]> xenbits.xensource.com Git - xen.git/commitdiff
x86/IRQ: avoid double unlock in map_domain_pirq()
authorJan Beulich <jbeulich@suse.com>
Tue, 16 Jul 2024 12:15:33 +0000 (14:15 +0200)
committerJan Beulich <jbeulich@suse.com>
Tue, 16 Jul 2024 12:15:33 +0000 (14:15 +0200)
Forever since its introduction the main loop in the function dealing
with multi-vector MSI had error exit points ("break") with different
properties: In one case no IRQ descriptor lock is being held.
Nevertheless the subsequent error cleanup path assumed such a lock would
uniformly need releasing. Identify the case by setting "desc" to NULL,
thus allowing the unlock to be skipped as necessary.

This is CVE-2024-31143 / XSA-458.

Coverity ID: 1605298
Fixes: d1b6d0a02489 ("x86: enable multi-vector MSI")
Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Roger Pau Monné <roger.pau@citrix.com>
master commit: 57338346f29cea7b183403561bdc5f407163b846
master date: 2024-07-16 14:09:14 +0200

xen/arch/x86/irq.c

index 827ed556d3487855c3fb7b04b2dcf5a7f52a97b4..98654ba7843c1f5f924b3e49fca054c9d491b05f 100644 (file)
@@ -2287,6 +2287,7 @@ int map_domain_pirq(
 
             set_domain_irq_pirq(d, irq, info);
             spin_unlock_irqrestore(&desc->lock, flags);
+            desc = NULL;
 
             info = NULL;
             irq = create_irq(NUMA_NO_NODE, true);
@@ -2322,7 +2323,9 @@ int map_domain_pirq(
 
         if ( ret )
         {
-            spin_unlock_irqrestore(&desc->lock, flags);
+            if ( desc )
+                spin_unlock_irqrestore(&desc->lock, flags);
+
             pci_disable_msi(msi_desc);
             if ( nr )
             {