Hi Demi,

> On 3 Aug 2025, at 06:24, Demi Marie Obenour <demioben...@gmail.com> wrote:
> 
> On 7/17/25 08:11, Bertrand Marquis wrote:
>> Create a CONFIG_FFA_VM_TO_VM parameter to activate FFA communication
>> between VMs.
>> When activated list VMs in the system with FF-A support in part_info_get.
>> 
>> When VM to VM is activated, Xen will be tainted as Insecure and a
>> message is displayed to the user during the boot as there is no
>> filtering of VMs in FF-A so any VM can communicate or see any other VM
>> in the system.
>> 
>> WARNING: There is no filtering for now and all VMs are listed !!
> I'm pretty sure that there is already no filtering for things like grant
> tables and event channels, so this doesn't make things any worse.  That
> said, FF-A is quite tricky to implement without integer overflow/wraparound
> or denial of service bugs.  In particular, code in Hafnium (Secure Partition
> Monitor running in S-EL2) requires quadratic time because of repeated linear
> searches.  Xen is allowed to use dynamic memory allocation, so it can, should,
> and must do better.

I do agree but we still have tricky cases where we could end up in unbounded 
loops.
Some are handled by adding some limits.

Dynamic allocation being available in Xen is helping a lot on some cases but 
for now
I try to prevent it when possible but we might have to review this later if we 
want to
increase some capacities (for example the number of shared memories).

I plan to do a presentation at the Xen Summit and a design session to discuss 
how
we could define a way to define by configuration or at runtime what secure 
endpoints
or VMs can be contacted by a VM with FF-A enabled.

Regards
Bertrand

> -- 
> Sincerely,
> Demi Marie Obenour (she/her/hers)<OpenPGP_0xB288B55FFF9C22C1.asc>



Reply via email to