x86: fix various issues with handling guest IRQs
authorJan Beulich <jbeulich@suse.com>
Thu, 18 Apr 2013 14:11:23 +0000 (16:11 +0200)
committerJan Beulich <jbeulich@suse.com>
Thu, 18 Apr 2013 14:11:23 +0000 (16:11 +0200)
commit545607eb3cfeb2abf5742d1bb869734f317fcfe5
tree6039c103db155c2f36625ffd75d7262d5dfdc5c4
parentfdac9515607b757c044e7ef0d61b1453ef999b08
x86: fix various issues with handling guest IRQs

- properly revoke IRQ access in map_domain_pirq() error path
- don't permit replacing an in use IRQ
- don't accept inputs in the GSI range for MAP_PIRQ_TYPE_MSI
- track IRQ access permission in host IRQ terms, not guest IRQ ones
  (and with that, also disallow Dom0 access to IRQ0)

This is CVE-2013-1919 / XSA-46.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
tools/libxl/libxl_create.c
tools/python/xen/xend/server/irqif.py
xen/arch/x86/domain_build.c
xen/arch/x86/domctl.c
xen/arch/x86/irq.c
xen/arch/x86/physdev.c
xen/common/domctl.c
xen/common/event_channel.c
xen/include/xen/iocap.h