Received: by 2002:a05:6a10:d5a5:0:0:0:0 with SMTP id gn37csp3778653pxb; Mon, 4 Oct 2021 09:23:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyhYQkhu8Qtj/Tn6EYyV771ASeUZL4K90hFDbGBut7xY9fb95dAL0olV2kmdlu2HkW78GBW X-Received: by 2002:a17:906:b884:: with SMTP id hb4mr17594945ejb.376.1633364634167; Mon, 04 Oct 2021 09:23:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1633364634; cv=none; d=google.com; s=arc-20160816; b=uL5XV30RB96UOK7UKwt15SIHQxBdML5NxVOpY2tSsmwVsQlgGD8XKEU1k+Q4ko0BYe BZF68I2gr2BaS3vfvk/7QY6uGWwjk5CV5EHl1xTgs7QzmMuFJbm1EGnp/jTh4ZLTULPK enFa1Gegasj8U5DrJgApaxX1XBc7I1i917SPVglead8kx05K25NOQld4/19b8gS626I7 37EflgEB3KFjqVVYW3LkaBQwfcVJaqbzn/lhU2U51NUa5BFPIZLxXfUFgRylmKhYvrzi tKELljReKZol+5Q0eKOpxzFqGAnrPdBjNRTm9JjqfLUyO8Ik2RK9i4M8xBe3E0BKdQH4 lE3A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=u+Lthscz9FyOoYITBOSUP8Mb4YjVc1Ws7t26AG4VEbI=; b=CB0kOHO/vfAQrw6mps7Rp6KkGWW1fmHFEieyNMCmW5LVzpIJ6ogkz9GDYCP1s5oAWs WJxlDzC2LS4YEowbPdQKF2q9t0Q3migPRUZgXQqiMCDqITSikMNab3Dp9RJrOBy/GBny o+Y3vsSb12Zl7xCiLXxTcJ45ezddHtvrL3h5iG9cBh10VsICOvIDhMGKjeXVsxyFUSq+ VvCP4+eDMGlByiDbEvWAlDO0u6gK8NUhSmU5z9yWuHR2dI85BFZ50rrO8edIUWXiiOgY /r9MIWXK7j9p/CR0vI5CyED+QOP7ixFRXZaGWAhssB/bHUVmYfLLWmQfPrJ8d+knu+hE S5Uw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=a5R1ttSS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id u24si19827134ejn.615.2021.10.04.09.23.27; Mon, 04 Oct 2021 09:23:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=a5R1ttSS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236913AbhJDNdq (ORCPT + 99 others); Mon, 4 Oct 2021 09:33:46 -0400 Received: from mail.kernel.org ([198.145.29.99]:47096 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236934AbhJDNbZ (ORCPT ); Mon, 4 Oct 2021 09:31:25 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 8123561B95; Mon, 4 Oct 2021 13:14:03 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1633353244; bh=q2trGVriMZMUOyZfsxMWXmpaTylBwQZuAL0w1q7+hck=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=a5R1ttSSUJAr2VH9x/p+ee4yAoa670kqVOwfF//kY9lBSO241a5XW76lGWklM3s6O BlJ53TWdO/oNSPqM1aok3GCu4OtBQeDjbjN+M9vzJmvNLqjbhR/9DdCsNymwCrPxNm cR9nOdP2ZvJLWjSbRZoO7DYxKwG9SFnHC9IvIbEY= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Maxim Levitsky , Paolo Bonzini Subject: [PATCH 5.14 051/172] KVM: x86: nSVM: dont copy virt_ext from vmcb12 Date: Mon, 4 Oct 2021 14:51:41 +0200 Message-Id: <20211004125046.643320569@linuxfoundation.org> X-Mailer: git-send-email 2.33.0 In-Reply-To: <20211004125044.945314266@linuxfoundation.org> References: <20211004125044.945314266@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Maxim Levitsky commit faf6b755629627f19feafa75b32e81cd7738f12d upstream. These field correspond to features that we don't expose yet to L2 While currently there are no CVE worthy features in this field, if AMD adds more features to this field, that could allow guest escapes similar to CVE-2021-3653 and CVE-2021-3656. Signed-off-by: Maxim Levitsky Message-Id: <20210914154825.104886-6-mlevitsk@redhat.com> Cc: stable@vger.kernel.org Signed-off-by: Paolo Bonzini Signed-off-by: Greg Kroah-Hartman --- arch/x86/kvm/svm/nested.c | 1 - 1 file changed, 1 deletion(-) --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -545,7 +545,6 @@ static void nested_vmcb02_prepare_contro (svm->nested.ctl.int_ctl & int_ctl_vmcb12_bits) | (svm->vmcb01.ptr->control.int_ctl & int_ctl_vmcb01_bits); - svm->vmcb->control.virt_ext = svm->nested.ctl.virt_ext; svm->vmcb->control.int_vector = svm->nested.ctl.int_vector; svm->vmcb->control.int_state = svm->nested.ctl.int_state; svm->vmcb->control.event_inj = svm->nested.ctl.event_inj;