x86/AMD: work around erratum 793
authorJan Beulich <jbeulich@suse.com>
Tue, 3 Dec 2013 08:49:54 +0000 (09:49 +0100)
committerJan Beulich <jbeulich@suse.com>
Tue, 3 Dec 2013 08:49:54 +0000 (09:49 +0100)
commit98162f256ee33994a9881a720419dda9ad4c03a8
treef83324a5a25793f59bbaab09a0fb81a5c839de98
parent9ca423b1fb164a30f40bfacc6c03106fbe1945b1
x86/AMD: work around erratum 793

The recommendation is to set a bit in an MSR - do this if the firmware
didn't, considering that otherwise we expose ourselves to a guest
induced DoS.

This is CVE-2013-6885 / XSA-82.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Acked-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
xen/arch/x86/cpu/amd.c
xen/include/asm-x86/msr-index.h