xen: limit guest control of PCI command register
commit81b23ef82cd1be29ca3d69ab7e98b5b5e55926ce
authorJan Beulich <jbeulich@suse.com>
Tue, 31 Mar 2015 14:18:03 +0000 (31 15:18 +0100)
committerPeter Maydell <peter.maydell@linaro.org>
Thu, 9 Apr 2015 22:37:21 +0000 (9 23:37 +0100)
tree32abd64c12c5e0b8da5e524da43bad71095bbda2
parent6a460ed18a3fda0eb2d9c96b8b01817b4dcbded4
xen: limit guest control of PCI command register

Otherwise the guest can abuse that control to cause e.g. PCIe
Unsupported Request responses (by disabling memory and/or I/O decoding
and subsequently causing [CPU side] accesses to the respective address
ranges), which (depending on system configuration) may be fatal to the
host.

This is CVE-2015-2756 / XSA-126.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Message-id: alpine.DEB.2.02.1503311510300.7690@kaball.uk.xensource.com
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
hw/xen/xen_pt.c
hw/xen/xen_pt_config_init.c