|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4] Sanity check xsave area when migrating or restoring from older Xen verions
On Tue, 21 Oct 2014 20:00:53 +0100
Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote:
> On 21/10/14 19:40, Don Koch wrote:
> > Xen 4.3 and older transferred a maximum sized xsave area (as if all
> > the available XCR0 bits were set); the new version only transfers
> > based on the actual XCR0 bits. This may result in a smaller area if
> > the last sections were missing (e.g., the LWP area from an AMD
> > machine). If the size doesn't match the XCR0 derived size, the part of
> > the xsave area between the XCR0 specified and transferred size is
> > checked for zero data. If any part of the overflow area is non-zero,
> > we return with an error.
> >
> > Signed-off-by: Don Koch <dkoch@xxxxxxxxxxx>
> > ---
> > Changes in V4:
> > - Removed check of size base on xfeature_mask.
> > - Unsign some ints.
> > - Change %d to %u for unsigned ints.
> > - Move printk to only print if non-zero data found.
> >
> > Changes in V3:
> > - use h->data for zero check
> > - remove max size check (use size that was sent)
> > - fix error message (drop first byte value)
> > - fix "for" issues
> >
> > Changes in V2:
> > - Add check for size.
> > - Add check for non-zero data in unused part of block.
> >
> > xen/arch/x86/hvm/hvm.c | 28 ++++++++++++++++------------
> > 1 file changed, 16 insertions(+), 12 deletions(-)
> >
> > diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
> > index f0e1edc..c2780d2 100644
> > --- a/xen/arch/x86/hvm/hvm.c
> > +++ b/xen/arch/x86/hvm/hvm.c
> > @@ -1971,6 +1971,7 @@ static int hvm_load_cpu_xsave_states(struct domain
> > *d, hvm_domain_context_t *h)
> > struct vcpu *v;
> > struct hvm_hw_cpu_xsave *ctxt;
> > struct hvm_save_descriptor *desc;
> > + unsigned int i, overflow_start;
> >
> > /* Which vcpu is this? */
> > vcpuid = hvm_load_instance(h);
> > @@ -2011,15 +2012,8 @@ static int hvm_load_cpu_xsave_states(struct domain
> > *d, hvm_domain_context_t *h)
> > save_area) + XSTATE_AREA_MIN_SIZE);
> > return -EINVAL;
> > }
> > - size = HVM_CPU_XSAVE_SIZE(xfeature_mask);
> > - if ( desc->length > size )
> > - {
> > - printk(XENLOG_G_WARNING
> > - "HVM%d.%d restore mismatch: xsave length %u > %u\n",
> > - d->domain_id, vcpuid, desc->length, size);
> > - return -EOPNOTSUPP;
> > - }
> > h->cur += sizeof (*desc);
> > + overflow_start = h->cur;
> >
> > ctxt = (struct hvm_hw_cpu_xsave *)&h->data[h->cur];
> > h->cur += desc->length;
> > @@ -2038,10 +2032,20 @@ static int hvm_load_cpu_xsave_states(struct domain
> > *d, hvm_domain_context_t *h)
> > size = HVM_CPU_XSAVE_SIZE(ctxt->xcr0_accum);
> > if ( desc->length > size )
> > {
> > - printk(XENLOG_G_WARNING
> > - "HVM%d.%d restore mismatch: xsave length %u > %u\n",
> > - d->domain_id, vcpuid, desc->length, size);
> > - return -EOPNOTSUPP;
> > + /* Make sure missing bytes are all zero. */
>
> Please make a reference to the bug in this comment, so the reasons for
> the strange check is a little more obvious given a glance at the code.
>
> Perhaps
>
> /*
> * Xen-4.3 and older used to send longer-than-needed xsave regions.
> Permit loading the record if the extra data is all zero
> */
>
> (suitably wrapped, given its natural indentation)
OK, will do.
> > + for ( i = size; i < desc->length; i++ )
> > + {
> > + if ( h->data[overflow_start + i] )
> > + {
> > + printk(XENLOG_G_WARNING
> > + "HVM%u.%u restore mismatch: xsave length %u > %u\n",
> > + d->domain_id, vcpuid, desc->length, size);
> > + printk(XENLOG_G_WARNING
> > + "HVM%u.%u restore mismatch: xsave has non-zero data
> > starting at %#x\n",
> > + d->domain_id, vcpuid, i);
>
> This should be one message. Also note that, while a lot of code gets it
> wrong, domain_id is signed while vcpuid is unsigned.
I had suggested one message. Jan said it should be two.
I'll change it to one combined message (after letting Jan get his say).
Also, after dredging through the includes (and I easily may have taken
a wrong turn) it looks like domain_id in this structure is declared as
a domid_t which is typedefed as an uint16_t. But, I'll change it back to
%d if you insist.
> Perhaps
>
> "HVM%d.%u restore: xsave length %#x > %#x with non-zero data at %#x\n"
>
> It is quite unhelpful to report 3 related numbers, two in one base with
> one in a different base. I feel hex is more useful here, when comparing
> the offsets against the manuals.
Sounds good to me.
> ~Andrew
Thanks,
-d
> > + return -EOPNOTSUPP;
> > + }
> > + }
> > }
> > /* Checking finished */
> >
>
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |