mirror of
https://mirrors.bfsu.edu.cn/git/linux.git
synced 2024-11-15 16:24:13 +08:00
fc02735b14
On eIBRS systems, the returns in the vmexit return path from __vmx_vcpu_run() to vmx_vcpu_run() are exposed to RSB poisoning attacks. Fix that by moving the post-vmexit spec_ctrl handling to immediately after the vmexit. Signed-off-by: Josh Poimboeuf <jpoimboe@kernel.org> Signed-off-by: Peter Zijlstra (Intel) <peterz@infradead.org> Signed-off-by: Borislav Petkov <bp@suse.de>
9 lines
222 B
C
9 lines
222 B
C
/* SPDX-License-Identifier: GPL-2.0 */
|
|
#ifndef __KVM_X86_VMX_RUN_FLAGS_H
|
|
#define __KVM_X86_VMX_RUN_FLAGS_H
|
|
|
|
#define VMX_RUN_VMRESUME (1 << 0)
|
|
#define VMX_RUN_SAVE_SPEC_CTRL (1 << 1)
|
|
|
|
#endif /* __KVM_X86_VMX_RUN_FLAGS_H */
|