[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen stable-4.9] x86/mm: L1TF checks don't leave a partial entry
commit bc20fb19475a9d9eb5b2d675bfa509e7743d13de Author: George Dunlap <george.dunlap@xxxxxxxxxx> AuthorDate: Mon Nov 4 15:02:49 2019 +0100 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Mon Nov 4 15:02:49 2019 +0100 x86/mm: L1TF checks don't leave a partial entry On detection of a potential L1TF issue, most validation code returns -ERESTART to allow the switch to shadow mode to happen and cause the original operation to be restarted. However, in the validation code, the return value -ERESTART has been repurposed to indicate 1) the function has partially completed something which needs to be undone, and 2) calling put_page_type() should cleanly undo it. This causes problems in several places. For L1 tables, on receiving an -ERESTART return from alloc_l1_table(), alloc_page_type() will set PGT_partial on the page. If for some reason the original operation never restarts, then on domain destruction, relinquish_memory() will call free_page_type() on the page. Unfortunately, alloc_ and free_l1_table() aren't set up to deal with PGT_partial. When returning a failure, alloc_l1_table() always de-validates whatever it's validated so far, and free_l1_table() always devalidates the whole page. This means that if relinquish_memory() calls free_page_type() on an L1 that didn't complete due to an L1TF, it will call put_page_from_l1e() on "page entries" that have never been validated. For L2+ tables, setting rc to ERESTART causes the rest of the alloc_lN_table() function to *think* that the entry in question will have PGT_partial set. This will cause it to set partial_pte = 1. If relinqush_memory() then calls free_page_type() on one of those pages, then free_lN_table() will call put_page_from_lNe() on the entry when it shouldn't. Rather than indicating -ERESTART, indicate -EINTR. This is the code to indicate that nothing has changed from when you started the call (which is effectively how alloc_l1_table() handles errors). mod_lN_entry() shouldn't have any of these types of problems, so leave potential changes there for a clean-up patch later. This is part of XSA-299. Reported-by: George Dunlap <george.dunlap@xxxxxxxxxx> Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: 3165ffef09e89d38f84d26051f606d2c1421aea3 master date: 2019-10-31 16:11:12 +0100 --- xen/arch/x86/mm.c | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index bdc2682154..b5de6c108a 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -1257,7 +1257,7 @@ get_page_from_l2e( int rc; if ( !(l2e_get_flags(l2e) & _PAGE_PRESENT) ) - return pv_l1tf_check_l2e(d, l2e) ? -ERESTART : 1; + return pv_l1tf_check_l2e(d, l2e) ? -EINTR : 1; if ( unlikely((l2e_get_flags(l2e) & L2_DISALLOW_MASK)) ) { @@ -1300,7 +1300,7 @@ get_page_from_l3e( int rc; if ( !(l3e_get_flags(l3e) & _PAGE_PRESENT) ) - return pv_l1tf_check_l3e(d, l3e) ? -ERESTART : 1; + return pv_l1tf_check_l3e(d, l3e) ? -EINTR : 1; if ( unlikely((l3e_get_flags(l3e) & l3_disallow_mask(d))) ) { @@ -1327,7 +1327,7 @@ get_page_from_l4e( int rc; if ( !(l4e_get_flags(l4e) & _PAGE_PRESENT) ) - return pv_l1tf_check_l4e(d, l4e) ? -ERESTART : 1; + return pv_l1tf_check_l4e(d, l4e) ? -EINTR : 1; if ( unlikely((l4e_get_flags(l4e) & L4_DISALLOW_MASK)) ) { @@ -1593,7 +1593,7 @@ static int alloc_l1_table(struct page_info *page) { if ( !(l1e_get_flags(pl1e[i]) & _PAGE_PRESENT) ) { - ret = pv_l1tf_check_l1e(d, pl1e[i]) ? -ERESTART : 0; + ret = pv_l1tf_check_l1e(d, pl1e[i]) ? -EINTR : 0; if ( ret ) goto out; } -- generated by git-patchbot for /home/xen/git/xen.git#stable-4.9 _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |