|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH for-4.9 v2 00/19] XSA-191 followup
This is the quantity of changes required to fix some edgecases in XSA-191
which were ultimately chosen not to go out in the security fix. The main
purpose of this series is to fix emulation sufficiently to allow patch 19 to
avoid opencoding all of the segmenation logic.
This version of the patches has had some testing in XenServers test
infrastructure and nothing appears to have blown up.
Changes from v1:
* Rework of the safey surrounding software interrupt injection
* 5 new patches (1-2,6,12-13)
* Fix singlestep handling for emulated pagetable/mmcfg writes
Andrew Cooper (19):
x86/shadow: Fix #PFs from emulated writes crossing a page boundary
x86/emul: Drop X86EMUL_CMPXCHG_FAILED
x86/emul: Simplfy emulation state setup
x86/emul: Rename hvm_trap to x86_event and move it into the emulation
infrastructure
x86/emul: Rename HVM_DELIVER_NO_ERROR_CODE to X86_EVENT_NO_EC
x86/pv: Implement pv_inject_{event,page_fault,hw_exception}()
x86/emul: Remove opencoded exception generation
x86/emul: Rework emulator event injection
x86/vmx: Use hvm_{get,set}_segment_register() rather than
vmx_{get,set}_segment_register()
x86/hvm: Reposition the modification of raw segment data from the VMCB/VMCS
x86/emul: Avoid raising faults behind the emulators back
x86/pv: Avoid raising faults behind the emulators back
x86/shadow: Avoid raising faults behind the emulators back
x86/hvm: Extend the hvm_copy_*() API with a pagefault_info pointer
x86/hvm: Reimplement hvm_copy_*_nofault() in terms of no pagefault_info
x86/hvm: Rename hvm_copy_*_guest_virt() to hvm_copy_*_guest_linear()
x86/hvm: Avoid __hvm_copy() raising #PF behind the emulators back
x86/hvm: Prepare to allow use of system segments for memory references
x86/hvm: Use system-segment relative memory accesses
tools/tests/x86_emulator/test_x86_emulator.c | 1 +
xen/arch/x86/hvm/emulate.c | 151 ++++-------
xen/arch/x86/hvm/hvm.c | 367 +++++++++++++++++++--------
xen/arch/x86/hvm/io.c | 4 +-
xen/arch/x86/hvm/nestedhvm.c | 2 +-
xen/arch/x86/hvm/svm/nestedsvm.c | 13 +-
xen/arch/x86/hvm/svm/svm.c | 100 +++-----
xen/arch/x86/hvm/vmx/intr.c | 2 +-
xen/arch/x86/hvm/vmx/realmode.c | 16 +-
xen/arch/x86/hvm/vmx/vmx.c | 109 ++++----
xen/arch/x86/hvm/vmx/vvmx.c | 44 ++--
xen/arch/x86/mm.c | 92 +++++--
xen/arch/x86/mm/shadow/common.c | 40 +--
xen/arch/x86/mm/shadow/multi.c | 87 ++++++-
xen/arch/x86/traps.c | 172 ++++++-------
xen/arch/x86/x86_emulate/x86_emulate.c | 333 +++++++++++++-----------
xen/arch/x86/x86_emulate/x86_emulate.h | 189 +++++++++++---
xen/include/asm-x86/desc.h | 6 +
xen/include/asm-x86/domain.h | 26 ++
xen/include/asm-x86/hvm/emulate.h | 3 -
xen/include/asm-x86/hvm/hvm.h | 86 +++----
xen/include/asm-x86/hvm/support.h | 42 ++-
xen/include/asm-x86/hvm/svm/nestedsvm.h | 6 +-
xen/include/asm-x86/hvm/vcpu.h | 2 +-
xen/include/asm-x86/hvm/vmx/vmx.h | 2 -
xen/include/asm-x86/hvm/vmx/vvmx.h | 4 +-
xen/include/asm-x86/mm.h | 1 -
27 files changed, 1167 insertions(+), 733 deletions(-)
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |