|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH] x86/svm: Adjust ModRM Mode check in is_invlpg()
Coverity points out that x86_insn_modrm() returns -EINVAL for instructions not
encoded with a ModRM byte. A consequence is that checking != 3 is
insufficient to confirm that &ext was actually written to.
In practice, this check is only used after decode has been successful, and
0f01 will have a ModRM byte.
Use an unsigned < comparison to exclude the -EINVAL case, guaranteeing that
ext is only read if it was filled in by x86_insn_modrm(), which should placate
Coverity.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
CC: Jan Beulich <JBeulich@xxxxxxxx>
CC: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
CC: Suravee Suthikulpanit <suravee.suthikulpanit@xxxxxxx>
RFC. I haven't actually checked that this fixes the issue.
An alternative would be to ASSERT() that x86_insn_modrm() is non-negative, but
I can't nice way of integrating that into the existing logic (without using
the comma operator, and that isn't nice to read).
---
xen/arch/x86/hvm/svm/svm.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c
index ae8e2c4..ff134a5 100644
--- a/xen/arch/x86/hvm/svm/svm.c
+++ b/xen/arch/x86/hvm/svm/svm.c
@@ -2162,7 +2162,7 @@ static bool is_invlpg(const struct x86_emulate_state
*state,
unsigned int ext;
return ctxt->opcode == X86EMUL_OPC(0x0f, 0x01) &&
- x86_insn_modrm(state, NULL, &ext) != 3 &&
+ (unsigned int)x86_insn_modrm(state, NULL, &ext) < 3 &&
(ext & 7) == 7;
}
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |