Commit 1d089744 authored by Paolo Bonzini's avatar Paolo Bonzini Committed by Khalid Elmously

KVM: nVMX: Don't emulate instructions in guest mode

CVE-2020-2732

[ Upstream commit 07721fee ]

vmx_check_intercept is not yet fully implemented. To avoid emulating
instructions disallowed by the L1 hypervisor, refuse to emulate
instructions by default.

Cc: stable@vger.kernel.org
[Made commit, added commit msg - Oliver]
Signed-off-by: default avatarOliver Upton <oupton@google.com>
Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
Signed-off-by: default avatarSasha Levin <sashal@kernel.org>
Signed-off-by: default avatarThadeu Lima de Souza Cascardo <cascardo@canonical.com>
Acked-by: default avatarBenjamin M Romer <benjamin.romer@canonical.com>
Acked-by: default avatarKhalid Elmously <khalid.elmously@canonical.com>
Signed-off-by: default avatarKhalid Elmously <khalid.elmously@canonical.com>
parent b616425f
...@@ -11049,7 +11049,7 @@ static int vmx_check_intercept(struct kvm_vcpu *vcpu, ...@@ -11049,7 +11049,7 @@ static int vmx_check_intercept(struct kvm_vcpu *vcpu,
} }
/* TODO: check more intercepts... */ /* TODO: check more intercepts... */
return X86EMUL_CONTINUE; return X86EMUL_UNHANDLEABLE;
} }
static void vmx_sched_in(struct kvm_vcpu *vcpu, int cpu) static void vmx_sched_in(struct kvm_vcpu *vcpu, int cpu)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment