linux/drivers/block
Roger Pau Monne 2400617da7 xen/blkfront: force data bouncing when backend is untrusted
Split the current bounce buffering logic used with persistent grants
into it's own option, and allow enabling it independently of
persistent grants.  This allows to reuse the same code paths to
perform the bounce buffering required to avoid leaking contiguous data
in shared pages not part of the request fragments.

Reporting whether the backend is to be trusted can be done using a
module parameter, or from the xenstore frontend path as set by the
toolstack when adding the device.

This is CVE-2022-33742, part of XSA-403.

Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
Reviewed-by: Juergen Gross <jgross@suse.com>
Signed-off-by: Juergen Gross <jgross@suse.com>
2022-07-01 10:00:50 +02:00
..
aoe
drbd
mtip32xx
null_blk block: null_blk: Fix null_zone_write() 2022-06-02 07:11:28 -06:00
paride
rnbd
xen-blkback
zram
Kconfig
Makefile
amiflop.c
ataflop.c
brd.c
floppy.c
loop.c for-5.19/drivers-2022-06-02 2022-06-03 10:25:56 -07:00
n64cart.c
nbd.c nbd: use pr_err to output error message 2022-05-27 20:39:33 -06:00
pktcdvd.c
ps3disk.c
ps3vram.c
rbd.c A big pile of assorted fixes and improvements for the filesystem with 2022-06-02 08:59:39 -07:00
rbd_types.h
sunvdc.c
swim.c
swim3.c
swim_asm.S
sx8.c blk-mq: remove the done argument to blk_execute_rq_nowait 2022-05-28 06:15:27 -06:00
virtio_blk.c virtio-blk: support mq_ops->queue_rqs() 2022-05-31 12:44:23 -04:00
xen-blkfront.c xen/blkfront: force data bouncing when backend is untrusted 2022-07-01 10:00:50 +02:00
z2ram.c