[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] Unsigned bug in rdmsr_hypervisor_regs/wrmsr_hypervisor_regs


  • To: xen-devel@xxxxxxxxxxxxxxxxxxx
  • From: "Robert Phillips" <rsp.vi.xen@xxxxxxxxx>
  • Date: Thu, 27 Sep 2007 10:21:27 -0400
  • Delivery-date: Thu, 27 Sep 2007 07:22:07 -0700
  • Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:message-id:date:from:to:subject:mime-version:content-type; b=h+W2Q7naRZqWj+Yjto569Rw7M789v5PDzSxxKMpJbMdQfvMYw1uvFFPD0XifpuTT9zqKedy+u4dXdpBEw5zyT0LzAxaisVClRuwGovpUb7OozALIJ9N7zcrBkw/FXEaDxbOs+aImGWcTFgAFg7T9LC8GM+5EyU9UEJs4ZmqfjzI=
  • List-id: Xen developer discussion <xen-devel.lists.xensource.com>

The code, below, in rdmsr_hypervisor_regs (in xen/arch/x86/traps.c) looks wrong.  (The same code is in wrmsr_hypervisor_regs.)

int rdmsr_hypervisor_regs(
    uint32_t idx, uint32_t *eax, uint32_t *edx)
{
    idx -= 0x40000000;
    if ( idx > 0 )
        return 0;
...

The intent, apparently, is that the function should return zero if the original idx exceeds 0x40000000.
However because idx is unsigned the function will always return zero unless the original idx is precisely 0x40000000.

The effect is that reading or writing any unexpected MSR will cause the guest to get a GPF.
(The intended effect is, I think, reading any MSR less than 0x40000001 should simply return 0
and writing any such MSR should bug.  Injecting a GPF should only happen with MSRs greater than 0x40000000.)

Replacing the test with
   if ( (int32_t)idx > 0 )
 seems to cause problems of its own.

If this change is wrong, what is a proper fix?

-- rsp


--
--------------------------------------------------------------------
Robert S. Phillips                          Virtual Iron Software
rphillips@xxxxxxxxxxxxxxx                Tower 1, Floor 2
978-849-1220                                 900 Chelmsford Street
                                                    Lowell, MA 01851
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.