1. 12 1月, 2011 2 次提交
  2. 02 1月, 2011 1 次提交
  3. 16 12月, 2010 1 次提交
  4. 08 12月, 2010 2 次提交
  5. 06 11月, 2010 3 次提交
    • J
      KVM: x86: Issue smp_call_function_many with preemption disabled · 453d9c57
      Jan Kiszka 提交于
      smp_call_function_many is specified to be called only with preemption
      disabled. Fulfill this requirement.
      Signed-off-by: NJan Kiszka <jan.kiszka@siemens.com>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      453d9c57
    • V
      KVM: x86: fix information leak to userland · 97e69aa6
      Vasiliy Kulikov 提交于
      Structures kvm_vcpu_events, kvm_debugregs, kvm_pit_state2 and
      kvm_clock_data are copied to userland with some padding and reserved
      fields unitialized.  It leads to leaking of contents of kernel stack
      memory.  We have to initialize them to zero.
      
      In patch v1 Jan Kiszka suggested to fill reserved fields with zeros
      instead of memset'ting the whole struct.  It makes sense as these
      fields are explicitly marked as padding.  No more fields need zeroing.
      
      KVM-Stable-Tag.
      Signed-off-by: NVasiliy Kulikov <segooon@gmail.com>
      Signed-off-by: NMarcelo Tosatti <mtosatti@redhat.com>
      97e69aa6
    • M
      KVM: Write protect memory after slot swap · edde99ce
      Michael S. Tsirkin 提交于
      I have observed the following bug trigger:
      
      1. userspace calls GET_DIRTY_LOG
      2. kvm_mmu_slot_remove_write_access is called and makes a page ro
      3. page fault happens and makes the page writeable
         fault is logged in the bitmap appropriately
      4. kvm_vm_ioctl_get_dirty_log swaps slot pointers
      
      a lot of time passes
      
      5. guest writes into the page
      6. userspace calls GET_DIRTY_LOG
      
      At point (5), bitmap is clean and page is writeable,
      thus, guest modification of memory is not logged
      and GET_DIRTY_LOG returns an empty bitmap.
      
      The rule is that all pages are either dirty in the current bitmap,
      or write-protected, which is violated here.
      
      It seems that just moving kvm_mmu_slot_remove_write_access down
      to after the slot pointer swap should fix this bug.
      
      KVM-Stable-Tag.
      Signed-off-by: NMichael S. Tsirkin <mst@redhat.com>
      Signed-off-by: NAvi Kivity <avi@redhat.com>
      edde99ce
  6. 24 10月, 2010 31 次提交