|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] x86-64: don't allow non-canonical addresses to be set for any callback
>>> On 13.06.12 at 12:51, David Vrabel <dvrabel@xxxxxxxxxx> wrote:
> On 13/06/12 11:02, Jan Beulich wrote:
>> Rather than deferring the detection of these to the point where they
>> get actually used (the fix for XSA-7, 25480:76eaf5966c05, causing a #GP
>> to be raised by IRET, which invokes the guest's [fragile] fail-safe
>> callback), don't even allow such to be set.
>>
>> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
>>
>> --- a/xen/arch/x86/domain.c
>> +++ b/xen/arch/x86/domain.c
>> @@ -736,6 +736,14 @@ int arch_set_info_guest(
>> {
>> if ( !compat )
>> {
>> +#ifdef __x86_64__
>> + if ( !is_canonical_address(c.nat->user_regs.eip) ||
>> + !is_canonical_address(c.nat->event_callback_eip) ||
>> + !is_canonical_address(c.nat->syscall_callback_eip) ||
>> + !is_canonical_address(c.nat->failsafe_callback_eip) )
>> + return -EINVAL;
>> +#endif
>> +
>
> Would it be better to have
>
> #ifndef __x86_64__
> # define is_canonical_address(a) 1
> #endif
>
> somewhere?
That one we have (otherwise other changes in this patch would
cause build failures), the problem here is that ->syscall_callback
doesn't exist for the 32-bit interface. And rater than just putting
that on line into a conditional, I preferred to frame the whole
addition.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |