|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] xen/arm: Correctly handle non-page aligned pointer in raw_copy_*
The current implementation of raw_copy_* helpers may lead to data corruption
and sometimes Xen crash when the guest virtual address is not aligned to
PAGE_SIZE.
When the total length is higher than a page, the length to read is badly
compute with
min(len, (unsigned)(PAGE_SIZE - offset))
As the offset is only computed one time per function, if the start address was
not aligned to PAGE_SIZE, we can end up in same iteration:
- to read accross page boundary => xen crash
- read the previous page => data corruption
This issue can be resolved by computing the offset on every iteration.
Signed-off-by: Julien Grall <julien.grall@xxxxxxxxxx>
---
This patch is a bug fix for Xen 4.4. Without this patch the data may be
corrupted between Xen and the guest when the guest virtual address is
not aligned to PAGE_SIZE. Sometimes it can also crash Xen.
These functions are used in numerous place in Xen. If it introduce another
bug we can see quickly with small amount of data.
---
xen/arch/arm/guestcopy.c | 8 +++-----
1 file changed, 3 insertions(+), 5 deletions(-)
diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c
index af0af6b..b3b54e9 100644
--- a/xen/arch/arm/guestcopy.c
+++ b/xen/arch/arm/guestcopy.c
@@ -9,12 +9,11 @@ static unsigned long raw_copy_to_guest_helper(void *to, const
void *from,
unsigned len, int flush_dcache)
{
/* XXX needs to handle faults */
- unsigned offset = (vaddr_t)to & ~PAGE_MASK;
-
while ( len )
{
paddr_t g;
void *p;
+ unsigned offset = (vaddr_t)to & ~PAGE_MASK;
unsigned size = min(len, (unsigned)PAGE_SIZE - offset);
if ( gvirt_to_maddr((vaddr_t) to, &g) )
@@ -50,12 +49,12 @@ unsigned long raw_copy_to_guest_flush_dcache(void *to,
const void *from,
unsigned long raw_clear_guest(void *to, unsigned len)
{
/* XXX needs to handle faults */
- unsigned offset = (vaddr_t)to & ~PAGE_MASK;
while ( len )
{
paddr_t g;
void *p;
+ unsigned offset = (vaddr_t)to & ~PAGE_MASK;
unsigned size = min(len, (unsigned)PAGE_SIZE - offset);
if ( gvirt_to_maddr((vaddr_t) to, &g) )
@@ -76,12 +75,11 @@ unsigned long raw_clear_guest(void *to, unsigned len)
unsigned long raw_copy_from_guest(void *to, const void __user *from, unsigned
len)
{
- unsigned offset = (vaddr_t)from & ~PAGE_MASK;
-
while ( len )
{
paddr_t g;
void *p;
+ unsigned offset = (vaddr_t)from & ~PAGE_MASK;
unsigned size = min(len, (unsigned)(PAGE_SIZE - offset));
if ( gvirt_to_maddr((vaddr_t) from & PAGE_MASK, &g) )
--
1.7.10.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |