|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 19/22] libxc: check failure of xc_dom_*_to_ptr, xc_map_foreign_range
On 13/06/13 16:22, Ian Jackson wrote:
> Ian Jackson writes ("[PATCH 19/22] libxc: check failure of xc_dom_*_to_ptr,
> xc_map_foreign_range"):
>> The return values from xc_dom_*_to_ptr and xc_map_foreign_range are
>> sometimes dereferenced, or subjected to pointer arithmetic, without
>> checking whether the relevant function failed and returned NULL.
>>
>> Add an appropriate error check at every call site.
> I seem to have missed one. I intend to add this to v8 of the series.
>
> commit 029d07d15fb27ab4b107c961b7ad74701ea623a8
> Author: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
> Date: Thu Jun 13 16:19:58 2013 +0100
>
> xc_exchange_page
>
> diff --git a/.topmsg b/.topmsg
> index f211f1f..4ca5d4f 100644
> --- a/.topmsg
> +++ b/.topmsg
> @@ -12,6 +12,12 @@ This is part of the fix to a security issue, XSA-55.
> Signed-off-by: Ian Jackson <ian.jackson@xxxxxxxxxxxxx>
> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
Again, looks good. Feel free to carry forward my Reviewed-by tag.
~Andrew
>
> +v8: Add a missing check in xc_offline_page.c:xc_exchange_page.
> + I think in this particular error case it may be that the results
> + are a broken guest, but turning this from a possible host tools
> + crash into a guest problem seems to solve the potential security
> + problem.
> +
> v7: Simplify an error DOMPRINTF to not use "load ? : ".
> Make DOMPRINTF allocation error messages consistent.
> Do not set elf->dest_pages in xc_dom_load_elf_kernel
> diff --git a/tools/libxc/xc_offline_page.c b/tools/libxc/xc_offline_page.c
> index 089a361..36b9812 100644
> --- a/tools/libxc/xc_offline_page.c
> +++ b/tools/libxc/xc_offline_page.c
> @@ -714,6 +714,11 @@ int xc_exchange_page(xc_interface *xch, int domid,
> xen_pfn_t mfn)
>
> new_p = xc_map_foreign_range(xch, domid, PAGE_SIZE,
> PROT_READ|PROT_WRITE, new_mfn);
> + if ( new_p == NULL )
> + {
> + ERROR("failed to map new_p for copy, guest may be broken?");
> + goto failed;
> + }
> memcpy(new_p, backup, PAGE_SIZE);
> munmap(new_p, PAGE_SIZE);
> mops.arg1.mfn = new_mfn;
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |