diff options
author | Eric Northup <digitaleric@google.com> | 2015-11-03 20:03:53 +0300 |
---|---|---|
committer | Zefan Li <lizefan@huawei.com> | 2016-03-21 04:17:55 +0300 |
commit | e1b6c3c95cbd3bb5947277e45cf4b7527020af11 (patch) | |
tree | ef10c11ffb74649728b8d479ac7f05e76c77d378 /arch/tile | |
parent | 59c8392ffcf3d6e39dcdd558e0354afc545f4c91 (diff) | |
download | linux-e1b6c3c95cbd3bb5947277e45cf4b7527020af11.tar.xz |
KVM: x86: work around infinite loop in microcode when #AC is delivered
commit 54a20552e1eae07aa240fa370a0293e006b5faed upstream.
It was found that a guest can DoS a host by triggering an infinite
stream of "alignment check" (#AC) exceptions. This causes the
microcode to enter an infinite loop where the core never receives
another interrupt. The host kernel panics pretty quickly due to the
effects (CVE-2015-5307).
Signed-off-by: Eric Northup <digitaleric@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
[lizf: Backported to 3.4:
- adjust filename
- adjust context
- add definition of AC_VECTOR]
Signed-off-by: Zefan Li <lizefan@huawei.com>
Diffstat (limited to 'arch/tile')
0 files changed, 0 insertions, 0 deletions