diff options
author | Avi Kivity <avi@redhat.com> | 2009-03-23 22:13:44 +0200 |
---|---|---|
committer | Avi Kivity <avi@redhat.com> | 2009-03-24 11:03:15 +0200 |
commit | 16175a796d061833aacfbd9672235f2d2725df65 (patch) | |
tree | 69e1fb9865b3331f8a933fa9198b9245a914ea34 /arch/s390/include/asm/debug.h | |
parent | bc7a8660df62da3fb5cad025322eda75fbee8731 (diff) | |
download | kernel-crypto-16175a796d061833aacfbd9672235f2d2725df65.tar.gz kernel-crypto-16175a796d061833aacfbd9672235f2d2725df65.tar.xz kernel-crypto-16175a796d061833aacfbd9672235f2d2725df65.zip |
KVM: VMX: Don't allow uninhibited access to EFER on i386
vmx_set_msr() does not allow i386 guests to touch EFER, but they can still
do so through the default: label in the switch. If they set EFER_LME, they
can oops the host.
Fix by having EFER access through the normal channel (which will check for
EFER_LME) even on i386.
Reported-and-tested-by: Benjamin Gilbert <bgilbert@cs.cmu.edu>
Cc: stable@kernel.org
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'arch/s390/include/asm/debug.h')
0 files changed, 0 insertions, 0 deletions