VMX: disable EPT when !cpu_has_vmx_pat
authorLiu Jinsong <jinsong.liu@intel.com>
Wed, 6 Nov 2013 09:11:18 +0000 (10:11 +0100)
committerJan Beulich <jbeulich@suse.com>
Wed, 6 Nov 2013 09:11:18 +0000 (10:11 +0100)
commitc13b0d65ddedd74508edef5cd66defffe30468fc
treeaf52f3eacc1b639f91e3c29befea6f8888e1f9d6
parent84657efd9116f40924aa13c9d5a349e007da716f
VMX: disable EPT when !cpu_has_vmx_pat

Recently Oracle developers found a Xen security issue as DOS affecting,
named as XSA-60. Please refer http://xenbits.xen.org/xsa/advisory-60.html
Basically it involves how to handle guest cr0.cd setting, which under
some environment it consumes much time resulting in DOS-like behavior.

This is a preparing patch for fixing XSA-60. Later patch will fix XSA-60
via PAT under Intel EPT case, which depends on cpu_has_vmx_pat.

This is CVE-2013-2212 / XSA-60.

Signed-off-by: Liu Jinsong <jinsong.liu@intel.com>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Andrew Cooper <andrew.cooper3@citrix.com>
Reviewed-by: Tim Deegan <tim@xen.org>
Acked-by: Jun Nakajima <jun.nakajima@intel.com>
xen/arch/x86/hvm/vmx/vmcs.c
xen/arch/x86/hvm/vmx/vmx.c