* [PATCH] KVM: x86: use array_index_nospec with indices that come from guest
@ 2025-07-24 6:00 Greg Kroah-Hartman
2025-07-24 13:38 ` Sean Christopherson
0 siblings, 1 reply; 11+ messages in thread
From: Greg Kroah-Hartman @ 2025-07-24 6:00 UTC (permalink / raw)
To: kvm
Cc: Thijs Raymakers, stable, Sean Christopherson, Paolo Bonzini,
Greg Kroah-Hartman
From: Thijs Raymakers <thijs@raymakers.nl>
min and dest_id are guest-controlled indices. Using array_index_nospec()
after the bounds checks clamps these values to mitigate speculative
execution side-channels.
Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
Cc: stable <stable@kernel.org>
Cc: Sean Christopherson <seanjc@google.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
arch/x86/kvm/lapic.c | 2 ++
arch/x86/kvm/x86.c | 7 +++++--
2 files changed, 7 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
index 73418dc0ebb2..e10d6ad236c9 100644
--- a/arch/x86/kvm/lapic.c
+++ b/arch/x86/kvm/lapic.c
@@ -852,6 +852,8 @@ static int __pv_send_ipi(unsigned long *ipi_bitmap, struct kvm_apic_map *map,
if (min > map->max_apic_id)
return 0;
+ min = array_index_nospec(min, map->max_apic_id);
+
for_each_set_bit(i, ipi_bitmap,
min((u32)BITS_PER_LONG, (map->max_apic_id - min + 1))) {
if (map->phys_map[min + i]) {
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 93636f77c42d..872e43defa67 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -10051,8 +10051,11 @@ static void kvm_sched_yield(struct kvm_vcpu *vcpu, unsigned long dest_id)
rcu_read_lock();
map = rcu_dereference(vcpu->kvm->arch.apic_map);
- if (likely(map) && dest_id <= map->max_apic_id && map->phys_map[dest_id])
- target = map->phys_map[dest_id]->vcpu;
+ if (likely(map) && dest_id <= map->max_apic_id) {
+ dest_id = array_index_nospec(dest_id, map->max_apic_id);
+ if (map->phys_map[dest_id])
+ target = map->phys_map[dest_id]->vcpu;
+ }
rcu_read_unlock();
--
2.50.1
^ permalink raw reply related [flat|nested] 11+ messages in thread
* Re: [PATCH] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-24 6:00 [PATCH] KVM: x86: use array_index_nospec with indices that come from guest Greg Kroah-Hartman
@ 2025-07-24 13:38 ` Sean Christopherson
2025-07-24 14:22 ` [PATCH v2] " Thijs Raymakers
0 siblings, 1 reply; 11+ messages in thread
From: Sean Christopherson @ 2025-07-24 13:38 UTC (permalink / raw)
To: Greg Kroah-Hartman; +Cc: kvm, Thijs Raymakers, stable, Paolo Bonzini
On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> From: Thijs Raymakers <thijs@raymakers.nl>
>
> min and dest_id are guest-controlled indices. Using array_index_nospec()
> after the bounds checks clamps these values to mitigate speculative
> execution side-channels.
