[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[xen stable-4.16] xen/sysctl: fix XEN_SYSCTL_getdomaininfolist handling with XSM



commit aa2c921c1ec8edf6149d616380a916a36275112b
Author:     Juergen Gross <jgross@xxxxxxxx>
AuthorDate: Tue May 23 15:00:59 2023 +0200
Commit:     Jan Beulich <jbeulich@xxxxxxxx>
CommitDate: Tue May 23 15:00:59 2023 +0200

    xen/sysctl: fix XEN_SYSCTL_getdomaininfolist handling with XSM
    
    In case XSM is active, the handling of XEN_SYSCTL_getdomaininfolist
    can fail if the last domain scanned isn't allowed to be accessed by
    the calling domain (i.e. xsm_getdomaininfo(XSM_HOOK, d) is failing).
    
    Fix that by just ignoring scanned domains where xsm_getdomaininfo()
    is returning an error, like it is effectively done when such a
    situation occurs for a domain not being the last one scanned.
    
    Fixes: d046f361dc93 ("Xen Security Modules: XSM")
    Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
    Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
    master commit: b033eddc9779109c06a26936321d27a2ef4e088b
    master date: 2023-05-02 12:04:58 +0200
---
 xen/common/sysctl.c | 3 +--
 1 file changed, 1 insertion(+), 2 deletions(-)

diff --git a/xen/common/sysctl.c b/xen/common/sysctl.c
index 1ad3c29351..5ed60f4696 100644
--- a/xen/common/sysctl.c
+++ b/xen/common/sysctl.c
@@ -89,8 +89,7 @@ long do_sysctl(XEN_GUEST_HANDLE_PARAM(xen_sysctl_t) u_sysctl)
             if ( num_domains == op->u.getdomaininfolist.max_domains )
                 break;
 
-            ret = xsm_getdomaininfo(XSM_HOOK, d);
-            if ( ret )
+            if ( xsm_getdomaininfo(XSM_HOOK, d) )
                 continue;
 
             getdomaininfo(d, &info);
--
generated by git-patchbot for /home/xen/git/xen.git#stable-4.16



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.