0d71e75f73
26369-libxl-devid.patch - fate##313584: pass bios information to XEN HVM guest 26554-hvm-firmware-passthrough.patch 26555-hvm-firmware-passthrough.patch 26556-hvm-firmware-passthrough.patch - Upstream patches from Jan 26516-ACPI-parse-table-retval.patch (Replaces CVE-2013-0153-xsa36.patch) 26517-AMD-IOMMU-clear-irtes.patch (Replaces CVE-2013-0153-xsa36.patch) 26518-AMD-IOMMU-disable-if-SATA-combined-mode.patch (Replaces CVE-2013-0153-xsa36.patch) 26519-AMD-IOMMU-perdev-intremap-default.patch (Replaces CVE-2013-0153-xsa36.patch) 26526-pvdrv-no-devinit.patch 26529-gcc48-build-fix.patch 26531-AMD-IOMMU-IVHD-special-missing.patch (Replaces CVE-2013-0153-xsa36.patch) 26532-AMD-IOMMU-phantom-MSI.patch 26536-xenoprof-div-by-0.patch 26576-x86-APICV-migration.patch 26577-x86-APICV-x2APIC.patch 26578-AMD-IOMMU-replace-BUG_ON.patch - bnc#797014 - no way to control live migrations 26547-tools-xc_fix_logic_error_in_stdiostream_progress.patch 26548-tools-xc_handle_tty_output_differently_in_stdiostream_progress.patch 26549-tools-xc_turn_XCFLAGS_*_into_shifts.patch 26550-tools-xc_restore_logging_in_xc_save.patch 26551-tools-xc_log_pid_in_xc_save-xc_restore_output.patch - PVonHVM: __devinit was removed in linux-3.8 OBS-URL: https://build.opensuse.org/package/show/Virtualization/xen?expand=0&rev=229
40 lines
1.8 KiB
Diff
40 lines
1.8 KiB
Diff
# HG changeset patch
|
|
# User Dongxiao Xu <dongxiao.xu@intel.com>
|
|
# Date 1359566250 28800
|
|
# Node ID d1bf3b21f78302dad1ed53e540facf7b9a0e2ab5
|
|
# Parent 8201b6ec3564c80db5516cdcf36dcfa9b7fdd93b
|
|
VMX: disable SMEP feature when guest is in non-paging mode
|
|
|
|
SMEP is disabled if CPU is in non-paging mode in hardware.
|
|
However Xen always uses paging mode to emulate guest non-paging
|
|
mode with HAP. To emulate this behavior, SMEP needs to be manually
|
|
disabled when guest switches to non-paging mode.
|
|
|
|
We met an issue that, SMP Linux guest with recent kernel (enable
|
|
SMEP support, for example, 3.5.3) would crash with triple fault if
|
|
setting unrestricted_guest=0 in grub. This is because Xen uses an
|
|
identity mapping page table to emulate the non-paging mode, where
|
|
the page table is set with USER flag. If SMEP is still enabled in
|
|
this case, guest will meet unhandlable page fault and then crash.
|
|
|
|
Signed-off-by: Dongxiao Xu <dongxiao.xu@intel.com>
|
|
Signed-off-by: Xiantao Zhang <xiantao.zhang@intel.com>
|
|
Committed-by: Keir Fraser <keir@xen.org>
|
|
|
|
--- a/xen/arch/x86/hvm/vmx/vmx.c
|
|
+++ b/xen/arch/x86/hvm/vmx/vmx.c
|
|
@@ -1227,6 +1227,13 @@ static void vmx_update_guest_cr(struct v
|
|
{
|
|
v->arch.hvm_vcpu.hw_cr[4] |= X86_CR4_PSE;
|
|
v->arch.hvm_vcpu.hw_cr[4] &= ~X86_CR4_PAE;
|
|
+ /*
|
|
+ * SMEP is disabled if CPU is in non-paging mode in hardware.
|
|
+ * However Xen always uses paging mode to emulate guest non-paging
|
|
+ * mode with HAP. To emulate this behavior, SMEP needs to be
|
|
+ * manually disabled when guest switches to non-paging mode.
|
|
+ */
|
|
+ v->arch.hvm_vcpu.hw_cr[4] &= ~X86_CR4_SMEP;
|
|
}
|
|
__vmwrite(GUEST_CR4, v->arch.hvm_vcpu.hw_cr[4]);
|
|
__vmwrite(CR4_READ_SHADOW, v->arch.hvm_vcpu.guest_cr[4]);
|