[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86/svm: Adjust ModRM Mode check in is_invlpg()
On 01/11/2017 12:33 PM, Andrew Cooper wrote: > Coverity points out that x86_insn_modrm() returns -EINVAL for instructions not > encoded with a ModRM byte. A consequence is that checking != 3 is > insufficient to confirm that &ext was actually written to. > > In practice, this check is only used after decode has been successful, and > 0f01 will have a ModRM byte. > > Use an unsigned < comparison to exclude the -EINVAL case, guaranteeing that > ext is only read if it was filled in by x86_insn_modrm(), which should placate > Coverity. > > Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > --- > CC: Jan Beulich <JBeulich@xxxxxxxx> > CC: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx> > CC: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx> > > RFC. I haven't actually checked that this fixes the issue. > > An alternative would be to ASSERT() that x86_insn_modrm() is non-negative, but > I can't nice way of integrating that into the existing logic (without using > the comma operator, and that isn't nice to read). how about return ctxt->opcode == X86EMUL_OPC(0x0f, 0x01) && - x86_insn_modrm(state, NULL, &ext) != 3 && + (mod = x86_insn_modrm(state, NULL, &ext)) >= 0 && mod != 3 && (ext & 7) == 7; (in case x86_insn_modrm decides to return some other errors in the future.) -boris > --- > xen/arch/x86/hvm/svm/svm.c | 2 +- > 1 file changed, 1 insertion(+), 1 deletion(-) > > diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c > index ae8e2c4..ff134a5 100644 > --- a/xen/arch/x86/hvm/svm/svm.c > +++ b/xen/arch/x86/hvm/svm/svm.c > @@ -2162,7 +2162,7 @@ static bool is_invlpg(const struct x86_emulate_state > *state, > unsigned int ext; > > return ctxt->opcode == X86EMUL_OPC(0x0f, 0x01) && > - x86_insn_modrm(state, NULL, &ext) != 3 && > + (unsigned int)x86_insn_modrm(state, NULL, &ext) < 3 && > (ext & 7) == 7; > } > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |