acrn-hypervisor/hypervisor/common
Yonghua Huang 868778a68b hv: fix vulnerability when VM is destroyed
In hypervisor fuzzing test, hypervisor will hang
 if issuing HV_VM_SET_MEMORY_REGIONS hypercall after
 target VM is destroyed.

 this patch is to fix above vulnerability.

Tracked-On: #2849
Signed-off-by: Yonghua Huang <yonghua.huang@intel.com>
Acked-by: Anthony Xu <anthony.xu@intel.com>
2019-03-27 09:20:12 +08:00
..
hv_main.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
hypercall.c hv: fix vulnerability when VM is destroyed 2019-03-27 09:20:12 +08:00
io_req.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
ptdev.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
schedule.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
softirq.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
stack_protector.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
static_checks.c hv: use int32_t replace int 2018-12-12 13:08:10 +08:00
trusty_hypercall.c HV: cleanup header files under hypervisor/common 2019-02-28 14:59:22 +08:00
vm_load.c hv: replace MEM_2K with a new macro MAX_BOOTARGS_SIZE for bootargs size 2019-03-21 13:08:15 +08:00