[2/3] KVM: nVMX: unconditionally cancel preemption timer in free_nested (CVE-2019-7221)
diff mbox series

Message ID 1551095347-1071-3-git-send-email-tyhicks@canonical.com
State New
Headers show
  • Multiple KVM vulnerabilities
Related show

Commit Message

Tyler Hicks Feb. 25, 2019, 11:49 a.m. UTC
From: Peter Shier <pshier@google.com>

Bugzilla: 1671904

There are multiple code paths where an hrtimer may have been started to
emulate an L1 VMX preemption timer that can result in a call to free_nested
without an intervening L2 exit where the hrtimer is normally
cancelled. Unconditionally cancel in free_nested to cover all cases.

Embargoed until Feb 7th 2019.

Signed-off-by: Peter Shier <pshier@google.com>
Reported-by: Jim Mattson <jmattson@google.com>
Reviewed-by: Jim Mattson <jmattson@google.com>
Reported-by: Felix Wilhelm <fwilhelm@google.com>
Cc: stable@kernel.org
Message-Id: <20181011184646.154065-1-pshier@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>


(backported from commit ecec76885bcfe3294685dc363fd1273df0d5d65f)
[tyhicks: Backport to 4.4:
 - free_nested() is in arch/x86/kvm/vmx.c
 - Minor contextual changes]
Signed-off-by: Tyler Hicks <tyhicks@canonical.com>
 arch/x86/kvm/vmx.c | 1 +
 1 file changed, 1 insertion(+)

diff mbox series

diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c
index 33484a57a851..9289b3ce8099 100644
--- a/arch/x86/kvm/vmx.c
+++ b/arch/x86/kvm/vmx.c
@@ -7158,6 +7158,7 @@  static void free_nested(struct vcpu_vmx *vmx)
 	if (!vmx->nested.vmxon)
+	hrtimer_cancel(&vmx->nested.preemption_timer);
 	vmx->nested.vmxon = false;