|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] common/sysctl: Zero structures on the stack
None of these structures currently contain a hole. However, there is a risk
that a change to the structure might introduce a hole, and thus create a
hypervisor stack leak to the toolstack.
Mitigate this risk by preemptively zeroing these structures. These are not
hotpaths, so the slight overhead is not an issue.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
CC: Keir Fraser <keir@xxxxxxx>
CC: Jan Beulich <JBeulich@xxxxxxxx>
---
This is a result of my audit following XSA-132
---
xen/common/sysctl.c | 9 +++++----
1 file changed, 5 insertions(+), 4 deletions(-)
diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index 65798a3..7361064 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -144,7 +144,7 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
u_sysctl)
case XEN_SYSCTL_getcpuinfo:
{
uint32_t i, nr_cpus;
- struct xen_sysctl_cpuinfo cpuinfo;
+ struct xen_sysctl_cpuinfo cpuinfo = { 0 };
nr_cpus = min(op->u.getcpuinfo.max_cpus, nr_cpu_ids);
@@ -283,6 +283,8 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
u_sysctl)
if ( do_meminfo || do_distance )
{
+ xen_sysctl_meminfo_t meminfo = { 0 };
+
if ( ni->num_nodes < num_nodes )
{
ret = -ENOBUFS;
@@ -293,7 +295,6 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
u_sysctl)
for ( ; i < num_nodes; i++ )
{
- xen_sysctl_meminfo_t meminfo;
static uint32_t distance[MAX_NUMNODES];
if ( do_meminfo )
@@ -355,6 +356,8 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
u_sysctl)
num_cpus = cpumask_last(&cpu_online_map) + 1;
if ( !guest_handle_is_null(ti->cputopo) )
{
+ xen_sysctl_cputopo_t cputopo = { 0 };
+
if ( ti->num_cpus < num_cpus )
{
ret = -ENOBUFS;
@@ -365,8 +368,6 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t)
u_sysctl)
for ( ; i < num_cpus; i++ )
{
- xen_sysctl_cputopo_t cputopo;
-
if ( cpu_present(i) )
{
cputopo.core = cpu_to_core(i);
--
1.7.10.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |