[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 00/14] XSA-277 followup
This covers various fixes related to XSA-277 which weren't in security supported areas, and associated cleanup. The biggest issue noticed here is that altp2m's use of hardware #VE support will cause general memory corruption if the guest ever balloons out the VEINFO page. The only safe way I think of doing this is for Xen to alloc annonymous domheap pages for the VEINFO, and for the guest to map them in a similar way to the shared info and grant table frames. Andrew Cooper (14): x86/soft-reset: Drop gfn reference after calling get_gfn_query() x86/mem-sharing: Don't leave the altp2m lock held when nominating a page AMD/IOMMU: Fix multiple reference counting errors x86/p2m: Fix locking in p2m_altp2m_lazy_copy() x86/p2m: Don't overwrite p2m_altp2m_lazy_copy()'s callers p2m pointer x86/hvm: Make the altp2m locking easier to follow x86/p2m: Coding style cleanup xen/memory: Drop ARM put_gfn() stub x86/p2m: Switch the two_gfns infrastructure to using gfn_t x86/mm: Switch {get,put}_gfn() infrastructure to using gfn_t xen/mm: Switch mfn_to_virt()/virt_to_mfn() to using mfn_t xen/gnttab: Drop gnttab_create_{shared,status}_page() xen/gnttab: Simplify gnttab_map_frame() xen/gnttab: Minor improvements to arch header files xen/arch/arm/alternative.c | 4 - xen/arch/arm/cpuerrata.c | 4 - xen/arch/arm/domain_build.c | 4 - xen/arch/arm/livepatch.c | 4 - xen/arch/arm/mm.c | 6 - xen/arch/arm/setup.c | 4 +- xen/arch/x86/cpu/mcheck/mcaction.c | 2 +- xen/arch/x86/cpu/mcheck/mce.c | 14 +- xen/arch/x86/cpu/mcheck/vmce.c | 4 +- xen/arch/x86/cpu/mcheck/vmce.h | 2 +- xen/arch/x86/debug.c | 6 +- xen/arch/x86/domain.c | 23 ++-- xen/arch/x86/domain_page.c | 10 +- xen/arch/x86/domctl.c | 8 +- xen/arch/x86/guest/xen.c | 2 +- xen/arch/x86/hvm/dm.c | 12 +- xen/arch/x86/hvm/dom0_build.c | 4 +- xen/arch/x86/hvm/emulate.c | 16 +-- xen/arch/x86/hvm/grant_table.c | 4 +- xen/arch/x86/hvm/hvm.c | 50 +++---- xen/arch/x86/hvm/mtrr.c | 2 +- xen/arch/x86/hvm/svm/svm.c | 2 +- xen/arch/x86/hvm/vmx/vmx.c | 7 +- xen/arch/x86/mm.c | 25 ++-- xen/arch/x86/mm/hap/hap.c | 2 +- xen/arch/x86/mm/hap/nested_hap.c | 6 +- xen/arch/x86/mm/mem_access.c | 5 +- xen/arch/x86/mm/mem_sharing.c | 33 ++--- xen/arch/x86/mm/p2m.c | 115 ++++++++-------- xen/arch/x86/mm/shadow/common.c | 4 +- xen/arch/x86/mm/shadow/multi.c | 68 +++++----- xen/arch/x86/mm/shadow/types.h | 4 - xen/arch/x86/numa.c | 2 +- xen/arch/x86/pv/descriptor-tables.c | 2 +- xen/arch/x86/pv/dom0_build.c | 5 +- xen/arch/x86/pv/shim.c | 3 - xen/arch/x86/setup.c | 10 +- xen/arch/x86/srat.c | 2 +- xen/arch/x86/tboot.c | 4 +- xen/arch/x86/x86_64/mm.c | 10 +- xen/common/domctl.c | 2 +- xen/common/efi/boot.c | 7 +- xen/common/grant_table.c | 46 ++++--- xen/common/memory.c | 39 ++++-- xen/common/page_alloc.c | 10 +- xen/common/tmem.c | 2 +- xen/common/trace.c | 20 +-- xen/common/xenoprof.c | 4 - xen/drivers/acpi/osl.c | 2 +- xen/drivers/passthrough/amd/iommu_guest.c | 218 +++++++++++++++++++----------- xen/include/asm-arm/grant_table.h | 18 +-- xen/include/asm-arm/mm.h | 8 +- xen/include/asm-x86/grant_table.h | 23 +--- xen/include/asm-x86/guest_pt.h | 4 - xen/include/asm-x86/mm.h | 2 +- xen/include/asm-x86/p2m.h | 128 ++++++++++-------- xen/include/asm-x86/page.h | 4 +- xen/include/xen/domain_page.h | 6 +- 58 files changed, 533 insertions(+), 504 deletions(-) -- 2.1.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |