lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID:
 <SN6PR02MB41576739C778676C009D5A86D43DA@SN6PR02MB4157.namprd02.prod.outlook.com>
Date: Fri, 22 Aug 2025 02:16:56 +0000
From: Michael Kelley <mhklinux@...look.com>
To: Mukesh R <mrathor@...ux.microsoft.com>, "kys@...rosoft.com"
	<kys@...rosoft.com>, "haiyangz@...rosoft.com" <haiyangz@...rosoft.com>,
	"wei.liu@...nel.org" <wei.liu@...nel.org>, "decui@...rosoft.com"
	<decui@...rosoft.com>, "tglx@...utronix.de" <tglx@...utronix.de>,
	"mingo@...hat.com" <mingo@...hat.com>, "bp@...en8.de" <bp@...en8.de>,
	"dave.hansen@...ux.intel.com" <dave.hansen@...ux.intel.com>, "hpa@...or.com"
	<hpa@...or.com>, "lpieralisi@...nel.org" <lpieralisi@...nel.org>,
	"kw@...ux.com" <kw@...ux.com>, "manivannan.sadhasivam@...aro.org"
	<manivannan.sadhasivam@...aro.org>, "robh@...nel.org" <robh@...nel.org>,
	"bhelgaas@...gle.com" <bhelgaas@...gle.com>, "arnd@...db.de" <arnd@...db.de>
CC: "x86@...nel.org" <x86@...nel.org>, "linux-hyperv@...r.kernel.org"
	<linux-hyperv@...r.kernel.org>, "linux-kernel@...r.kernel.org"
	<linux-kernel@...r.kernel.org>, "linux-pci@...r.kernel.org"
	<linux-pci@...r.kernel.org>, "linux-arch@...r.kernel.org"
	<linux-arch@...r.kernel.org>
Subject: RE: [PATCH v3 1/7] Drivers: hv: Introduce hv_hvcall_*() functions for
 hypercall arguments

From: Mukesh R <mrathor@...ux.microsoft.com> Sent: Thursday, August 21, 2025 2:16 PM
> 
> On 8/21/25 13:49, Mukesh R wrote:
> > On 8/21/25 12:24, Michael Kelley wrote:
> >> From: Mukesh R <mrathor@...ux.microsoft.com> Sent: Wednesday, August 20, 2025 7:58 PM
> >>>
> >>> On 8/20/25 17:31, Mukesh R wrote:
> >>>> On 4/15/25 11:07, mhkelley58@...il.com wrote:
> >>>>> From: Michael Kelley <mhklinux@...look.com>
> >>>>>
> >>>>>
> > <snip>
> >>>>
> >>>>
> >>>> IMHO, this is unnecessary change that just obfuscates code. With status quo
> >>>> one has the advantage of seeing what exactly is going on, one can use the
> >>>> args any which way, change batch size any which way, and is thus flexible.
> >>
> >> I started this patch set in response to some errors in open coding the
> >> use of hyperv_pcpu_input/output_arg, to see if helper functions could
> >> regularize the usage and reduce the likelihood of future errors. Balancing
> >> the pluses and minuses of the result, in my view the helper functions are
> >> an improvement, though not overwhelmingly so. Others may see the
> >> tradeoffs differently, and as such I would not go to the mat in arguing the
> >> patches must be taken. But if we don't take them, we need to go back and
> >> clean up minor errors and inconsistencies in the open coding at some
> >> existing hypercall call sites.
> >
> > Yes, definitely. Assuming Nuno knows what issues you are referring to,
> > I'll work with him to get them addressed asap. Thanks for noticing them.
> > If Nuno is not aware, I'll ping you for more info.
> 
> Talked to Nuno, he's not aware of anything pending or details. So if you
> can kindly list them out here, I will make sure it gets addressed right
> away.
> 

I didn't catalog the issues as I came across them when doing this patch
set. :-(   I don't think any are bugs that could break things now. They were
things like not ensuring that all hypercall input fields are initialized to zero,
duplicate initialization to zero, and unnecessary initialization of hypercall
output memory. In general, how the hypercall args are set up is inconsistent
across different hypercall call sites, and that inconsistency can lead to errors,
which is what I was trying to address.

But I can go back and come up with a list if that's where we're headed.

Michael

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