Re: [oss-security] Xen Security Advisory 464 v2 (CVE-2024-45819) - libxl leaks data to PVH guests via ACPI tables

2024-11-12 Thread Demi Marie Obenour
im itself, only of the rest of the system. -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

Support status of OpenBSD frontend drivers

2022-03-24 Thread Demi Marie Obenour
As per private discussion with Theo de Raadt, OpenBSD does not consider bugs in its xnf(4) that allow a backend to cause mischief to be security issues. I believe the same applies to its xbf(4). Should the support document be updated? -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible

Re: Support status of OpenBSD frontend drivers

2022-03-24 Thread Demi Marie Obenour
On 3/24/22 10:11, Roger Pau Monné wrote: > On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote: >> As per private discussion with Theo de Raadt, OpenBSD does not consider >> bugs in its xnf(4) that allow a backend to cause mischief to be security >> issues

Re: Support status of OpenBSD frontend drivers

2022-03-24 Thread Demi Marie Obenour
On 3/24/22 18:21, Marek Marczykowski-Górecki wrote: > On Thu, Mar 24, 2022 at 11:49:14AM -0400, Demi Marie Obenour wrote: >> On 3/24/22 10:11, Roger Pau Monné wrote: >>> On Thu, Mar 24, 2022 at 09:56:29AM -0400, Demi Marie Obenour wrote: >>>> As per private discussi

Security support status of xnf(4) and xbf(4)

2022-03-25 Thread Demi Marie Obenour
take a few tries. -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

Re: Security support status of xnf(4) and xbf(4)

2022-03-25 Thread Demi Marie Obenour
On 3/25/22 18:42, Chris Cappuccio wrote: > Demi Marie Obenour [d...@invisiblethingslab.com] wrote: >> Linux???s netfront and blkfront drivers recently had a security >> vulnerability (XSA-396) that allowed a malicious backend to potentially >> compromise them. In follow-up

Re: Security support status of xnf(4) and xbf(4)

2022-03-28 Thread Demi Marie Obenour
On 3/27/22 21:45, Damien Miller wrote: > On Fri, 25 Mar 2022, Demi Marie Obenour wrote: > >> Linux’s netfront and blkfront drivers recently had a security >> vulnerability (XSA-396) that allowed a malicious backend to potentially >> compromise them. In follow-up audits

Re: Security support status of xnf(4) and xbf(4)

2022-03-28 Thread Demi Marie Obenour
On 3/28/22 10:39, Mark Kettenis wrote: >> Date: Mon, 28 Mar 2022 09:51:22 -0400 >> From: Demi Marie Obenour >> >> On 3/27/22 21:45, Damien Miller wrote: >>> On Fri, 25 Mar 2022, Demi Marie Obenour wrote: >>> >>>> Linux’s netfront and blkfr

Re: Security support status of xnf(4) and xbf(4)

2022-03-29 Thread Demi Marie Obenour
On 3/29/22 04:16, Claudio Jeker wrote: > On Mon, Mar 28, 2022 at 04:38:33PM -0400, Demi Marie Obenour wrote: >> On 3/28/22 10:39, Mark Kettenis wrote: >>>> Date: Mon, 28 Mar 2022 09:51:22 -0400 >>>> From: Demi Marie Obenour >>>> >>>> On

[PATCH v2] Grab the EFI System Resource Table and check it

2022-03-30 Thread Demi Marie Obenour
access the ESRT. Additionally, Xen must mark the memory as reserved, so that Linux knows accessing it is safe. See https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/ for details. Signed-off-by: Demi Marie Obenour --- xen/arch/arm/efi/efi-boot.h | 9 +++-- xen/arch/x86/efi/efi

Re: [PATCH v2] Grab the EFI System Resource Table and check it

2022-03-31 Thread Demi Marie Obenour
>(desc_ptr->Type == EfiBootServicesCode || > > desc_ptr->Type == EfiBootServicesData))) ) > > { > > > > I see CC list is pretty small, did you forget to add the maintainers? Yeah, I did indeed forget. > Cheers, > Luca > -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

[PATCH v2] Grab the EFI System Resource Table and check it

2022-04-01 Thread Demi Marie Obenour
access the ESRT. Additionally, Xen must mark the memory as reserved, so that Linux knows accessing it is safe. See https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/ for details. Signed-off-by: Demi Marie Obenour --- xen/arch/arm/efi/efi-boot.h | 9 +++-- xen/arch/x86/efi/efi

Re: [PATCH v2] Grab the EFI System Resource Table and check it

2022-04-18 Thread Demi Marie Obenour
On Wed, Apr 06, 2022 at 12:10:17PM +0200, Jan Beulich wrote: > On 02.04.2022 01:14, Demi Marie Obenour wrote: > > The EFI System Resource Table (ESRT) is necessary for fwupd to identify > > firmware updates to install. According to the UEFI specification §23.4, > > the tab

[PATCH v3 0/4] EFI System Resource Table support

2022-04-19 Thread Demi Marie Obenour
overflow check - Remove BUILD_BUG_ON()s - Avoid overriding attribute of memory descriptor containing ESRT Changes since v1: - Remove the esrt_status enum - Use EFI types - Fix style nits - Remove an unused overflow check Demi Marie Obenour (4): Grab the EFI System Resource Table and check it Add

[PATCH v3 1/4] Grab the EFI System Resource Table and check it

2022-04-19 Thread Demi Marie Obenour
access the ESRT. Additionally, Xen must mark the memory as reserved, so that Linux knows accessing it is safe. See https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/ for details. Signed-off-by: Demi Marie Obenour --- xen/arch/arm/efi/efi-boot.h | 1 + xen/arch/x86/efi/efi-boot.h

[PATCH v3 1/4] Grab the EFI System Resource Table and check it

2022-04-19 Thread Demi Marie Obenour
access the ESRT. Additionally, Xen must mark the memory as reserved, so that Linux knows accessing it is safe. See https://lore.kernel.org/xen-devel/20200818184018.GN1679@mail-itl/T/ for details. Signed-off-by: Demi Marie Obenour --- xen/arch/arm/efi/efi-boot.h | 1 + xen/arch/x86/efi/efi-boot.h

[PATCH v3 2/4] Add a dedicated memory region for the ESRT

2022-04-19 Thread Demi Marie Obenour
xen/arch/x86/include/asm/e820.h index 92f5efa4f5..98eca96425 100644 --- a/xen/arch/x86/include/asm/e820.h +++ b/xen/arch/x86/include/asm/e820.h @@ -16,7 +16,7 @@ struct __packed e820entry { uint32_t type; }; -#define E820MAX1024 +#define E820MAX1026 struct e820map { unsigned int nr_map; -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

[PATCH v3 3/4] Add a new hypercall to get the ESRT

2022-04-19 Thread Demi Marie Obenour
/* Int16, Fn02: Get keyboard shift flags. */ -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

[PATCH v3 4/4] Add emacs file-local variables

2022-04-19 Thread Demi Marie Obenour
+ * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

[PATCH] Improve docs for IOCTL_GNTDEV_MAP_GRANT_REF

2022-01-30 Thread Demi Marie Obenour
x27;d at offset 0, such as Wayland. If @count is set to 0, this + * ioctl will fail. */ #define IOCTL_GNTDEV_MAP_GRANT_REF \ _IOC(_IOC_NONE, 'G', 0, sizeof(struct ioctl_gntdev_map_grant_ref)) -- Sincerely, Demi Marie Obenour she/her/hers OpenPGP_0xB288B55FFF9C22C1.asc Description: Ope

[PATCH v2] Improve docs for IOCTL_GNTDEV_MAP_GRANT_REF

2022-01-31 Thread Demi Marie Obenour
. Document both of these. Signed-off-by: Demi Marie Obenour --- include/uapi/xen/gntdev.h | 8 +++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/include/uapi/xen/gntdev.h b/include/uapi/xen/gntdev.h index 9ac5515b9bc2..7a7145395c09 100644 --- a/include/uapi/xen/gntdev.h +++ b

[PATCH] Use direct I/O for loop devices

2022-08-17 Thread Demi Marie Obenour
t; "$loopdev" write_dev "$loopdev" release_lock "block" -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab

Re: [PATCH] Use direct I/O for loop devices

2022-08-18 Thread Demi Marie Obenour
On Thu, Aug 18, 2022 at 09:02:11AM +0200, Jan Beulich wrote: > On 17.08.2022 22:46, Demi Marie Obenour wrote: > > This is a huge performance improvement for two reasons: > > > > 1. It uses the filesystem’s asynchronous I/O support, rather than using > >synchronous

Re: [PATCH] Use direct I/O for loop devices

2022-08-18 Thread Demi Marie Obenour
On Thu, Aug 18, 2022 at 04:12:10PM +0200, Jan Beulich wrote: > On 18.08.2022 16:04, Demi Marie Obenour wrote: > > On Thu, Aug 18, 2022 at 09:02:11AM +0200, Jan Beulich wrote: > >> On 17.08.2022 22:46, Demi Marie Obenour wrote: > >>> --- a/tools/hotplug/Linux/block &

“Backend has not unmapped grant” errors

2022-08-23 Thread Demi Marie Obenour
or other random bit-flips. Marek, do you have any suggestions? -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

[PATCH] Make XEN_FW_EFI_MEM_INFO easier to use

2022-08-24 Thread Demi Marie Obenour
info->mem.addr; +info->mem.size = len - (info->mem.addr - desc->PhysicalStart); + return 0; } } -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab

Re: [PATCH] Make XEN_FW_EFI_MEM_INFO easier to use

2022-08-25 Thread Demi Marie Obenour
On Thu, Aug 25, 2022 at 09:59:56AM +0200, Jan Beulich wrote: > On 24.08.2022 23:04, Demi Marie Obenour wrote: > > The XEN_FW_EFI_MEM_INFO platform op has very surprising behavior: it > > only sets info->mem.size if the initial value was *larger* than the size > > of the

[PATCH] Add support for ESRT loading under Xen

2022-08-25 Thread Demi Marie Obenour
This is needed for fwupd to work in Qubes OS. Signed-off-by: Demi Marie Obenour --- drivers/firmware/efi/esrt.c | 34 -- drivers/xen/efi.c | 33 + include/linux/efi.h | 10 ++ 3 files changed, 67

Re: [PATCH] Add support for ESRT loading under Xen

2022-08-26 Thread Demi Marie Obenour
On Fri, Aug 26, 2022 at 09:53:29AM +0200, Jan Beulich wrote: > On 25.08.2022 23:52, Demi Marie Obenour wrote: > > @@ -40,6 +41,38 @@ > > > > #define efi_data(op) (op.u.efi_runtime_call) > > > > +static_assert(XEN_PAGE_SHIFT == EFI_PAGE_SHIFT, >

Re: [PATCH] Make XEN_FW_EFI_MEM_INFO easier to use

2022-08-26 Thread Demi Marie Obenour
On Fri, Aug 26, 2022 at 09:18:50AM +0200, Jan Beulich wrote: > On 25.08.2022 22:36, Demi Marie Obenour wrote: > > On Thu, Aug 25, 2022 at 09:59:56AM +0200, Jan Beulich wrote: > >> On 24.08.2022 23:04, Demi Marie Obenour wrote: > >>> Fix both of these problems by unco

[PATCH v2] Add support for ESRT loading under Xen

2022-08-27 Thread Demi Marie Obenour
This is needed for fwupd to work in Qubes OS. Signed-off-by: Demi Marie Obenour --- Changes since v1: - Use a different type (struct xen_efi_mem_info) for memory information provided by Xen, as Xen reports it in a different way than the standard Linux functions do. drivers/firmware/efi

Re: “Backend has not unmapped grant” errors

2022-08-27 Thread Demi Marie Obenour
On Wed, Aug 24, 2022 at 08:11:56AM +0200, Juergen Gross wrote: > On 24.08.22 02:20, Marek Marczykowski-Górecki wrote: > > On Tue, Aug 23, 2022 at 09:48:57AM +0200, Juergen Gross wrote: > > > On 23.08.22 09:40, Demi Marie Obenour wrote: > > > > I recently had a VM’s

Re: “Backend has not unmapped grant” errors

2022-08-29 Thread Demi Marie Obenour
On Mon, Aug 29, 2022 at 04:39:29PM +0200, Marek Marczykowski-Górecki wrote: > On Mon, Aug 29, 2022 at 02:55:55PM +0200, Juergen Gross wrote: > > On 28.08.22 07:15, Demi Marie Obenour wrote: > > > On Wed, Aug 24, 2022 at 08:11:56AM +0200, Juergen Gross wrote: > > >

Re: “Backend has not unmapped grant” errors

2022-08-29 Thread Demi Marie Obenour
On Mon, Aug 29, 2022 at 02:55:55PM +0200, Juergen Gross wrote: > On 28.08.22 07:15, Demi Marie Obenour wrote: > > On Wed, Aug 24, 2022 at 08:11:56AM +0200, Juergen Gross wrote: > > > On 24.08.22 02:20, Marek Marczykowski-Górecki wrote: > > > > On Tue, Aug 23, 202

Setting constant-time mode CPU flag

2022-09-01 Thread Demi Marie Obenour
unconditionally and ignoring guest attempts to change it. -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

Re: [PATCH v2] Add support for ESRT loading under Xen

2022-09-13 Thread Demi Marie Obenour
On Mon, Sep 05, 2022 at 01:46:54PM +0200, Ard Biesheuvel wrote: > On Sun, 28 Aug 2022 at 04:52, Demi Marie Obenour > wrote: > > > > This is needed for fwupd to work in Qubes OS. > > > > Please elaborate on: Will do in v3. > - the current situation The ESRT i

Re: [PATCH] Add support for ESRT loading under Xen

2022-09-13 Thread Demi Marie Obenour
On Tue, Sep 06, 2022 at 08:49:54AM +0200, Jan Beulich wrote: > On 26.08.2022 20:01, Demi Marie Obenour wrote: > > On Fri, Aug 26, 2022 at 09:53:29AM +0200, Jan Beulich wrote: > >> On 25.08.2022 23:52, Demi Marie Obenour wrote: > >>> @@ -40,6 +41,38 @@ >

Re: Setting constant-time mode CPU flag

2022-09-13 Thread Demi Marie Obenour
On Tue, Sep 06, 2022 at 10:01:00AM +, Andrew Cooper wrote: > On 06/09/2022 10:52, Jan Beulich wrote: > > On 02.09.2022 04:05, Demi Marie Obenour wrote: > >> On Intel chips (Ice Lake and later) and ARM64, a bit needs to be set in > >> a CPU register to enforce cons

Re: Setting constant-time mode CPU flag

2022-09-13 Thread Demi Marie Obenour
On Tue, Sep 13, 2022 at 04:47:24PM +0200, Jan Beulich wrote: > On 13.09.2022 16:22, Demi Marie Obenour wrote: > > On Tue, Sep 06, 2022 at 10:01:00AM +, Andrew Cooper wrote: > >> On 06/09/2022 10:52, Jan Beulich wrote: > >>> On 02.09.2022 04:05, Demi Marie Obenou

Re: Setting constant-time mode CPU flag

2022-09-13 Thread Demi Marie Obenour
On Wed, Sep 14, 2022 at 08:36:02AM +0200, Jan Beulich wrote: > On 13.09.2022 19:22, Demi Marie Obenour wrote: > > On Tue, Sep 13, 2022 at 04:47:24PM +0200, Jan Beulich wrote: > >> On 13.09.2022 16:22, Demi Marie Obenour wrote: > >>> On Tue, Sep 06, 2022 at 10:01:0

Re: Setting constant-time mode CPU flag

2022-09-14 Thread Demi Marie Obenour
On Wed, Sep 14, 2022 at 08:44:25AM +0200, Jan Beulich wrote: > On 14.09.2022 08:40, Demi Marie Obenour wrote: > > On Wed, Sep 14, 2022 at 08:36:02AM +0200, Jan Beulich wrote: > >> On 13.09.2022 19:22, Demi Marie Obenour wrote: > >>> On Tue, Sep 13, 2022 at 04:47

Re: Setting constant-time mode CPU flag

2022-09-14 Thread Demi Marie Obenour
On Wed, Sep 14, 2022 at 09:32:20AM +0200, Jan Beulich wrote: > On 14.09.2022 09:11, Demi Marie Obenour wrote: > > On Wed, Sep 14, 2022 at 08:44:25AM +0200, Jan Beulich wrote: > >> On 14.09.2022 08:40, Demi Marie Obenour wrote: > >>> On Wed, Sep 14, 2022 at 08:36

Re: [PATCH for-4.17?] x86: support data operand independent timing mode

2022-09-15 Thread Demi Marie Obenour
ontrol, put command line option > and Kconfig control in common files. > > [1] > https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/best-practices/data-operand-independent-timing-isa-guidance.html > > Requested-by: Demi Marie Obenour >

Re: [PATCH for-4.17?] x86: support data operand independent timing mode

2022-09-15 Thread Demi Marie Obenour
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 On Thu, Sep 15, 2022 at 01:56:06PM +0100, Julien Grall wrote: > Hi Demi, > > On 15/09/2022 12:24, Demi Marie Obenour wrote: > > On Thu, Sep 15, 2022 at 12:04:55PM +0200, Jan Beulich wrote: > > > [1] specifies a long list o

Layer 3 (point-to-point) netfront and netback drivers

2022-09-18 Thread Demi Marie Obenour
existing drivers include less attack surface (since the peer is no longer network-adjacent), slightly better performance, and no need for ARP or NDP traffic. -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab signature.asc Description: PGP signature

[PATCH v3] Support ESRT in Xen dom0

2022-09-19 Thread Demi Marie Obenour
it is, parse it as if not running under Xen. This allows programs such as fwupd which require the ESRT to run under Xen, and so makes fwupd support in Qubes OS possible. Signed-off-by: Demi Marie Obenour --- Changes since v2: - Massively updated commit message. - Fetch the ESRT inline in drivers

Re: Layer 3 (point-to-point) netfront and netback drivers

2022-09-19 Thread Demi Marie Obenour
On Mon, Sep 19, 2022 at 01:46:59PM -0700, Elliott Mitchell wrote: > On Sun, Sep 18, 2022 at 08:41:25AM -0400, Demi Marie Obenour wrote: > > How difficult would it be to provide layer 3 (point-to-point) versions > > of the existing netfront and netback drivers? Ideally, these

Re: Layer 3 (point-to-point) netfront and netback drivers

2022-09-19 Thread Demi Marie Obenour
On Mon, Sep 19, 2022 at 04:21:27PM -0700, Elliott Mitchell wrote: > On Mon, Sep 19, 2022 at 05:41:05PM -0400, Demi Marie Obenour wrote: > > On Mon, Sep 19, 2022 at 01:46:59PM -0700, Elliott Mitchell wrote: > > > On Sun, Sep 18, 2022 at 08:41:25AM -0400, Demi Marie Obenour

[PATCH v3 0/5] efi: Support ESRT under Xen

2023-01-19 Thread Demi Marie Obenour
This patch series fixes handling of EFI tables when running under Xen. These fixes allow the ESRT to be loaded when running paravirtualized in dom0, making the use of EFI capsule updates possible. Demi Marie Obenour (5): efi: memmap: Disregard bogus entries instead of returning them efi: xen

[PATCH v3 4/5] efi: Actually enable the ESRT under Xen

2023-01-19 Thread Demi Marie Obenour
The ESRT can be parsed if EFI_PARAVIRT is enabled, even if EFI_MEMMAP is not. Also allow the ESRT to be in reclaimable memory, as that is where future Xen versions will put it. Reported-by: Marek Marczykowski-Górecki Signed-off-by: Demi Marie Obenour Tested-by: Marek Marczykowski-Górecki

[PATCH v3 3/5] efi: Apply allowlist to EFI configuration tables when running under Xen

2023-01-19 Thread Demi Marie Obenour
Signed-off-by: Demi Marie Obenour Tested-by: Marek Marczykowski-Górecki --- drivers/firmware/efi/efi.c | 7 +++ drivers/xen/efi.c | 25 + include/linux/efi.h| 2 ++ 3 files changed, 34 insertions(+) diff --git a/drivers/firmware/efi/efi.c b/drivers

[PATCH v3 2/5] efi: xen: Implement memory descriptor lookup based on hypercall

2023-01-19 Thread Demi Marie Obenour
ever, none of the callers of efi_mem_desc_lookup() currently care about this. In the future, Xen may gain a hypercall that returns the actual start address, which can be used instead. Co-developed-by: Ard Biesheuvel Signed-off-by: Ard Biesheuvel Signed-off-by: Demi Marie Obenour Tested

[PATCH v3 5/5] efi: Warn if trying to reserve memory under Xen

2023-01-19 Thread Demi Marie Obenour
Doing so cannot work and should never happen. Signed-off-by: Demi Marie Obenour Tested-by: Marek Marczykowski-Górecki --- drivers/firmware/efi/efi.c | 4 1 file changed, 4 insertions(+) diff --git a/drivers/firmware/efi/efi.c b/drivers/firmware/efi/efi.c index

[RFC PATCH 3/7] Implement diskseq checks in blkback

2023-01-25 Thread Demi Marie Obenour
From: Demi Marie Obenour This allows specifying a disk sequence number in XenStore. If it does not match the disk sequence number of the underlying device, the device will not be exported and a warning will be logged. Userspace can use this to eliminate race conditions due to major/minor

[RFC PATCH 0/7] Allow race-free block device handling

2023-01-25 Thread Demi Marie Obenour
insecure. - The DM_DEV_CREATE ioctl gains a new flag. Unknown flags were previously ignored, so this could theoretically break buggy userspace tools. - I have no idea if I got the block device reference counting and locking correct. Demi Marie Obenour (7): block: Support creating a struct

[RFC PATCH 6/7] Minor blkback cleanups

2023-01-25 Thread Demi Marie Obenour
No functional change intended. Signed-off-by: Demi Marie Obenour --- drivers/block/xen-blkback/blkback.c | 8 +--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/drivers/block/xen-blkback/blkback.c b/drivers/block/xen-blkback/blkback.c index

[RFC PATCH 7/7] xen/blkback: Inform userspace that device has been opened

2023-01-25 Thread Demi Marie Obenour
This allows userspace to use block devices with delete-on-close behavior, which is necessary to ensure virtual devices (such as loop or device-mapper devices) are cleaned up automatically. Protocol details are included in comments. Signed-off-by: Demi Marie Obenour --- drivers/block/xen

Regular file support in Linux blkback?

2023-01-27 Thread Demi Marie Obenour
What would be involved in supporting regular files in Linux blkback? Is it just a matter of using the call_{read,write}_iter functions for read and write, and punting the work that cannot be done asynchronously to a thread pool? Or is it more complex than that? -- Sincerely, Demi Marie Obenour

Re: [RFC PATCH 0/7] Allow race-free block device handling

2023-02-02 Thread Demi Marie Obenour
On Thu, Feb 02, 2023 at 11:50:37AM -0500, Mike Snitzer wrote: > On Wed, Jan 25 2023 at 10:33P -0500, > Demi Marie Obenour wrote: > > > This work aims to allow userspace to create and destroy block devices > > in a race-free and leak-free way, > > "race-free and l

Re: [RFC PATCH 0/7] Allow race-free block device handling

2023-02-02 Thread Demi Marie Obenour
On Thu, Feb 02, 2023 at 02:56:34PM -0500, Mike Snitzer wrote: > On Thu, Feb 02 2023 at 1:41P -0500, > Demi Marie Obenour wrote: > > > On Thu, Feb 02, 2023 at 11:50:37AM -0500, Mike Snitzer wrote: > > > On Wed, Jan 25 2023 at 10:33P -0500, > > > Demi Marie Ob

