From mboxrd@z Thu Jan 1 00:00:00 1970 From: "Jan Beulich" Subject: Re: Xen 4.0.0-rc7 problem/hang with vt-d DMAR parsing Date: Thu, 25 Mar 2010 09:16:08 +0000 Message-ID: <4BAB37E80200007800036DB1@vpn.id2.novell.com> References: <20100323193748.GW1878@reaktio.net> <20100323200515.GZ1878@reaktio.net> <4BA9DA400200007800036ABB@vpn.id2.novell.com> <4BA9D512.9090902@intel.com> <4BA9ED8D0200007800036B3F@vpn.id2.novell.com> <4BA9F0C1.7080809@intel.com> <4BAA01560200007800036B9B@vpn.id2.novell.com> <4BAAB488.3020007@intel.com> <4BAB304A0200007800036D8B@vpn.id2.novell.com> <4BAB2775.5010208@intel.com> Mime-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: quoted-printable Return-path: In-Reply-To: <4BAB2775.5010208@intel.com> Content-Disposition: inline List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Weidong Han Cc: "xen-devel@lists.xensource.com" , Keir Fraser , Dexuan Cui List-Id: xen-devel@lists.xenproject.org >>> Weidong Han 25.03.10 10:05 >>> >Ok. Updated the patch according to your suggestion. Thanks. Looks good to me, and I would ack it if I didn't (sorry, only now) notice that it can't be against -unstable: The patch seems to be against code which doesn't have an ACPI_DMAR_RHSA case in acpi_parse_dmar(). Quite odd... Jan >>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> diff -r a4eac162dcb9 xen/drivers/passthrough/vtd/dmar.c --- a/xen/drivers/passthrough/vtd/dmar.c Thu Mar 25 01:05:03 2010 +0800 +++ b/xen/drivers/passthrough/vtd/dmar.c Fri Mar 26 01:59:55 2010 +0800 @@ -659,26 +659,71 @@ static int __init acpi_parse_dmar(struct while ( ((unsigned long)entry_header) < (((unsigned long)dmar) + table->length) ) { + if ( entry_header->length < sizeof(struct acpi_dmar_entry_header) = ) + { + dprintk(XENLOG_ERR VTDPREFIX, + "Invalid ACPI DMAR entry length: 0x%x\n", + entry_header->length); + ret =3D -EINVAL; + break; + } + switch ( entry_header->type ) { case ACPI_DMAR_DRHD: if ( iommu_verbose ) dprintk(VTDPREFIX, "found ACPI_DMAR_DRHD:\n"); + + if ( entry_header->length < sizeof(struct acpi_table_drhd) ) + { + dprintk(XENLOG_ERR VTDPREFIX, + " Invalid length: 0x%x\n", entry_header->length);= + ret =3D -EINVAL; + break; + } + ret =3D acpi_parse_one_drhd(entry_header); break; case ACPI_DMAR_RMRR: if ( iommu_verbose ) dprintk(VTDPREFIX, "found ACPI_DMAR_RMRR:\n"); + + if ( entry_header->length < sizeof(struct acpi_table_rmrr) ) + { + dprintk(XENLOG_ERR VTDPREFIX, + " Invalid length: 0x%x\n", entry_header->length);= + ret =3D -EINVAL; + break; + } + ret =3D acpi_parse_one_rmrr(entry_header); break; case ACPI_DMAR_ATSR: if ( iommu_verbose ) dprintk(VTDPREFIX, "found ACPI_DMAR_ATSR:\n"); + + if ( entry_header->length < sizeof(struct acpi_table_atsr) ) + { + dprintk(XENLOG_ERR VTDPREFIX, + " Invalid length: 0x%x\n", entry_header->length);= + ret =3D -EINVAL; + break; + } + ret =3D acpi_parse_one_atsr(entry_header); break; default: