diff options
| author | Maxim Levitsky <mlevitsk@redhat.com> | 2021-09-14 18:48:16 +0300 |
|---|---|---|
| committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | 2021-10-07 07:53:07 +0200 |
| commit | 4639ee36e064dcd8c2ccfe0a5f253c77b8489883 (patch) | |
| tree | 727d8d855ff4649476c5eea75fd82f565378b6fb /arch | |
| parent | 99a9e9b80f19fc63be005a33d76211dd23114792 (diff) | |
| download | linux-4639ee36e064dcd8c2ccfe0a5f253c77b8489883.tar.gz linux-4639ee36e064dcd8c2ccfe0a5f253c77b8489883.tar.bz2 linux-4639ee36e064dcd8c2ccfe0a5f253c77b8489883.zip | |
KVM: x86: nSVM: don't copy virt_ext from vmcb12
commit faf6b755629627f19feafa75b32e81cd7738f12d upstream.
These field correspond to features that we don't expose yet to L2
While currently there are no CVE worthy features in this field,
if AMD adds more features to this field, that could allow guest
escapes similar to CVE-2021-3653 and CVE-2021-3656.
Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com>
Message-Id: <20210914154825.104886-6-mlevitsk@redhat.com>
Cc: stable@vger.kernel.org
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'arch')
| -rw-r--r-- | arch/x86/kvm/svm/nested.c | 1 |
1 files changed, 0 insertions, 1 deletions
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index e5515477c30a..700bc241cee1 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -545,7 +545,6 @@ static void nested_vmcb02_prepare_control(struct vcpu_svm *svm) (svm->nested.ctl.int_ctl & int_ctl_vmcb12_bits) | (svm->vmcb01.ptr->control.int_ctl & int_ctl_vmcb01_bits); - svm->vmcb->control.virt_ext = svm->nested.ctl.virt_ext; svm->vmcb->control.int_vector = svm->nested.ctl.int_vector; svm->vmcb->control.int_state = svm->nested.ctl.int_state; svm->vmcb->control.event_inj = svm->nested.ctl.event_inj; |