[PATCH] xen: speed up grant-table reclaim

2023-02-06 Thread Demi Marie Obenour
intk("%s g.e. %#x (pfn %#lx)\n", - what, ref, page ? page_to_pfn(page) : -1); } +module_param(free_per_iteration, uint, 0600); + int gnttab_try_end_foreign_access(grant_ref_t ref) { int ret = _gnttab_end_foreign_access_ref(ref); -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab

[PATCH] xen: speed up grant-table reclaim

2023-02-06 Thread Demi Marie Obenour
opers can enable them using the dynamic debug mechanism. Fixes: QubesOS/qubes-issues#7410 (memory leak) Fixes: QubesOS/qubes-issues#7359 (excessive logging) Fixes: 569ca5b3f94c ("xen/gnttab: add deferred freeing logic") Cc: sta...@vger.kernel.org Signed-off-by: Demi Marie Obenour

[PATCH] Replace git:// and http:// with https://

2023-02-06 Thread Demi Marie Obenour
. Signed-off-by: Demi Marie Obenour --- Config.mk| 20 ++-- README | 4 ++-- automation/build/centos/CentOS-7.2.repo | 8 automation/build/debian/stretch-llvm-8.list | 4 ++-- automation/build

Re: [PATCH] Replace git:// and http:// with https://

2023-02-06 Thread Demi Marie Obenour
On Mon, Feb 06, 2023 at 07:27:05PM -0800, Elliott Mitchell wrote: > On Mon, Feb 06, 2023 at 10:10:33PM -0500, Demi Marie Obenour wrote: > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for non-executable data, insecure >

Re: [PATCH] Replace git:// and http:// with https://

2023-02-06 Thread Demi Marie Obenour
On Tue, Feb 07, 2023 at 05:16:21AM +0100, Marek Marczykowski-Górecki wrote: > On Mon, Feb 06, 2023 at 10:10:33PM -0500, Demi Marie Obenour wrote: > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for non-executable

[PATCH 2/4] Automation and CI: Replace git:// and http:// with https://

2023-02-07 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in automation and CI. Signed-off-by: Demi Marie Obenour --- README

[PATCH 1/4] Build system: Replace git:// and http:// with https://

2023-02-07 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in the build system. Signed-off-by: Demi Marie Obenour --- Config.mk

[PATCH 0/4] Stop using insecure transports

2023-02-07 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. Demi Marie Obenour (4): Build system: Replace git:// and http:// with https:// Automation and CI: Replace git:// and http

[PATCH 3/4] Miscellaneous and documentation: Only use TLS-protected transports

2023-02-07 Thread Demi Marie Obenour
-off-by: Demi Marie Obenour --- This patch might well have flaws, not least due to its sheer size. COPYING | 4 ++-- CREDITS | 2 +- README| 4 ++-- SUPPORT.md

Re: [PATCH 4/4] GPL License Boilerplate: Switch from HTTP to HTTPS

2023-02-08 Thread Demi Marie Obenour
On Wed, Feb 08, 2023 at 08:26:37AM +, Julien Grall wrote: > Hi, > > On 08/02/2023 07:40, Jan Beulich wrote: > > On 08.02.2023 05:51, Demi Marie Obenour wrote: > > > --- a/xen/drivers/passthrough/pci.c > > > +++ b/xen/drivers/passthrough/pci.c > > >

[PATCH v2 1/4] Build system: Replace git:// and http:// with https://

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in the build system. Signed-off-by: Demi Marie Obenour --- Config.mk

[PATCH v2 0/4] Stop using insecure transports

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. Demi Marie Obenour (4): Build system: Replace git:// and http:// with https:// Automation and CI: Replace git:// and http

[PATCH v2 2/4] Automation and CI: Replace git:// and http:// with https://

2023-02-08 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in automation and CI. Signed-off-by: Demi Marie Obenour --- README

[PATCH v2 3/4] Miscellaneous and documentation: Only use TLS-protected transports

2023-02-08 Thread Demi Marie Obenour
-off-by: Demi Marie Obenour --- COPYING | 4 ++-- CREDITS | 2 +- README| 4 ++-- SUPPORT.md| 2 +- docs/features/feature-levelling.pandoc

Re: [PATCH v2 4/4] GPL License Boilerplate: Switch from HTTP to HTTPS

2023-02-08 Thread Demi Marie Obenour
On Wed, Feb 08, 2023 at 02:58:38PM -0800, Stefano Stabellini wrote: > On Wed, 8 Feb 2023, Demi Marie Obenour wrote: > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for non-executable data, insecure > > transports are

Re: [PATCH v2 2/4] Automation and CI: Replace git:// and http:// with https://

2023-02-09 Thread Demi Marie Obenour
On Thu, Feb 09, 2023 at 02:03:34PM +, George Dunlap wrote: > On Wed, Feb 8, 2023 at 8:59 PM Demi Marie Obenour < > d...@invisiblethingslab.com> wrote: > > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for no

Re: [PATCH v2 1/4] Build system: Replace git:// and http:// with https://

2023-02-09 Thread Demi Marie Obenour
On Thu, Feb 09, 2023 at 02:01:52PM +, George Dunlap wrote: > On Wed, Feb 8, 2023 at 8:58 PM Demi Marie Obenour < > d...@invisiblethingslab.com> wrote: > > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for no

Re: [PATCH v2 3/4] Miscellaneous and documentation: Only use TLS-protected transports

2023-02-09 Thread Demi Marie Obenour
On Thu, Feb 09, 2023 at 02:25:07PM +, George Dunlap wrote: > On Wed, Feb 8, 2023 at 8:59 PM Demi Marie Obenour < > d...@invisiblethingslab.com> wrote: > > > Obtaining code over an insecure transport is a terrible idea for > > blatently obvious reasons. Even for no

Re: [PATCH] xen: speed up grant-table reclaim

2023-02-13 Thread Demi Marie Obenour
On Mon, Feb 13, 2023 at 10:26:11AM +0100, Juergen Gross wrote: > On 07.02.23 03:10, Demi Marie Obenour wrote: > > When a grant entry is still in use by the remote domain, Linux must put > > it on a deferred list. Normally, this list is very short, because > > the PV networ

Re: [PATCH] xen: speed up grant-table reclaim

2023-02-14 Thread Demi Marie Obenour
On Tue, Feb 14, 2023 at 08:51:09AM +0100, Juergen Gross wrote: > On 13.02.23 22:01, Demi Marie Obenour wrote: > > On Mon, Feb 13, 2023 at 10:26:11AM +0100, Juergen Gross wrote: > > > On 07.02.23 03:10, Demi Marie Obenour wrote: > > > > When a grant entry is still in u

[PATCH v3 0/4] Stop using insecure transports

2023-02-17 Thread Demi Marie Obenour
urgent and hardest to review. - Ensure that no links are broken, and fail with an error instead of trying to use links that *are* broken. Demi Marie Obenour (4): Use HTTPS for all xenbits.xen.org Git repos Build system: Replace git:// and http:// with https:// Automation and CI: Replace git

[PATCH v3 1/4] Use HTTPS for all xenbits.xen.org Git repos

2023-02-17 Thread Demi Marie Obenour
shell script: git ls-files -z | xargs -0 -- sed -Ei -- 's@(git://xenbits\.xen\.org|http://xenbits\.xen\.org/git-http)/@https://xenbits.xen.org/git-http/@g' All altered links have been tested and are known to work. Signed-off-by: Demi Marie Obenour ---

[PATCH v3 2/4] Build system: Replace git:// and http:// with https://

2023-02-17 Thread Demi Marie Obenour
original URLs. Therefore, configure will now error out instead of trying to download them. Signed-off-by: Demi Marie Obenour --- Config.mk | 2 +- stubdom/configure | 24 +++- stubdom/configure.ac | 24

[PATCH v3 3/4] Automation and CI: Replace git:// and http:// with https://

2023-02-17 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in automation and CI. All URLs are known to work. Signed-off-by: Demi Marie

[PATCH v3 4/4] Rip out HyperTransport

2023-02-17 Thread Demi Marie Obenour
It is not used and the website is gone. Signed-off-by: Demi Marie Obenour --- xen/include/xen/pci_regs.h | 37 - 1 file changed, 37 deletions(-) diff --git a/xen/include/xen/pci_regs.h b/xen/include/xen/pci_regs.h index

[PATCH v4 0/3] Stop using insecure transports

2023-02-18 Thread Demi Marie Obenour
urgent and hardest to review. - Ensure that no links are broken, and fail with an error instead of trying to use links that *are* broken. Demi Marie Obenour (3): Use HTTPS for all xenbits.xen.org Git repos Build system: Replace git:// and http:// with https:// Automation and CI: Replace git

[PATCH v4 2/3] Build system: Replace git:// and http:// with https://

2023-02-18 Thread Demi Marie Obenour
them with the URLs that were redirected to. Signed-off-by: Demi Marie Obenour --- Config.mk | 2 +- stubdom/configure | 18 +- stubdom/configure.ac | 18 +- tools/firmware/etherboot/Makefile | 6 +- 4 files

[PATCH v4 1/3] Use HTTPS for all xenbits.xen.org Git repos

2023-02-18 Thread Demi Marie Obenour
shell script: git ls-files -z | xargs -0 -- sed -Ei -- 's@(git://xenbits\.xen\.org|http://xenbits\.xen\.org/git-http)/@https://xenbits.xen.org/git-http/@g' All altered links have been tested and are known to work. Signed-off-by: Demi Marie Obenour ---

[PATCH v4 3/3] Automation and CI: Replace git:// and http:// with https://

2023-02-18 Thread Demi Marie Obenour
Obtaining code over an insecure transport is a terrible idea for blatently obvious reasons. Even for non-executable data, insecure transports are considered deprecated. This patch enforces the use of secure transports in automation and CI. All URLs are known to work. Signed-off-by: Demi Marie

