[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH 0/8] x86: XSA-40{1,2,8} follow-up
- To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Jan Beulich <jbeulich@xxxxxxxx>
- Date: Tue, 26 Jul 2022 17:58:52 +0200
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jLOj6yoCnkqIWB4fGvFMXNthb57eDnQEkou6bf1+w1Q=; b=LlNUwyG/2F/Gi9pT7dUHvXSWCQTzB91Ak7YH2VO41wtBWgiLvOVsiamaKdH8jMi5JirxXlTkGkZGzYWeBAIgyOSOvcxSL+684jVIjMdRnYC9S25yePZLcmceNVQU+b+3nW0+Xr8GNgeUTv3Cj2evZQlOa/7uQwYkTK0JW3tUrSoN+ainvI/R3DML/iocO3r5aYSMGhbfBAjKoGGz/CfwhxEGqOnQEgRpb7+4jad65fUVinPrY/2TMq1ovXzNh1F8NZFNTSfnD3dP5V4+mRjr8XjP8X8IwOWfLLKyztqLL4W9OwNAkqSI4DDgEGMbKxhmtvGQ5AeakyTSBEjxoRMnrw==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JEiDuMz00USppvBuL+2buMmzx5u2V7ohqMJ98LeyQ3G7TfEjeUncn6v6LtZX95ngbq7rMGKBbzXu6se9Ez5qf63Va5vRFK3S7qXvSGeeiYl2TqiVUrUVPCt4OLkYnEaaL4nPj4Ag0lp488uN8o1QS907Z5rWe3zVK4eqEm0sZK98TZMrmPIrQc3wq5n4CNeBY4L9hCBKfHx4JCf7Ihaxl0kJW+bPO+n5TsFqQj2Bx2v1F5PeU+SR3WSHIbhOOGTeH0IzvTAiJwR3luNet/pmz+40lUwLyp3rp6d6lG14NsAVPhysaRvcntD9mVApcpIagzgbmbSZ0jZo2HEpztzUOA==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
- Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Tim Deegan <tim@xxxxxxx>
- Delivery-date: Tue, 26 Jul 2022 15:59:11 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
Perhaps not entirely unexpected the work there has turned up a few
further items which want dealing with. Most if not all of these
aren't interdependent, so could probably be looked at (and go in)
in (about) any order.
There's one more change I'd like to make, but I didn't get around
to making (trying to make) yet: PGC_page_table being a shadow-only
concept, it can apparently simply be 0 when !SHADOW_PAGING.
1: shadow: drop shadow_prepare_page_type_change()'s 3rd parameter
2: shadow: properly handle get_page() failing
3: mm: enforce return value checking on get_page()
4: shadow: exclude HVM-only code from sh_remove_shadows() when !HVM
5: shadow: don't open-code shadow_remove_all_shadows()
6: shadow: drop CONFIG_HVM conditionals from sh_update_cr3()
7: mm: adjust type check around _get_page_type()'s TLB flush
8: mm: re-arrange type check around _get_page_type()'s TLB flush
Jan
|