8292994238
logging upon guest changing callback method (XSA-169) 5677f350-x86-make-debug-output-consistent-in-hvm_set_callback_via.patch - bsc#959387 - VUL-0: CVE-2015-8568 CVE-2015-8567: xen: qemu: net: vmxnet3: host memory leakage CVE-2015-8568-qemuu-net-vmxnet3-avoid-memory-leakage-in-activate_device.patch - bsc#957988 - VUL-0: CVE-2015-8550: xen: paravirtualized drivers incautious about shared memory contents (XSA-155) xsa155-xen-0001-xen-Add-RING_COPY_REQUEST.patch xsa155-xen-0002-blktap2-Use-RING_COPY_REQUEST.patch xsa155-xen-0003-libvchan-Read-prod-cons-only-once.patch xsa155-qemuu-qdisk-double-access.patch xsa155-qemut-qdisk-double-access.patch xsa155-qemuu-xenfb.patch xsa155-qemut-xenfb.patch - bsc#959006 - VUL-0: CVE-2015-8558: xen: qemu: usb: infinite loop in ehci_advance_state results in DoS CVE-2015-8558-qemuu-usb-infinite-loop-in-ehci_advance_state-results-in-DoS.patch - bsc#958918 - VUL-0: CVE-2015-7549: xen: qemu pci: null pointer dereference issue CVE-2015-7549-qemuu-pci-null-pointer-dereference-issue.patch - bsc#958493 - VUL-0: CVE-2015-8504: xen: qemu: ui: vnc: avoid floating point exception CVE-2015-8504-qemuu-vnc-avoid-floating-point-exception.patch CVE-2015-8504-qemut-vnc-avoid-floating-point-exception.patch - bsc#958007 - VUL-0: CVE-2015-8554: xen: qemu-dm buffer overrun in MSI-X handling (XSA-164) xsa164.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=393
39 lines
1.6 KiB
Diff
39 lines
1.6 KiB
Diff
From c1fce65e2b720684ea6ba76ae59921542bd154bb Mon Sep 17 00:00:00 2001
|
|
From: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
|
|
Date: Fri, 20 Nov 2015 12:22:14 -0500
|
|
Subject: [PATCH 3/3] libvchan: Read prod/cons only once.
|
|
|
|
We must ensure that the prod/cons are only read once and that
|
|
the compiler won't try to optimize the reads. That is split
|
|
the read of these in multiple instructions influencing later
|
|
branch code. As such insert barriers when fetching the cons
|
|
and prod index.
|
|
|
|
This is part of XSA155.
|
|
|
|
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
|
|
---
|
|
tools/libvchan/io.c | 2 ++
|
|
1 file changed, 2 insertions(+)
|
|
|
|
Index: xen-4.6.0-testing/tools/libvchan/io.c
|
|
===================================================================
|
|
--- xen-4.6.0-testing.orig/tools/libvchan/io.c
|
|
+++ xen-4.6.0-testing/tools/libvchan/io.c
|
|
@@ -117,6 +117,7 @@ static inline int send_notify(struct lib
|
|
static inline int raw_get_data_ready(struct libxenvchan *ctrl)
|
|
{
|
|
uint32_t ready = rd_prod(ctrl) - rd_cons(ctrl);
|
|
+ xen_mb(); /* Ensure 'ready' is read only once. */
|
|
if (ready > rd_ring_size(ctrl))
|
|
/* We have no way to return errors. Locking up the ring is
|
|
* better than the alternatives. */
|
|
@@ -158,6 +159,7 @@ int libxenvchan_data_ready(struct libxen
|
|
static inline int raw_get_buffer_space(struct libxenvchan *ctrl)
|
|
{
|
|
uint32_t ready = wr_ring_size(ctrl) - (wr_prod(ctrl) - wr_cons(ctrl));
|
|
+ xen_mb(); /* Ensure 'ready' is read only once. */
|
|
if (ready > wr_ring_size(ctrl))
|
|
/* We have no way to return errors. Locking up the ring is
|
|
* better than the alternatives. */
|