kernel.org; linux- > > kernel@vger.kernel.org; stable@vger.kernel.org; xen- > > devel@lists.xenproject.org; Boris Ostrovsky > > Subject: Re: [Xen-devel] [PATCH] x86/xen: allow userspace access during > > hypercalls > >=20 > > On Mon, Jun 26, 2017 at 02:05:48PM +0200, Juergen Gro=C3=9F wrote: > > > On 06/23/2017 02:47 PM, Marek Marczykowski-G=C3=B3recki wrote: > > > > Userspace application can do a hypercall through /dev/xen/privcmd, = and > > > > some for some hypercalls argument is a pointers to user-provided > > > > structure. When SMAP is supported and enabled, hypervisor can't acc= ess. > > > > So, lets allow it. > > > > > > What about HYPERVISOR_dm_op? > >=20 > > Indeed, arguments copied to kernel space there are only addresses of > > buffers. Will send v2 in a moment. > > But I can't test it right now, as for my understanding this require > > HVM/PVHv2 dom0 or stubdomain... > >=20 >=20 > No, you don't need anything particularly special to use dm_op. Just up-to= -date xen, privcmd, and QEMU. QEMU should end up using dm_op by default if = all three are in place. But the issue this patch fixes applies only to hypercalls issued from HVM. --=20 Best Regards, Marek Marczykowski-G=C3=B3recki Invisible Things Lab A: Because it messes up the order in which people normally read text. Q: Why is top-posting such a bad thing? --OClFPYwZVEsRLy/w Content-Type: application/pgp-signature; name="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQEcBAEBCAAGBQJZUQp2AAoJENuP0xzK19csKnIH/jAgzZ2LWaQafnDsDqJKaqHT w+3STX4NiKOzIo2kWvOV4y23/mBissYH009viTGRk9IVdCl8bHcJE0KATAs+10dw gZVLF+M/+lVdlsABhOu7ZGnu66eBngjThdVlVKhPGLqtr8zmfZjxGcVF1kQQ67Hi 4XZPAcatdH+S+TLat9pVM12O9PnFu6dgiACs0fQc/5mxVWzYLvB38IWKT5q98BfG HdnKrWHQeeP+TYMO57TtKAn9B6pt0SxxCTq5JuKflZRhzU+CiJ+eejgRU8AfVGzd 6hRwgJxsenFp3qmDyRq16E3hEmqIQCfdo97Pi8HYPr+Xc9kjRpXFZl9hIl43u9M= =aVxB -----END PGP SIGNATURE----- --OClFPYwZVEsRLy/w--