From: Jan Beulich Date: Tue, 22 Nov 2016 19:16:27 +0000 (-0800) Subject: xen: fix ioreq handling X-Git-Url: http://xenbits.xensource.com/gitweb?a=commitdiff_plain;h=37a460ca696381bb14dfbf012d7a062c7c05c324;p=qemu-upstream-4.5-testing.git xen: fix ioreq handling Avoid double fetches and bounds check size to avoid overflowing internal variables. This is XSA-197. Reported-by: yanghongke Signed-off-by: Jan Beulich Reviewed-by: Stefano Stabellini --- diff --git a/xen-hvm.c b/xen-hvm.c index 583efc0e1..ad7d7f598 100644 --- a/xen-hvm.c +++ b/xen-hvm.c @@ -722,6 +722,10 @@ static void cpu_ioreq_pio(ioreq_t *req) { uint32_t i; + if (req->size > sizeof(uint32_t)) { + hw_error("PIO: bad size (%u)", req->size); + } + if (req->dir == IOREQ_READ) { if (!req->data_is_ptr) { req->data = do_inp(req->addr, req->size); @@ -751,6 +755,10 @@ static void cpu_ioreq_move(ioreq_t *req) { uint32_t i; + if (req->size > sizeof(req->data)) { + hw_error("MMIO: bad size (%u)", req->size); + } + if (!req->data_is_ptr) { if (req->dir == IOREQ_READ) { for (i = 0; i < req->count; i++) { @@ -826,11 +834,13 @@ static int handle_buffered_iopage(XenIOState *state) req.df = 1; req.type = buf_req->type; req.data_is_ptr = 0; + xen_rmb(); qw = (req.size == 8); if (qw) { buf_req = &state->buffered_io_page->buf_ioreq[ (state->buffered_io_page->read_pointer + 1) % IOREQ_BUFFER_SLOT_NUM]; req.data |= ((uint64_t)buf_req->data) << 32; + xen_rmb(); } handle_ioreq(&req); @@ -862,7 +872,11 @@ static void cpu_handle_ioreq(void *opaque) handle_buffered_iopage(state); if (req) { - handle_ioreq(req); + ioreq_t copy = *req; + + xen_rmb(); + handle_ioreq(©); + req->data = copy.data; if (req->state != STATE_IOREQ_INPROCESS) { fprintf(stderr, "Badness in I/O request ... not in service?!: "