Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP5:Update
xen.19021
xsa280-1.patch
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File xsa280-1.patch of Package xen.19021
Subject: x86/shadow: move OOS flag bit positions From: Jan Beulich jbeulich@suse.com Tue Nov 20 16:04:55 2018 +0100 Date: Tue Nov 20 16:04:55 2018 +0100: Git: 4f3858fcf0022945ec99b88b3becc67e76f304d2 In preparation of reducing struct page_info's shadow_flags field to 16 bits, lower the bit positions used for SHF_out_of_sync and SHF_oos_may_write. Instead of also adjusting the open coded use in _get_page_type(), introduce shadow_prepare_page_type_change() to contain knowledge of the bit positions to shadow code. This is part of XSA-280. Signed-off-by: Jan Beulich <jbeulich@suse.com> Reviewed-by: Tim Deegan <tim@xen.org> master commit: d68e1070c3e8f4af7a31040f08bdd98e6d6eac1d master date: 2018-11-20 14:59:13 +0100 Index: xen-4.7.6-testing/xen/arch/x86/mm.c =================================================================== --- xen-4.7.6-testing.orig/xen/arch/x86/mm.c +++ xen-4.7.6-testing/xen/arch/x86/mm.c @@ -2763,15 +2763,8 @@ static int __get_page_type(struct page_i { struct domain *d = page_get_owner(page); - /* Normally we should never let a page go from type count 0 - * to type count 1 when it is shadowed. One exception: - * out-of-sync shadowed pages are allowed to become - * writeable. */ - if ( d && shadow_mode_enabled(d) - && (page->count_info & PGC_page_table) - && !((page->shadow_flags & (1u<<29)) - && type == PGT_writable_page) ) - shadow_remove_all_shadows(d, _mfn(page_to_mfn(page))); + if ( d && shadow_mode_enabled(d) ) + shadow_prepare_page_type_change(d, page, type); ASSERT(!(x & PGT_pae_xen_l2)); if ( (x & PGT_type_mask) != type ) Index: xen-4.7.6-testing/xen/arch/x86/mm/shadow/common.c =================================================================== --- xen-4.7.6-testing.orig/xen/arch/x86/mm/shadow/common.c +++ xen-4.7.6-testing/xen/arch/x86/mm/shadow/common.c @@ -989,6 +989,9 @@ int sh_unsync(struct vcpu *v, mfn_t gmfn || !v->domain->arch.paging.shadow.oos_active ) return 0; + BUILD_BUG_ON(!(typeof(pg->shadow_flags))SHF_out_of_sync); + BUILD_BUG_ON(!(typeof(pg->shadow_flags))SHF_oos_may_write); + pg->shadow_flags |= SHF_out_of_sync|SHF_oos_may_write; oos_hash_add(v, gmfn); perfc_incr(shadow_unsync); @@ -2888,6 +2891,26 @@ void sh_remove_shadows(struct domain *d, paging_unlock(d); } +void shadow_prepare_page_type_change(struct domain *d, struct page_info *page, + unsigned long new_type) +{ + if ( !(page->count_info & PGC_page_table) ) + return; + +#if (SHADOW_OPTIMIZATIONS & SHOPT_OUT_OF_SYNC) + /* + * Normally we should never let a page go from type count 0 to type + * count 1 when it is shadowed. One exception: out-of-sync shadowed + * pages are allowed to become writeable. + */ + if ( (page->shadow_flags & SHF_oos_may_write) && + new_type == PGT_writable_page ) + return; +#endif + + shadow_remove_all_shadows(d, page_to_mfn(page)); +} + static void sh_remove_all_shadows_and_parents(struct domain *d, mfn_t gmfn) /* Even harsher: this is a HVM page that we thing is no longer a pagetable. Index: xen-4.7.6-testing/xen/arch/x86/mm/shadow/private.h =================================================================== --- xen-4.7.6-testing.orig/xen/arch/x86/mm/shadow/private.h +++ xen-4.7.6-testing/xen/arch/x86/mm/shadow/private.h @@ -287,8 +287,8 @@ static inline void sh_terminate_list(str * codepath is called during that time and is sensitive to oos issues, it may * need to use the second flag. */ -#define SHF_out_of_sync (1u<<30) -#define SHF_oos_may_write (1u<<29) +#define SHF_out_of_sync (1u << (SH_type_max_shadow + 1)) +#define SHF_oos_may_write (1u << (SH_type_max_shadow + 2)) #endif /* (SHADOW_OPTIMIZATIONS & SHOPT_OUT_OF_SYNC) */ Index: xen-4.7.6-testing/xen/include/asm-x86/shadow.h =================================================================== --- xen-4.7.6-testing.orig/xen/include/asm-x86/shadow.h +++ xen-4.7.6-testing/xen/include/asm-x86/shadow.h @@ -81,6 +81,10 @@ void shadow_final_teardown(struct domain void sh_remove_shadows(struct domain *d, mfn_t gmfn, int fast, int all); +/* Adjust shadows ready for a guest page to change its type. */ +void shadow_prepare_page_type_change(struct domain *d, struct page_info *page, + unsigned long new_type); + /* Discard _all_ mappings from the domain's shadows. */ void shadow_blow_tables_per_domain(struct domain *d); @@ -96,6 +100,10 @@ void shadow_blow_tables_per_domain(struc static inline void sh_remove_shadows(struct domain *d, mfn_t gmfn, bool_t fast, bool_t all) {} +static inline void shadow_prepare_page_type_change(struct domain *d, + struct page_info *page, + unsigned long new_type) {} + static inline void shadow_blow_tables_per_domain(struct domain *d) {} static inline int shadow_domctl(struct domain *d, xen_domctl_shadow_op_t *sc,
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor