summaryrefslogtreecommitdiff
path: root/arch
diff options
context:
space:
mode:
authorMaxim Levitsky <mlevitsk@redhat.com>2021-09-14 18:48:16 +0300
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>2021-10-07 07:53:07 +0200
commit4639ee36e064dcd8c2ccfe0a5f253c77b8489883 (patch)
tree727d8d855ff4649476c5eea75fd82f565378b6fb /arch
parent99a9e9b80f19fc63be005a33d76211dd23114792 (diff)
downloadlinux-4639ee36e064dcd8c2ccfe0a5f253c77b8489883.tar.gz
linux-4639ee36e064dcd8c2ccfe0a5f253c77b8489883.tar.bz2
linux-4639ee36e064dcd8c2ccfe0a5f253c77b8489883.zip
KVM: x86: nSVM: don't copy virt_ext from vmcb12
commit faf6b755629627f19feafa75b32e81cd7738f12d upstream. These field correspond to features that we don't expose yet to L2 While currently there are no CVE worthy features in this field, if AMD adds more features to this field, that could allow guest escapes similar to CVE-2021-3653 and CVE-2021-3656. Signed-off-by: Maxim Levitsky <mlevitsk@redhat.com> Message-Id: <20210914154825.104886-6-mlevitsk@redhat.com> Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini <pbonzini@redhat.com> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Diffstat (limited to 'arch')
-rw-r--r--arch/x86/kvm/svm/nested.c1
1 files changed, 0 insertions, 1 deletions
diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
index e5515477c30a..700bc241cee1 100644
--- a/arch/x86/kvm/svm/nested.c
+++ b/arch/x86/kvm/svm/nested.c
@@ -545,7 +545,6 @@ static void nested_vmcb02_prepare_control(struct vcpu_svm *svm)
(svm->nested.ctl.int_ctl & int_ctl_vmcb12_bits) |
(svm->vmcb01.ptr->control.int_ctl & int_ctl_vmcb01_bits);
- svm->vmcb->control.virt_ext = svm->nested.ctl.virt_ext;
svm->vmcb->control.int_vector = svm->nested.ctl.int_vector;
svm->vmcb->control.int_state = svm->nested.ctl.int_state;
svm->vmcb->control.event_inj = svm->nested.ctl.event_inj;