diff options
author | Josh Poimboeuf <[email protected]> | 2022-06-14 23:16:13 +0200 |
---|---|---|
committer | Borislav Petkov <[email protected]> | 2022-06-27 10:34:00 +0200 |
commit | fc02735b14fff8c6678b521d324ade27b1a3d4cf (patch) | |
tree | 9be32b1a805858cab02c043a740b2bab8f45a15c /net/lapb/lapb_timer.c | |
parent | bb06650634d3552c0f8557e9d16aa1a408040e28 (diff) |
KVM: VMX: Prevent guest RSB poisoning attacks with eIBRS
On eIBRS systems, the returns in the vmexit return path from
__vmx_vcpu_run() to vmx_vcpu_run() are exposed to RSB poisoning attacks.
Fix that by moving the post-vmexit spec_ctrl handling to immediately
after the vmexit.
Signed-off-by: Josh Poimboeuf <[email protected]>
Signed-off-by: Peter Zijlstra (Intel) <[email protected]>
Signed-off-by: Borislav Petkov <[email protected]>
Diffstat (limited to 'net/lapb/lapb_timer.c')
0 files changed, 0 insertions, 0 deletions