vcpu_altp2m(v).p2midx can become INVALID_ALTP2M with normal usage (in altp2m_vcpu_reset()), which can then result in that value being __vmwritten() in EPTP_INDEX by vmx_vcpu_update_eptp(). The value can then end up being __vmread() in vmx_vmexit_handler() which then calls BUG_ON(idx >= MAX_ALTP2M). Since MAX_ALTP2M is currently 10 and INVALID_ALTP2M is #defined as 0xffff, the domain will always crash in this case.
Signed-off-by: Razvan Cojocaru <rcojoc...@bitdefender.com> --- Cc: Jun Nakajima <jun.nakaj...@intel.com> Cc: Kevin Tian <kevin.t...@intel.com> Cc: Jan Beulich <jbeul...@suse.com> Cc: Andrew Cooper <andrew.coop...@citrix.com> Cc: Tamas K Lengyel <ta...@tklengyel.com> --- xen/arch/x86/hvm/vmx/vmx.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c index 9707514..c7f3925 100644 --- a/xen/arch/x86/hvm/vmx/vmx.c +++ b/xen/arch/x86/hvm/vmx/vmx.c @@ -3592,7 +3592,7 @@ void vmx_vmexit_handler(struct cpu_user_regs *regs) } } - if ( idx != vcpu_altp2m(v).p2midx ) + if ( idx != INVALID_ALTP2M && idx != vcpu_altp2m(v).p2midx ) { BUG_ON(idx >= MAX_ALTP2M); atomic_dec(&p2m_get_altp2m(v)->active_vcpus); -- 2.7.4 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel