xen/pciback: Save xen_pci_op commands before processing it
authorKonrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Mon, 16 Nov 2015 17:40:48 +0000 (12:40 -0500)
committerZefan Li <lizefan@huawei.com>
Wed, 26 Oct 2016 15:15:40 +0000 (23:15 +0800)
commit550fe2571866702ec3951ad67574175fcd0bf9e7
tree61afefe1c299719dadc726f0474b6df3a482a1fe
parenta7bc1af57e5a08e579b165df87ba446de0f7b476
xen/pciback: Save xen_pci_op commands before processing it

commit 8135cf8b092723dbfcc611fe6fdcb3a36c9951c5 upstream.

Double fetch vulnerabilities that happen when a variable is
fetched twice from shared memory but a security check is only
performed the first time.

The xen_pcibk_do_op function performs a switch statements on the op->cmd
value which is stored in shared memory. Interestingly this can result
in a double fetch vulnerability depending on the performed compiler
optimization.

This patch fixes it by saving the xen_pci_op command before
processing it. We also use 'barrier' to make sure that the
compiler does not perform any optimization.

This is part of XSA155.

Reviewed-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Jan Beulich <JBeulich@suse.com>
Signed-off-by: David Vrabel <david.vrabel@citrix.com>
Signed-off-by: Konrad Rzeszutek Wilk <konrad.wilk@oracle.com>
Signed-off-by: Zefan Li <lizefan@huawei.com>
drivers/xen/xen-pciback/pciback.h
drivers/xen/xen-pciback/pciback_ops.c