[PATCH] Call SetVirtualAddressMap() by default

2023-02-22 Thread Demi Marie Obenour
ieve OpenXT and EVE ship it as well. Mark EFI_SET_VIRTUAL_ADDRESS_MAP as SUPPORTED and enable it by default. Signed-off-by: Demi Marie Obenour --- What is necessary for this patch to be accepted? xen/common/Kconfig | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/xen/com

Re: [PATCH v4 2/3] Build system: Replace git:// and http:// with https://

2023-02-24 Thread Demi Marie Obenour
On Tue, Feb 21, 2023 at 11:07:58AM +0100, Jan Beulich wrote: > On 19.02.2023 03:46, Demi Marie Obenour wrote: > > --- a/stubdom/configure > > +++ b/stubdom/configure > > @@ -3535,7 +3535,7 @@ if test "x$ZLIB_URL" = "x"; then : > > if t

[PATCH v5 0/5] Stop using insecure transports

2023-02-25 Thread Demi Marie Obenour
+--- tools/misc/mkrpm| 2 +- 12 files changed, 37 insertions(+), 63 deletions(-) -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab

[PATCH v5 1/5] Use HTTPS for all xenbits.xen.org Git repos

2023-02-25 Thread Demi Marie Obenour
shell script: git ls-files -z | xargs -0 -- sed -Ei -- 's@(git://xenbits\.xen\.org|http://xenbits\.xen\.org/git-http)/@https://xenbits.xen.org/git-http/@g' All altered links have been tested and are known to work. Signed-off-by: Demi Marie Obenour ---

[PATCH v5 2/5] Change remaining xenbits.xen.org links to HTTPS

2023-02-25 Thread Demi Marie Obenour
Also fix an old xenbits.xenproject.org link. Signed-off-by: Demi Marie Obenour --- Config.mk| 2 +- tools/misc/mkrpm | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/Config.mk b/Config.mk index 75f1975e5e78af44d36c2372cba6e89b425267a5

[PATCH v5 3/5] Build system: Do not try to use broken links

2023-02-25 Thread Demi Marie Obenour
The upstream URLs for zlib, PolarSSL, and the TPM emulator do not work anymore, so do not attempt to use them. Signed-off-by: Demi Marie Obenour --- m4/stubdom.m4| 5 +++-- stubdom/configure| 21 +++-- stubdom/configure.ac | 6 +++--- 3 files changed, 9 insertions

[PATCH v5 4/5] Build system: Replace git:// and http:// with https://

2023-02-25 Thread Demi Marie Obenour
them with the URLs that were redirected to. Signed-off-by: Demi Marie Obenour --- stubdom/configure | 12 ++-- stubdom/configure.ac | 12 ++-- tools/firmware/etherboot/Makefile | 6 +- 3 files changed, 13 insertions(+), 17 deletions(-) diff --git a

[PATCH v5 5/5] Automation and CI: Replace git:// and http:// with https://

2023-02-25 Thread Demi Marie Obenour
v3.15/releases/armhf/alpine-minirootfs-3.15.1-armhf.tar.gz -- Sincerely, Demi Marie Obenour (she/her/hers) Invisible Things Lab

Re: [PATCH v5 2/5] Change remaining xenbits.xen.org links to HTTPS

2023-02-27 Thread Demi Marie Obenour
On Mon, Feb 27, 2023 at 09:35:51AM +0100, Jan Beulich wrote: > On 25.02.2023 21:37, Demi Marie Obenour wrote: > > --- a/Config.mk > > +++ b/Config.mk > > @@ -191,7 +191,7 @@ APPEND_CFLAGS += $(foreach i, $(APPEND_INCLUDES), > > -I$(i)) > > EMBEDDED_EXTRA_CFLAGS

Re: [PATCH v4 2/3] Build system: Replace git:// and http:// with https://

2023-02-27 Thread Demi Marie Obenour
On Mon, Feb 27, 2023 at 09:25:32AM +0100, Jan Beulich wrote: > On 24.02.2023 23:55, Demi Marie Obenour wrote: > > On Tue, Feb 21, 2023 at 11:07:58AM +0100, Jan Beulich wrote: > >> On 19.02.2023 03:46, Demi Marie Obenour wrote: > >>> --- a/stubdom/configure

Re: [PATCH v5 4/5] Build system: Replace git:// and http:// with https://

2023-02-27 Thread Demi Marie Obenour
On Mon, Feb 27, 2023 at 09:42:24AM +0100, Jan Beulich wrote: > On 25.02.2023 21:37, Demi Marie Obenour wrote: > > --- a/stubdom/configure > > +++ b/stubdom/configure > > @@ -3545,7 +3545,7 @@ if test "x$LIBPCI_URL" = "x"; then : > > if tes

  1   2   3   4   5   >