From: Razvan Cojocaru Date: Mon, 18 Feb 2019 12:46:02 +0000 (+0100) Subject: x86/altp2m: fix HVMOP_altp2m_set_domain_state race X-Git-Tag: archive/raspbian/4.14.0+80-gd101b417b7-1+rpi1^2~63^2~2554 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=24d5282527f4647907b3572820b5335c15cd0356;p=xen.git x86/altp2m: fix HVMOP_altp2m_set_domain_state race HVMOP_altp2m_set_domain_state does not domain_pause(), presumably on purpose (as it was originally supposed to cater to a in-guest agent, and a domain pausing itself is not a good idea). This can lead to domain crashes in the vmx_vmexit_handler() code that checks if the guest has the ability to switch EPTP without an exit. That code can __vmread() the host p2m's EPT_POINTER (before HVMOP_altp2m_set_domain_state "for_each_vcpu()" has a chance to run altp2m_vcpu_initialise(), but after d->arch.altp2m_active is set). Signed-off-by: Razvan Cojocaru Acked-by: Jan Beulich Release-acked-by: Juergen Gross --- diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c index 410623d437..79c7d816e2 100644 --- a/xen/arch/x86/hvm/hvm.c +++ b/xen/arch/x86/hvm/hvm.c @@ -4538,6 +4538,10 @@ static int do_altp2m_op( break; } + rc = domain_pause_except_self(d); + if ( rc ) + break; + ostate = d->arch.altp2m_active; d->arch.altp2m_active = !!a.u.domain_state.state; @@ -4556,6 +4560,8 @@ static int do_altp2m_op( if ( ostate ) p2m_flush_altp2m(d); } + + domain_unpause_except_self(d); break; }