|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen stable-4.7] x86/domctl: Fix migration of guests which are not using xsave
commit 1983d58d18bd29137a6e995d4ab5f740c56a5f6a
Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
AuthorDate: Wed Sep 28 16:50:24 2016 +0200
Commit: Jan Beulich <jbeulich@xxxxxxxx>
CommitDate: Wed Sep 28 16:50:24 2016 +0200
x86/domctl: Fix migration of guests which are not using xsave
c/s da62246e "x86/xsaves: enable xsaves/xrstors/xsavec in xen" broke
migration
of PV guests which were not using xsave.
In such a case, compress_xsave_states() gets passed a zero length buffer.
The
first thing it tries to do is ASSERT() on user-provided data, if it hadn't
already wandered off the end of the buffer to do so.
Perform more verification of the input buffer before passing it to
compress_xsave_states(). This involves making xsave_area_compressed()
public.
Similar problems exist on the HVM side, so make equivalent adjustments
there.
This doesn't manifest in general, as hvm_save_cpu_xsave_states() elides the
entire record if xsave isn't used, but is a problem if a caller were to
construct an xsave record manually.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Reviewed-by: Jan Beulich <JBeulich@xxxxxxxx>
master commit: 681aea049c4a83bb847918003dc2ae21c1156ddb
master date: 2016-09-13 10:44:04 +0100
---
xen/arch/x86/domctl.c | 12 +++++++++---
xen/arch/x86/hvm/hvm.c | 27 ++++++++++++++++++++++-----
xen/arch/x86/xstate.c | 6 ------
xen/include/asm-x86/xstate.h | 6 ++++++
4 files changed, 37 insertions(+), 14 deletions(-)
diff --git a/xen/arch/x86/domctl.c b/xen/arch/x86/domctl.c
index 909bc96..966e5aa 100644
--- a/xen/arch/x86/domctl.c
+++ b/xen/arch/x86/domctl.c
@@ -1150,7 +1150,15 @@ long arch_do_domctl(
goto vcpuextstate_out;
}
- if ( evc->size <= PV_XSAVE_SIZE(_xcr0_accum) )
+ if ( evc->size == 2 * sizeof(uint64_t) )
+ ; /* Nothing to restore. */
+ else if ( evc->size < 2 * sizeof(uint64_t) + XSTATE_AREA_MIN_SIZE )
+ ret = -EINVAL; /* Can't be legitimate data. */
+ else if ( xsave_area_compressed(_xsave_area) )
+ ret = -EOPNOTSUPP; /* Don't support compressed data. */
+ else if ( evc->size != PV_XSAVE_SIZE(_xcr0_accum) )
+ ret = -EINVAL; /* Not legitimate data. */
+ else
{
vcpu_pause(v);
v->arch.xcr0 = _xcr0;
@@ -1161,8 +1169,6 @@ long arch_do_domctl(
evc->size - 2 * sizeof(uint64_t));
vcpu_unpause(v);
}
- else
- ret = -EINVAL;
xfree(receive_buf);
}
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index 40665f5..02ed45b 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -1251,8 +1251,8 @@ static int hvm_load_cpu_xsave_states(struct domain *d,
hvm_domain_context_t *h)
int err;
struct vcpu *v;
struct hvm_hw_cpu_xsave *ctxt;
- struct hvm_save_descriptor *desc;
- unsigned int i, desc_start;
+ const struct hvm_save_descriptor *desc;
+ unsigned int i, desc_start, desc_length;
/* Which vcpu is this? */
vcpuid = hvm_load_instance(h);
@@ -1311,7 +1311,8 @@ static int hvm_load_cpu_xsave_states(struct domain *d,
hvm_domain_context_t *h)
return err;
}
size = HVM_CPU_XSAVE_SIZE(ctxt->xcr0_accum);
- if ( desc->length > size )
+ desc_length = desc->length;
+ if ( desc_length > size )
{
/*
* Xen 4.3.0, 4.2.3 and older used to send longer-than-needed
@@ -1331,6 +1332,23 @@ static int hvm_load_cpu_xsave_states(struct domain *d,
hvm_domain_context_t *h)
printk(XENLOG_G_WARNING
"HVM%d.%u restore mismatch: xsave length %#x > %#x\n",
d->domain_id, vcpuid, desc->length, size);
+ /* Rewind desc_length to ignore the extraneous zeros. */
+ desc_length = size;
+ }
+
+ if ( xsave_area_compressed((const void *)&ctxt->save_area) )
+ {
+ printk(XENLOG_G_WARNING
+ "HVM%d.%u restore: compressed xsave state not supported\n",
+ d->domain_id, vcpuid);
+ return -EOPNOTSUPP;
+ }
+ else if ( desc_length != size )
+ {
+ printk(XENLOG_G_WARNING
+ "HVM%d.%u restore mismatch: xsave length %#x != %#x\n",
+ d->domain_id, vcpuid, desc_length, size);
+ return -EINVAL;
}
/* Checking finished */
@@ -1339,8 +1357,7 @@ static int hvm_load_cpu_xsave_states(struct domain *d,
hvm_domain_context_t *h)
if ( ctxt->xcr0_accum & XSTATE_NONLAZY )
v->arch.nonlazy_xstate_used = 1;
compress_xsave_states(v, &ctxt->save_area,
- min(desc->length, size) -
- offsetof(struct hvm_hw_cpu_xsave,save_area));
+ size - offsetof(struct hvm_hw_cpu_xsave, save_area));
return 0;
}
diff --git a/xen/arch/x86/xstate.c b/xen/arch/x86/xstate.c
index 1fd1ce8..d4aa654 100644
--- a/xen/arch/x86/xstate.c
+++ b/xen/arch/x86/xstate.c
@@ -86,12 +86,6 @@ uint64_t get_msr_xss(void)
return this_cpu(xss);
}
-static bool_t xsave_area_compressed(const struct xsave_struct *xsave_area)
-{
- return xsave_area && (xsave_area->xsave_hdr.xcomp_bv
- & XSTATE_COMPACTION_ENABLED);
-}
-
static int setup_xstate_features(bool_t bsp)
{
unsigned int leaf, eax, ebx, ecx, edx;
diff --git a/xen/include/asm-x86/xstate.h b/xen/include/asm-x86/xstate.h
index 51a9ed4..a7e1c9d 100644
--- a/xen/include/asm-x86/xstate.h
+++ b/xen/include/asm-x86/xstate.h
@@ -131,4 +131,10 @@ static inline bool_t xstate_all(const struct vcpu *v)
(v->arch.xcr0_accum & XSTATE_LAZY & ~XSTATE_FP_SSE);
}
+static inline bool_t
+xsave_area_compressed(const struct xsave_struct *xsave_area)
+{
+ return !!(xsave_area->xsave_hdr.xcomp_bv & XSTATE_COMPACTION_ENABLED);
+}
+
#endif /* __ASM_XSTATE_H */
--
generated by git-patchbot for /home/xen/git/xen.git#stable-4.7
_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxx
https://lists.xenproject.org/xen-changelog
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |