[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen stable-4.7] x86/domctl: Fix migration of guests which are not using xsave
commit 1983d58d18bd29137a6e995d4ab5f740c56a5f6a Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Wed Sep 28 16:50:24 2016 +0200 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Wed Sep 28 16:50:24 2016 +0200 x86/domctl: Fix migration of guests which are not using xsave c/s da62246e "x86/xsaves: enable xsaves/xrstors/xsavec in xen" broke migration of PV guests which were not using xsave. In such a case, compress_xsave_states() gets passed a zero length buffer. The first thing it tries to do is ASSERT() on user-provided data, if it hadn't already wandered off the end of the buffer to do so. Perform more verification of the input buffer before passing it to compress_xsave_states(). This involves making xsave_area_compressed() public. Similar problems exist on the HVM side, so make equivalent adjustments there. This doesn't manifest in general, as hvm_save_cpu_xsave_states() elides the entire record if xsave isn't used, but is a problem if a caller were to construct an xsave record manually. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <JBeulich@xxxxxxxx> master commit: 681aea049c4a83bb847918003dc2ae21c1156ddb master date: 2016-09-13 10:44:04 +0100 --- xen/arch/x86/domctl.c | 12 +++++++++--- xen/arch/x86/hvm/hvm.c | 27 ++++++++++++++++++++++----- xen/arch/x86/xstate.c | 6 ------ xen/include/asm-x86/xstate.h | 6 ++++++ 4 files changed, 37 insertions(+), 14 deletions(-) diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c index 909bc96..966e5aa 100644 --- a/xen/arch/x86/domctl.c +++ b/xen/arch/x86/domctl.c @@ -1150,7 +1150,15 @@ long arch_do_domctl( goto vcpuextstate_out; } - if ( evc->size <= PV_XSAVE_SIZE(_xcr0_accum) ) + if ( evc->size == 2 * sizeof(uint64_t) ) + ; /* Nothing to restore. */ + else if ( evc->size < 2 * sizeof(uint64_t) + XSTATE_AREA_MIN_SIZE ) + ret = -EINVAL; /* Can't be legitimate data. */ + else if ( xsave_area_compressed(_xsave_area) ) + ret = -EOPNOTSUPP; /* Don't support compressed data. */ + else if ( evc->size != PV_XSAVE_SIZE(_xcr0_accum) ) + ret = -EINVAL; /* Not legitimate data. */ + else { vcpu_pause(v); v->arch.xcr0 = _xcr0; @@ -1161,8 +1169,6 @@ long arch_do_domctl( evc->size - 2 * sizeof(uint64_t)); vcpu_unpause(v); } - else - ret = -EINVAL; xfree(receive_buf); } diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 40665f5..02ed45b 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -1251,8 +1251,8 @@ static int hvm_load_cpu_xsave_states(struct domain *d, hvm_domain_context_t *h) int err; struct vcpu *v; struct hvm_hw_cpu_xsave *ctxt; - struct hvm_save_descriptor *desc; - unsigned int i, desc_start; + const struct hvm_save_descriptor *desc; + unsigned int i, desc_start, desc_length; /* Which vcpu is this? */ vcpuid = hvm_load_instance(h); @@ -1311,7 +1311,8 @@ static int hvm_load_cpu_xsave_states(struct domain *d, hvm_domain_context_t *h) return err; } size = HVM_CPU_XSAVE_SIZE(ctxt->xcr0_accum); - if ( desc->length > size ) + desc_length = desc->length; + if ( desc_length > size ) { /* * Xen 4.3.0, 4.2.3 and older used to send longer-than-needed @@ -1331,6 +1332,23 @@ static int hvm_load_cpu_xsave_states(struct domain *d, hvm_domain_context_t *h) printk(XENLOG_G_WARNING "HVM%d.%u restore mismatch: xsave length %#x > %#x\n", d->domain_id, vcpuid, desc->length, size); + /* Rewind desc_length to ignore the extraneous zeros. */ + desc_length = size; + } + + if ( xsave_area_compressed((const void *)&ctxt->save_area) ) + { + printk(XENLOG_G_WARNING + "HVM%d.%u restore: compressed xsave state not supported\n", + d->domain_id, vcpuid); + return -EOPNOTSUPP; + } + else if ( desc_length != size ) + { + printk(XENLOG_G_WARNING + "HVM%d.%u restore mismatch: xsave length %#x != %#x\n", + d->domain_id, vcpuid, desc_length, size); + return -EINVAL; } /* Checking finished */ @@ -1339,8 +1357,7 @@ static int hvm_load_cpu_xsave_states(struct domain *d, hvm_domain_context_t *h) if ( ctxt->xcr0_accum & XSTATE_NONLAZY ) v->arch.nonlazy_xstate_used = 1; compress_xsave_states(v, &ctxt->save_area, - min(desc->length, size) - - offsetof(struct hvm_hw_cpu_xsave,save_area)); + size - offsetof(struct hvm_hw_cpu_xsave, save_area)); return 0; } diff --git a/xen/arch/x86/xstate.c b/xen/arch/x86/xstate.c index 1fd1ce8..d4aa654 100644 --- a/xen/arch/x86/xstate.c +++ b/xen/arch/x86/xstate.c @@ -86,12 +86,6 @@ uint64_t get_msr_xss(void) return this_cpu(xss); } -static bool_t xsave_area_compressed(const struct xsave_struct *xsave_area) -{ - return xsave_area && (xsave_area->xsave_hdr.xcomp_bv - & XSTATE_COMPACTION_ENABLED); -} - static int setup_xstate_features(bool_t bsp) { unsigned int leaf, eax, ebx, ecx, edx; diff --git a/xen/include/asm-x86/xstate.h b/xen/include/asm-x86/xstate.h index 51a9ed4..a7e1c9d 100644 --- a/xen/include/asm-x86/xstate.h +++ b/xen/include/asm-x86/xstate.h @@ -131,4 +131,10 @@ static inline bool_t xstate_all(const struct vcpu *v) (v->arch.xcr0_accum & XSTATE_LAZY & ~XSTATE_FP_SSE); } +static inline bool_t +xsave_area_compressed(const struct xsave_struct *xsave_area) +{ + return !!(xsave_area->xsave_hdr.xcomp_bv & XSTATE_COMPACTION_ENABLED); +} + #endif /* __ASM_XSTATE_H */ -- generated by git-patchbot for /home/xen/git/xen.git#stable-4.7 _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |