qemu/hw/xen
Jan Beulich 81b23ef82c xen: limit guest control of PCI command register
Otherwise the guest can abuse that control to cause e.g. PCIe
Unsupported Request responses (by disabling memory and/or I/O decoding
and subsequently causing [CPU side] accesses to the respective address
ranges), which (depending on system configuration) may be fatal to the
host.

This is CVE-2015-2756 / XSA-126.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Message-id: alpine.DEB.2.02.1503311510300.7690@kaball.uk.xensource.com
Signed-off-by: Peter Maydell <peter.maydell@linaro.org>
2015-04-09 23:37:21 +01:00
..
Makefile.objs xen: move Xen HVM files under hw/i386/xen 2014-05-07 16:14:56 +00:00
xen_backend.c xen_backend: introduce xenstore_read_uint64 and xenstore_read_fe_uint64 2014-07-07 10:37:40 +00:00
xen_devconfig.c hw: Convert from BlockDriverState to BlockBackend, mostly 2014-10-20 14:02:25 +02:00
xen_pt_config_init.c xen: limit guest control of PCI command register 2015-04-09 23:37:21 +01:00
xen_pt_msi.c memory: remove memory_region_destroy 2014-08-18 12:06:21 +02:00
xen_pt.c xen: limit guest control of PCI command register 2015-04-09 23:37:21 +01:00
xen_pt.h
xen-host-pci-device.c
xen-host-pci-device.h