[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] x86/xstate: Fix array overrun on hardware with LWP
commit fe0d67576e335c02becf1cea8e67005509fa90b6 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Fri Jan 13 18:51:04 2017 +0000 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Mon Jan 16 17:37:26 2017 +0000 x86/xstate: Fix array overrun on hardware with LWP c/s da62246e4c "x86/xsaves: enable xsaves/xrstors/xsavec in xen" introduced setup_xstate_features() to allocate and fill xstate_offsets[] and xstate_sizes[]. However, fls() casts xfeature_mask to 32bits which truncates LWP out of the calculation. As a result, the arrays are allocated too short, and the cpuid infrastructure reads off the end of them when calculating xstate_size for the guest. On one test system, this results in 0x3fec83c0 being returned as the maximum size of an xsave area, which surprisingly appears not to bother Windows or Linux too much. I suspect they both use current size based on xcr0, which Xen forwards from real hardware. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> --- xen/arch/x86/xstate.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/xstate.c b/xen/arch/x86/xstate.c index 6073e1d..b8ae656 100644 --- a/xen/arch/x86/xstate.c +++ b/xen/arch/x86/xstate.c @@ -92,7 +92,7 @@ static int setup_xstate_features(bool_t bsp) if ( bsp ) { - xstate_features = fls(xfeature_mask); + xstate_features = flsl(xfeature_mask); xstate_offsets = xzalloc_array(unsigned int, xstate_features); if ( !xstate_offsets ) return -ENOMEM; -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |