File 5a1d5312-x86-replace-bad-ASSERT-in-xatp1.patch of Package xen.7317
# Commit f33d653f46f5889db7be4fef31d71bc871834c10
# Date 2017-11-28 13:14:10 +0100
# Author Jan Beulich <jbeulich@suse.com>
# Committer Jan Beulich <jbeulich@suse.com>
x86: replace bad ASSERT() in xenmem_add_to_physmap_one()
There are no locks being held, i.e. it is possible to be triggered by
racy hypercall invocations. Subsequent code doesn't really depend on the
checked values, so this is not a security issue.
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Andrew Cooper <andrew.cooper3@citrix.com>
Acked-by: George Dunlap <george.dunlap@citrix.com>
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -4919,8 +4919,12 @@ int xenmem_add_to_physmap_one(
/* Unmap from old location, if any. */
old_gpfn = get_gpfn_from_mfn(mfn);
ASSERT( old_gpfn != SHARED_M2P_ENTRY );
- if ( space == XENMAPSPACE_gmfn || space == XENMAPSPACE_gmfn_range )
- ASSERT( old_gpfn == gfn );
+ if ( (space == XENMAPSPACE_gmfn || space == XENMAPSPACE_gmfn_range) &&
+ old_gpfn != gfn )
+ {
+ rc = -EXDEV;
+ goto put_both;
+ }
if ( old_gpfn != INVALID_M2P_ENTRY )
rc = guest_physmap_remove_page(d, old_gpfn, mfn, PAGE_ORDER_4K);