diff options
author | 2019-12-11 12:47:50 -0800 | |
---|---|---|
committer | 2020-01-27 19:59:42 +0100 | |
commit | 125ffc5e0a56a3eded608dc51e09d5ebf72cf652 (patch) | |
tree | 3f6dafa71f5d0e850d598e7bb2471876d2f89469 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | KVM: x86: Protect MSR-based index computations from Spectre-v1/L1TF attacks in x86.c (diff) | |
download | linux-dev-125ffc5e0a56a3eded608dc51e09d5ebf72cf652.tar.xz linux-dev-125ffc5e0a56a3eded608dc51e09d5ebf72cf652.zip |
KVM: x86: Refactor prefix decoding to prevent Spectre-v1/L1TF attacks
This fixes Spectre-v1/L1TF vulnerabilities in
vmx_read_guest_seg_selector(), vmx_read_guest_seg_base(),
vmx_read_guest_seg_limit() and vmx_read_guest_seg_ar(). When
invoked from emulation, these functions contain index computations
based on the (attacker-influenced) segment value. Using constants
prevents the attack.
Cc: stable@vger.kernel.org
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions