arm: vgic: incorrect rate limiting of guest triggered logging
On ARM systems the code which deals with virtualising the GIC distributor would, under various circumstances, log messages on a guest accessible code path without appropriate rate limiting.
resource abuse (unlimited log rate)
printk is not rated-limited by default. Therefore a malicious guest may be able to flood the Xen console.
If we use gdprintk, unecessary information will be printed such as the filename and the line. Instead use XENLOGGERR combine with %pv.
A malicious guest could cause repeated logging to the hypervisor console, leading to a Denial of Service attack.