|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4] Sanity check xsave area when migrating or restoring from older Xen verions
On 22/10/14 14:19, Don Koch wrote:
> On Wed, 22 Oct 2014 11:00:52 +0100
> Jan Beulich <JBeulich@xxxxxxxx> wrote:
>
>>>>> On 21.10.14 at 21:25, <dkoch@xxxxxxxxxxx> wrote:
>>> On Tue, 21 Oct 2014 20:00:53 +0100
>>> Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote:
>>>
>>>> On 21/10/14 19:40, Don Koch wrote:
>>>>> Xen 4.3 and older transferred a maximum sized xsave area (as if all
>>>>> the available XCR0 bits were set); the new version only transfers
>>>>> based on the actual XCR0 bits. This may result in a smaller area if
>>>>> the last sections were missing (e.g., the LWP area from an AMD
>>>>> machine). If the size doesn't match the XCR0 derived size, the part of
>>>>> the xsave area between the XCR0 specified and transferred size is
>>>>> checked for zero data. If any part of the overflow area is non-zero,
>>>>> we return with an error.
>>>>>
>>>>> Signed-off-by: Don Koch <dkoch@xxxxxxxxxxx>
>>>>> ---
>>>>> Changes in V4:
>>>>> - Removed check of size base on xfeature_mask.
>>>>> - Unsign some ints.
>>>>> - Change %d to %u for unsigned ints.
>>>>> - Move printk to only print if non-zero data found.
>>>>>
>>>>> Changes in V3:
>>>>> - use h->data for zero check
>>>>> - remove max size check (use size that was sent)
>>>>> - fix error message (drop first byte value)
>>>>> - fix "for" issues
>>>>>
>>>>> Changes in V2:
>>>>> - Add check for size.
>>>>> - Add check for non-zero data in unused part of block.
>>>>>
>>>>> xen/arch/x86/hvm/hvm.c | 28 ++++++++++++++++------------
>>>>> 1 file changed, 16 insertions(+), 12 deletions(-)
>>>>>
>>>>> diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
>>>>> index f0e1edc..c2780d2 100644
>>>>> --- a/xen/arch/x86/hvm/hvm.c
>>>>> +++ b/xen/arch/x86/hvm/hvm.c
>>>>> @@ -1971,6 +1971,7 @@ static int hvm_load_cpu_xsave_states(struct domain
>>>>> *d,
>>> hvm_domain_context_t *h)
>>>>> struct vcpu *v;
>>>>> struct hvm_hw_cpu_xsave *ctxt;
>>>>> struct hvm_save_descriptor *desc;
>>>>> + unsigned int i, overflow_start;
>>>>>
>>>>> /* Which vcpu is this? */
>>>>> vcpuid = hvm_load_instance(h);
>>>>> @@ -2011,15 +2012,8 @@ static int hvm_load_cpu_xsave_states(struct domain
>>> *d, hvm_domain_context_t *h)
>>>>> save_area) + XSTATE_AREA_MIN_SIZE);
>>>>> return -EINVAL;
>>>>> }
>>>>> - size = HVM_CPU_XSAVE_SIZE(xfeature_mask);
>>>>> - if ( desc->length > size )
>>>>> - {
>>>>> - printk(XENLOG_G_WARNING
>>>>> - "HVM%d.%d restore mismatch: xsave length %u > %u\n",
>>>>> - d->domain_id, vcpuid, desc->length, size);
>>>>> - return -EOPNOTSUPP;
>>>>> - }
>>>>> h->cur += sizeof (*desc);
>>>>> + overflow_start = h->cur;
>>>>>
>>>>> ctxt = (struct hvm_hw_cpu_xsave *)&h->data[h->cur];
>>>>> h->cur += desc->length;
>>>>> @@ -2038,10 +2032,20 @@ static int hvm_load_cpu_xsave_states(struct
>>>>> domain
>>> *d, hvm_domain_context_t *h)
>>>>> size = HVM_CPU_XSAVE_SIZE(ctxt->xcr0_accum);
>>>>> if ( desc->length > size )
>>>>> {
>>>>> - printk(XENLOG_G_WARNING
>>>>> - "HVM%d.%d restore mismatch: xsave length %u > %u\n",
>>>>> - d->domain_id, vcpuid, desc->length, size);
>>>>> - return -EOPNOTSUPP;
>>>>> + /* Make sure missing bytes are all zero. */
>>>> Please make a reference to the bug in this comment, so the reasons for
>>>> the strange check is a little more obvious given a glance at the code.
>>>>
>>>> Perhaps
>>>>
>>>> /*
>>>> * Xen-4.3 and older used to send longer-than-needed xsave regions.
>>>> Permit loading the record if the extra data is all zero
>>>> */
>>>>
>>>> (suitably wrapped, given its natural indentation)
>>> OK, will do.
>>>
>>>>> + for ( i = size; i < desc->length; i++ )
>>>>> + {
>>>>> + if ( h->data[overflow_start + i] )
>>>>> + {
>>>>> + printk(XENLOG_G_WARNING
>>>>> + "HVM%u.%u restore mismatch: xsave length %u >
>>>>> %u\n",
>>>>> + d->domain_id, vcpuid, desc->length, size);
>>>>> + printk(XENLOG_G_WARNING
>>>>> + "HVM%u.%u restore mismatch: xsave has non-zero
>>>>> data starting at %#x\n",
>>>>> + d->domain_id, vcpuid, i);
>>>> This should be one message. Also note that, while a lot of code gets it
>>>> wrong, domain_id is signed while vcpuid is unsigned.
>>> I had suggested one message. Jan said it should be two.
>> Right, and I still think it should be two. Just not the way you did it.
>> I specifically said in the reply to the previous version " just add your
>> new check ahead of the existing printk()". In case this was ambiguous
>> to you - I think the pre-existing printk() should continue to get
>> issued (even if not being on an error path anymore) so that we have
>> some kind of indication that the truncating path was taken. After all
>> this shouldn't happen frequently, considering that the most recent
>> stable releases of the older branches already don't do this anymore.
> I thought that's where I had it. If the block size mismatch is detected,
> issue the first message then go into the loop to check for non-zero data
> and, if any is found, then issue the second and exit.
>
> Andrew, IIUC, didn't want the first one issued unless the non-zero data
> case was found, i.e. issue no message unless both conditions were met.
>
> So, which should I do?
On consideration, having the unconditional overly-long error will be
useful for debugging purposes, so best to keep it, independently of the
"and non-zero data" error.
~Andrew
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |