x86: rate-limit logging in do_xen{oprof,pmu}_op()
authorJan Beulich <jbeulich@suse.com>
Thu, 29 Oct 2015 12:52:02 +0000 (13:52 +0100)
committerIan Campbell <ijc@debian.org>
Tue, 9 Feb 2016 16:41:16 +0000 (16:41 +0000)
commit9cabe7c4a313143493524830ee0df7950b9fdbbb
tree10b305fe7bb0fa1778129e919a879332535f8151
parentf256a75f8b4b4b6612579a4af8b90f35e42e0769
x86: rate-limit logging in do_xen{oprof,pmu}_op()

Some of the sub-ops are acessible to all guests, and hence should be
rate-limited. In the xenoprof case, just like for XSA-146, include them
only in debug builds. Since the vPMU code is rather new, allow them to
be always present, but downgrade them to (rate limited) guest messages.

This is CVE-2015-7971 / XSA-152.

Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Ian Campbell <ian.campbell@citrix.com>
master commit: 95e7415843b94c346e5ba8682665f508f220e04b
master date: 2015-10-29 13:37:19 +0100

(cherry picked from commit bdc9fdf9d468cb94ca0fbed1b969c20bf173dc9b)

Patch-Name: CVE-2015-7971.diff

Gbp-Pq: Name CVE-2015-7971.diff
xen/arch/x86/cpu/vpmu.c
xen/common/xenoprof.c