diff options
| author | Jan Beulich <jbeulich@suse.com> | 2013-05-02 17:19:01 +0200 |
|---|---|---|
| committer | Jan Beulich <jbeulich@suse.com> | 2013-05-02 17:19:01 +0200 |
| commit | a4b2683b11cce70f9bff74d6cb615e8effa2e32f (patch) | |
| tree | 38644539bead4ae608e97f608f04cfe37d073b99 /tools/lib/sys_string.h | |
| parent | 3e5c1c0093013a4274124eee7862f8e41021b220 (diff) | |
| download | xen-a4b2683b11cce70f9bff74d6cb615e8effa2e32f.tar.gz xen-a4b2683b11cce70f9bff74d6cb615e8effa2e32f.tar.bz2 xen-a4b2683b11cce70f9bff74d6cb615e8effa2e32f.zip | |
x86: make page table handling error paths preemptible
... as they may take significant amounts of time.
This requires cloning the tweaked continuation logic from
do_mmuext_op() to do_mmu_update().
Note that in mod_l[34]_entry() a negative "preemptible" value gets
passed to put_page_from_l[34]e() now, telling the callee to store the
respective page in current->arch.old_guest_table (for a hypercall
continuation to pick up), rather than carrying out the put right away.
This is going to be made a little more explicit by a subsequent cleanup
patch.
This is part of CVE-2013-1918 / XSA-45.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Tim Deegan <tim@xen.org>
master commit: b8efae696c9a2d46e91fa0eda739427efc16c250
master date: 2013-05-02 16:39:37 +0200
Diffstat (limited to 'tools/lib/sys_string.h')
0 files changed, 0 insertions, 0 deletions
