On 21/11/2018 13:21, Andrew Cooper wrote: > This covers various fixes related to XSA-277 which weren't in security > supported areas, and associated cleanup. > > The biggest issue noticed here is that altp2m's use of hardware #VE support > will cause general memory corruption if the guest ever balloons out the VEINFO > page. The only safe way I think of doing this is for Xen to alloc annonymous > domheap pages for the VEINFO, and for the guest to map them in a similar way > to the shared info and grant table frames. > > Andrew Cooper (14): > x86/soft-reset: Drop gfn reference after calling get_gfn_query() > x86/mem-sharing: Don't leave the altp2m lock held when nominating a page > AMD/IOMMU: Fix multiple reference counting errors > x86/p2m: Fix locking in p2m_altp2m_lazy_copy() > x86/p2m: Don't overwrite p2m_altp2m_lazy_copy()'s callers p2m pointer > x86/hvm: Make the altp2m locking easier to follow > x86/p2m: Coding style cleanup > xen/memory: Drop ARM put_gfn() stub > x86/p2m: Switch the two_gfns infrastructure to using gfn_t > x86/mm: Switch {get,put}_gfn() infrastructure to using gfn_t > xen/mm: Switch mfn_to_virt()/virt_to_mfn() to using mfn_t > xen/gnttab: Drop gnttab_create_{shared,status}_page() > xen/gnttab: Simplify gnttab_map_frame() > xen/gnttab: Minor improvements to arch header files
A number of these patches are still pending maintainer review. The p2m patches all need George as the MM maintainer. The AMD/IOMMU patch is all unreachable code, but needs AMD input. The final patch needs ARM input. Given that these are mostly reviewed and non-controversial, it would be nice to get them into 4.12, so I guess at this point I could also do with a release ack. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel