Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP2:Update
xen.6649
5a1d5312-x86-replace-bad-ASSERT-in-xatp1.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 5a1d5312-x86-replace-bad-ASSERT-in-xatp1.patch of Package xen.6649
# Commit f33d653f46f5889db7be4fef31d71bc871834c10 # Date 2017-11-28 13:14:10 +0100 # Author Jan Beulich <jbeulich@suse.com> # Committer Jan Beulich <jbeulich@suse.com> x86: replace bad ASSERT() in xenmem_add_to_physmap_one() There are no locks being held, i.e. it is possible to be triggered by racy hypercall invocations. Subsequent code doesn't really depend on the checked values, so this is not a security issue. Signed-off-by: Jan Beulich <jbeulich@suse.com> Acked-by: Andrew Cooper <andrew.cooper3@citrix.com> Acked-by: George Dunlap <george.dunlap@citrix.com> --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -5110,8 +5110,12 @@ int xenmem_add_to_physmap_one( /* Unmap from old location, if any. */ old_gpfn = get_gpfn_from_mfn(mfn); ASSERT( old_gpfn != SHARED_M2P_ENTRY ); - if ( space == XENMAPSPACE_gmfn || space == XENMAPSPACE_gmfn_range ) - ASSERT( old_gpfn == gfn ); + if ( (space == XENMAPSPACE_gmfn || space == XENMAPSPACE_gmfn_range) && + old_gpfn != gfn ) + { + rc = -EXDEV; + goto put_both; + } if ( old_gpfn != INVALID_M2P_ENTRY ) rc = guest_physmap_remove_page(d, old_gpfn, mfn, PAGE_ORDER_4K);
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor