lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <4DAED9EC.5080604@redhat.com>
Date:	Wed, 20 Apr 2011 16:04:44 +0300
From:	Avi Kivity <avi@...hat.com>
To:	Nelson Elhage <nelhage@...lice.com>
CC:	kvm@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v2] KVM: emulator: Use linearize() when fetching instructions.

On 04/18/2011 07:05 PM, Nelson Elhage wrote:
> Since segments need to be handled slightly differently when fetching
> instructions, we add a __linearize helper that accepts a new 'fetch' boolean.

>   static int segmented_read_std(struct x86_emulate_ctxt *ctxt,
>   			      struct segmented_address addr,
>   			      void *data,
> @@ -637,11 +646,13 @@ static int do_fetch_insn_byte(struct x86_emulate_ctxt *ctxt,
>   	int size, cur_size;
>
>   	if (eip == fc->end) {
> -		unsigned long linear = eip + ctxt->cs_base;
> -		if (ctxt->mode != X86EMUL_MODE_PROT64)
> -			linear&= (u32)-1;
> +		unsigned long linear;
> +		struct segmented_address addr = {VCPU_SREG_CS, eip};
>   		cur_size = fc->end - fc->start;
>   		size = min(15UL - cur_size, PAGE_SIZE - offset_in_page(eip));

Breaks immediately - the segmented_address initializer is backwards.  
I've fixed this in my tree.

-- 
error compiling committee.c: too many arguments to function

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