>
> Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> Cc: stable <stable@kernel.org>
> Cc: Sean Christopherson <seanjc@google.com>
> Cc: Paolo Bonzini <pbonzini@redhat.com>
> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> ---
> arch/x86/kvm/lapic.c | 2 ++
> arch/x86/kvm/x86.c | 7 +++++--
> 2 files changed, 7 insertions(+), 2 deletions(-)
>
> diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
> index 73418dc0ebb2..e10d6ad236c9 100644
> --- a/arch/x86/kvm/lapic.c
> +++ b/arch/x86/kvm/lapic.c
> @@ -852,6 +852,8 @@ static int __pv_send_ipi(unsigned long *ipi_bitmap, struct kvm_apic_map *map,
> if (min > map->max_apic_id)
> return 0;
>
> + min = array_index_nospec(min, map->max_apic_id);
This is wrong, max_apic_id is inclusive, whereas array_index_nospec() takes a
size/length as the second argument. I.e. this needs to be:
min = array_index_nospec(min, map->max_apic_id + 1);
> +
> for_each_set_bit(i, ipi_bitmap,
> min((u32)BITS_PER_LONG, (map->max_apic_id - min + 1))) {
> if (map->phys_map[min + i]) {
> diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
> index 93636f77c42d..872e43defa67 100644
> --- a/arch/x86/kvm/x86.c
> +++ b/arch/x86/kvm/x86.c
> @@ -10051,8 +10051,11 @@ static void kvm_sched_yield(struct kvm_vcpu *vcpu, unsigned long dest_id)
> rcu_read_lock();
> map = rcu_dereference(vcpu->kvm->arch.apic_map);
>
> - if (likely(map) && dest_id <= map->max_apic_id && map->phys_map[dest_id])
> - target = map->phys_map[dest_id]->vcpu;
> + if (likely(map) && dest_id <= map->max_apic_id) {
> + dest_id = array_index_nospec(dest_id, map->max_apic_id);
Same thing here.
> + if (map->phys_map[dest_id])
> + target = map->phys_map[dest_id]->vcpu;
> + }
>
> rcu_read_unlock();
>
> --
> 2.50.1
>
^ permalink raw reply [flat|nested] 11+ messages in thread
* [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-24 13:38 ` Sean Christopherson
@ 2025-07-24 14:22 ` Thijs Raymakers
2025-07-24 18:36 ` Greg Kroah-Hartman
0 siblings, 1 reply; 11+ messages in thread
From: Thijs Raymakers @ 2025-07-24 14:22 UTC (permalink / raw)
To: seanjc; +Cc: kvm, Thijs Raymakers, stable, Paolo Bonzini, Greg Kroah-Hartman
min and dest_id are guest-controlled indices. Using array_index_nospec()
after the bounds checks clamps these values to mitigate speculative execution
side-channels.
Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
Cc: stable <stable@kernel.org>
Cc: Sean Christopherson <seanjc@google.com>
Cc: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
---
arch/x86/kvm/lapic.c | 2 ++
arch/x86/kvm/x86.c | 7 +++++--
2 files changed, 7 insertions(+), 2 deletions(-)
diff --git a/arch/x86/kvm/lapic.c b/arch/x86/kvm/lapic.c
index 73418dc0ebb2..0725d2cae742 100644
--- a/arch/x86/kvm/lapic.c
+++ b/arch/x86/kvm/lapic.c
@@ -852,6 +852,8 @@ static int __pv_send_ipi(unsigned long *ipi_bitmap, struct kvm_apic_map *map,
if (min > map->max_apic_id)
return 0;
+ min = array_index_nospec(min, map->max_apic_id + 1);
+
for_each_set_bit(i, ipi_bitmap,
min((u32)BITS_PER_LONG, (map->max_apic_id - min + 1))) {
if (map->phys_map[min + i]) {
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 93636f77c42d..43b63f1d1594 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -10051,8 +10051,11 @@ static void kvm_sched_yield(struct kvm_vcpu *vcpu, unsigned long dest_id)
rcu_read_lock();
map = rcu_dereference(vcpu->kvm->arch.apic_map);
- if (likely(map) && dest_id <= map->max_apic_id && map->phys_map[dest_id])
- target = map->phys_map[dest_id]->vcpu;
+ if (likely(map) && dest_id <= map->max_apic_id) {
+ dest_id = array_index_nospec(dest_id, map->max_apic_id + 1);
+ if (map->phys_map[dest_id])
+ target = map->phys_map[dest_id]->vcpu;
+ }
rcu_read_unlock();
--
2.50.1
^ permalink raw reply related [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-24 14:22 ` [PATCH v2] " Thijs Raymakers
@ 2025-07-24 18:36 ` Greg Kroah-Hartman
2025-07-24 19:04 ` Sean Christopherson
0 siblings, 1 reply; 11+ messages in thread
From: Greg Kroah-Hartman @ 2025-07-24 18:36 UTC (permalink / raw)
To: Thijs Raymakers; +Cc: seanjc, kvm, stable, Paolo Bonzini
On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> min and dest_id are guest-controlled indices. Using array_index_nospec()
> after the bounds checks clamps these values to mitigate speculative execution
> side-channels.
>
> Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> Cc: stable <stable@kernel.org>
> Cc: Sean Christopherson <seanjc@google.com>
> Cc: Paolo Bonzini <pbonzini@redhat.com>
> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Nit, you shouldn't have added my signed off on a new version, but that's
ok, I'm fine with it.
> ---
> arch/x86/kvm/lapic.c | 2 ++
> arch/x86/kvm/x86.c | 7 +++++--
> 2 files changed, 7 insertions(+), 2 deletions(-)
You also forgot to say what changed down here.
Don't know how strict the KVM maintainers are, I know I require these
things fixed up...
thanks,
greg k-h
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-24 18:36 ` Greg Kroah-Hartman
@ 2025-07-24 19:04 ` Sean Christopherson
2025-07-25 4:42 ` Greg Kroah-Hartman
2025-08-11 11:34 ` Greg Kroah-Hartman
0 siblings, 2 replies; 11+ messages in thread
From: Sean Christopherson @ 2025-07-24 19:04 UTC (permalink / raw)
To: Greg Kroah-Hartman; +Cc: Thijs Raymakers, kvm, stable, Paolo Bonzini
On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> > min and dest_id are guest-controlled indices. Using array_index_nospec()
> > after the bounds checks clamps these values to mitigate speculative execution
> > side-channels.
> >
> > Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> > Cc: stable <stable@kernel.org>
> > Cc: Sean Christopherson <seanjc@google.com>
> > Cc: Paolo Bonzini <pbonzini@redhat.com>
> > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
>
> Nit, you shouldn't have added my signed off on a new version, but that's
> ok, I'm fine with it.
Want me to keep your SoB when applying, or drop it?
> > ---
> > arch/x86/kvm/lapic.c | 2 ++
> > arch/x86/kvm/x86.c | 7 +++++--
> > 2 files changed, 7 insertions(+), 2 deletions(-)
>
> You also forgot to say what changed down here.
>
> Don't know how strict the KVM maintainers are, I know I require these
> things fixed up...
I require the same things, but I also don't mind doing fixup when applying if
that's the path of least resistance (and it's not a recurring problem).
I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
b4, and often confuses me as well.
But for this, I don't see any reason to send a v3.
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-24 19:04 ` Sean Christopherson
@ 2025-07-25 4:42 ` Greg Kroah-Hartman
2025-07-25 10:24 ` Thijs Raymakers
2025-08-11 11:34 ` Greg Kroah-Hartman
1 sibling, 1 reply; 11+ messages in thread
From: Greg Kroah-Hartman @ 2025-07-25 4:42 UTC (permalink / raw)
To: Sean Christopherson; +Cc: Thijs Raymakers, kvm, stable, Paolo Bonzini
On Thu, Jul 24, 2025 at 12:04:15PM -0700, Sean Christopherson wrote:
> On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> > On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> > > min and dest_id are guest-controlled indices. Using array_index_nospec()
> > > after the bounds checks clamps these values to mitigate speculative execution
> > > side-channels.
> > >
> > > Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> > > Cc: stable <stable@kernel.org>
> > > Cc: Sean Christopherson <seanjc@google.com>
> > > Cc: Paolo Bonzini <pbonzini@redhat.com>
> > > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> >
> > Nit, you shouldn't have added my signed off on a new version, but that's
> > ok, I'm fine with it.
>
> Want me to keep your SoB when applying, or drop it?
Keep it please, I was just letting Thijs know.
> > > ---
> > > arch/x86/kvm/lapic.c | 2 ++
> > > arch/x86/kvm/x86.c | 7 +++++--
> > > 2 files changed, 7 insertions(+), 2 deletions(-)
> >
> > You also forgot to say what changed down here.
> >
> > Don't know how strict the KVM maintainers are, I know I require these
> > things fixed up...
>
> I require the same things, but I also don't mind doing fixup when applying if
> that's the path of least resistance (and it's not a recurring problem).
>
> I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
> b4, and often confuses me as well.
>
> But for this, I don't see any reason to send a v3.
That's great, thanks.
greg k-h
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-25 4:42 ` Greg Kroah-Hartman
@ 2025-07-25 10:24 ` Thijs Raymakers
0 siblings, 0 replies; 11+ messages in thread
From: Thijs Raymakers @ 2025-07-25 10:24 UTC (permalink / raw)
To: Greg Kroah-Hartman, Sean Christopherson; +Cc: kvm, stable, Paolo Bonzini
On 7/25/25 6:42 AM, Greg Kroah-Hartman wrote:
> On Thu, Jul 24, 2025 at 12:04:15PM -0700, Sean Christopherson wrote:
>> On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
>>> On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
>>>> min and dest_id are guest-controlled indices. Using array_index_nospec()
>>>> after the bounds checks clamps these values to mitigate speculative execution
>>>> side-channels.
>>>>
>>>> Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
>>>> Cc: stable <stable@kernel.org>
>>>> Cc: Sean Christopherson <seanjc@google.com>
>>>> Cc: Paolo Bonzini <pbonzini@redhat.com>
>>>> Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
>>> Nit, you shouldn't have added my signed off on a new version, but that's
>>> ok, I'm fine with it.
>> Want me to keep your SoB when applying, or drop it?
> Keep it please, I was just letting Thijs know.
Sorry about that. I was not entirely sure whether tags like Signed-Off
should
be kept or removed in a new revision. Thanks for the feedback.
>>>> ---
>>>> arch/x86/kvm/lapic.c | 2 ++
>>>> arch/x86/kvm/x86.c | 7 +++++--
>>>> 2 files changed, 7 insertions(+), 2 deletions(-)
>>> You also forgot to say what changed down here.
>>>
>>> Don't know how strict the KVM maintainers are, I know I require these
>>> things fixed up...
>> I require the same things, but I also don't mind doing fixup when applying if
>> that's the path of least resistance (and it's not a recurring problem).
Changes in v2:
- As noted by Sean Christopherson, max_apic_id is inclusive but array_index_nospec is not.
v2 adds one to the array_index_nospec size so the bounds do include max_apic_id
- Link to v1: https://lore.kernel.org/kvm/2025072540-eggbeater-crate-50af@gregkh/T/#u
>> I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
>> b4, and often confuses me as well.
Noted, will not do it like that next time.
>>
>> But for this, I don't see any reason to send a v3.
> That's great, thanks.
Thanks. I'm fairly new to the process of submitting patches over email,
so apologies for my mistakes. Thank you for your patience and feedback,
it is much appreciated. If you do prefer a v3 that does include the
change log, just let me know.
- Thijs
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-07-24 19:04 ` Sean Christopherson
2025-07-25 4:42 ` Greg Kroah-Hartman
@ 2025-08-11 11:34 ` Greg Kroah-Hartman
2025-08-11 14:35 ` Sean Christopherson
1 sibling, 1 reply; 11+ messages in thread
From: Greg Kroah-Hartman @ 2025-08-11 11:34 UTC (permalink / raw)
To: Sean Christopherson; +Cc: Thijs Raymakers, kvm, stable, Paolo Bonzini
On Thu, Jul 24, 2025 at 12:04:15PM -0700, Sean Christopherson wrote:
> On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> > On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> > > min and dest_id are guest-controlled indices. Using array_index_nospec()
> > > after the bounds checks clamps these values to mitigate speculative execution
> > > side-channels.
> > >
> > > Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> > > Cc: stable <stable@kernel.org>
> > > Cc: Sean Christopherson <seanjc@google.com>
> > > Cc: Paolo Bonzini <pbonzini@redhat.com>
> > > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> >
> > Nit, you shouldn't have added my signed off on a new version, but that's
> > ok, I'm fine with it.
>
> Want me to keep your SoB when applying, or drop it?
>
> > > ---
> > > arch/x86/kvm/lapic.c | 2 ++
> > > arch/x86/kvm/x86.c | 7 +++++--
> > > 2 files changed, 7 insertions(+), 2 deletions(-)
> >
> > You also forgot to say what changed down here.
> >
> > Don't know how strict the KVM maintainers are, I know I require these
> > things fixed up...
>
> I require the same things, but I also don't mind doing fixup when applying if
> that's the path of least resistance (and it's not a recurring problem).
>
> I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
> b4, and often confuses me as well.
>
> But for this, I don't see any reason to send a v3.
Any status on this? I don't see it in linux-next at all, nor in
6.17-rc1
thanks,
greg k-h
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-08-11 11:34 ` Greg Kroah-Hartman
@ 2025-08-11 14:35 ` Sean Christopherson
2025-08-11 15:16 ` Greg Kroah-Hartman
2025-08-15 22:23 ` Sean Christopherson
0 siblings, 2 replies; 11+ messages in thread
From: Sean Christopherson @ 2025-08-11 14:35 UTC (permalink / raw)
To: Greg Kroah-Hartman; +Cc: Thijs Raymakers, kvm, stable, Paolo Bonzini
On Mon, Aug 11, 2025, Greg Kroah-Hartman wrote:
> On Thu, Jul 24, 2025 at 12:04:15PM -0700, Sean Christopherson wrote:
> > On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> > > On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> > > > min and dest_id are guest-controlled indices. Using array_index_nospec()
> > > > after the bounds checks clamps these values to mitigate speculative execution
> > > > side-channels.
> > > >
> > > > Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> > > > Cc: stable <stable@kernel.org>
> > > > Cc: Sean Christopherson <seanjc@google.com>
> > > > Cc: Paolo Bonzini <pbonzini@redhat.com>
> > > > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> > >
> > > Nit, you shouldn't have added my signed off on a new version, but that's
> > > ok, I'm fine with it.
> >
> > Want me to keep your SoB when applying, or drop it?
> >
> > > > ---
> > > > arch/x86/kvm/lapic.c | 2 ++
> > > > arch/x86/kvm/x86.c | 7 +++++--
> > > > 2 files changed, 7 insertions(+), 2 deletions(-)
> > >
> > > You also forgot to say what changed down here.
> > >
> > > Don't know how strict the KVM maintainers are, I know I require these
> > > things fixed up...
> >
> > I require the same things, but I also don't mind doing fixup when applying if
> > that's the path of least resistance (and it's not a recurring problem).
> >
> > I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
> > b4, and often confuses me as well.
> >
> > But for this, I don't see any reason to send a v3.
>
> Any status on this? I don't see it in linux-next at all, nor in
> 6.17-rc1
I'll get it applied and sent along to Paolo/Linus this week.
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-08-11 14:35 ` Sean Christopherson
@ 2025-08-11 15:16 ` Greg Kroah-Hartman
2025-08-15 22:23 ` Sean Christopherson
1 sibling, 0 replies; 11+ messages in thread
From: Greg Kroah-Hartman @ 2025-08-11 15:16 UTC (permalink / raw)
To: Sean Christopherson; +Cc: Thijs Raymakers, kvm, stable, Paolo Bonzini
On Mon, Aug 11, 2025 at 07:35:49AM -0700, Sean Christopherson wrote:
> On Mon, Aug 11, 2025, Greg Kroah-Hartman wrote:
> > On Thu, Jul 24, 2025 at 12:04:15PM -0700, Sean Christopherson wrote:
> > > On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> > > > On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> > > > > min and dest_id are guest-controlled indices. Using array_index_nospec()
> > > > > after the bounds checks clamps these values to mitigate speculative execution
> > > > > side-channels.
> > > > >
> > > > > Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> > > > > Cc: stable <stable@kernel.org>
> > > > > Cc: Sean Christopherson <seanjc@google.com>
> > > > > Cc: Paolo Bonzini <pbonzini@redhat.com>
> > > > > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> > > >
> > > > Nit, you shouldn't have added my signed off on a new version, but that's
> > > > ok, I'm fine with it.
> > >
> > > Want me to keep your SoB when applying, or drop it?
> > >
> > > > > ---
> > > > > arch/x86/kvm/lapic.c | 2 ++
> > > > > arch/x86/kvm/x86.c | 7 +++++--
> > > > > 2 files changed, 7 insertions(+), 2 deletions(-)
> > > >
> > > > You also forgot to say what changed down here.
> > > >
> > > > Don't know how strict the KVM maintainers are, I know I require these
> > > > things fixed up...
> > >
> > > I require the same things, but I also don't mind doing fixup when applying if
> > > that's the path of least resistance (and it's not a recurring problem).
> > >
> > > I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
> > > b4, and often confuses me as well.
> > >
> > > But for this, I don't see any reason to send a v3.
> >
> > Any status on this? I don't see it in linux-next at all, nor in
> > 6.17-rc1
>
> I'll get it applied and sent along to Paolo/Linus this week.
Thanks!
^ permalink raw reply [flat|nested] 11+ messages in thread
* Re: [PATCH v2] KVM: x86: use array_index_nospec with indices that come from guest
2025-08-11 14:35 ` Sean Christopherson
2025-08-11 15:16 ` Greg Kroah-Hartman
@ 2025-08-15 22:23 ` Sean Christopherson
1 sibling, 0 replies; 11+ messages in thread
From: Sean Christopherson @ 2025-08-15 22:23 UTC (permalink / raw)
To: Greg Kroah-Hartman; +Cc: Thijs Raymakers, kvm, stable, Paolo Bonzini
On Mon, Aug 11, 2025, Sean Christopherson wrote:
> On Mon, Aug 11, 2025, Greg Kroah-Hartman wrote:
> > On Thu, Jul 24, 2025 at 12:04:15PM -0700, Sean Christopherson wrote:
> > > On Thu, Jul 24, 2025, Greg Kroah-Hartman wrote:
> > > > On Thu, Jul 24, 2025 at 04:22:27PM +0200, Thijs Raymakers wrote:
> > > > > min and dest_id are guest-controlled indices. Using array_index_nospec()
> > > > > after the bounds checks clamps these values to mitigate speculative execution
> > > > > side-channels.
> > > > >
> > > > > Signed-off-by: Thijs Raymakers <thijs@raymakers.nl>
> > > > > Cc: stable <stable@kernel.org>
> > > > > Cc: Sean Christopherson <seanjc@google.com>
> > > > > Cc: Paolo Bonzini <pbonzini@redhat.com>
> > > > > Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
> > > >
> > > > Nit, you shouldn't have added my signed off on a new version, but that's
> > > > ok, I'm fine with it.
> > >
> > > Want me to keep your SoB when applying, or drop it?
> > >
> > > > > ---
> > > > > arch/x86/kvm/lapic.c | 2 ++
> > > > > arch/x86/kvm/x86.c | 7 +++++--
> > > > > 2 files changed, 7 insertions(+), 2 deletions(-)
> > > >
> > > > You also forgot to say what changed down here.
> > > >
> > > > Don't know how strict the KVM maintainers are, I know I require these
> > > > things fixed up...
> > >
> > > I require the same things, but I also don't mind doing fixup when applying if
> > > that's the path of least resistance (and it's not a recurring problem).
> > >
> > > I also strongly dislike using In-Reply-To for new versions, as it tends to confuse
> > > b4, and often confuses me as well.
> > >
> > > But for this, I don't see any reason to send a v3.
> >
> > Any status on this? I don't see it in linux-next at all, nor in
> > 6.17-rc1
>
> I'll get it applied and sent along to Paolo/Linus this week.
I haven't forgotten about this, but I was out sick most of this week and v6.17-rc1
is crashing on my test systems, so I won't get this sent along until next week.
Sorry for the delay.
^ permalink raw reply [flat|nested] 11+ messages in thread
end of thread, other threads:[~2025-08-15 22:23 UTC | newest]
Thread overview: 11+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2025-07-24 6:00 [PATCH] KVM: x86: use array_index_nospec with indices that come from guest Greg Kroah-Hartman
2025-07-24 13:38 ` Sean Christopherson
2025-07-24 14:22 ` [PATCH v2] " Thijs Raymakers
2025-07-24 18:36 ` Greg Kroah-Hartman
2025-07-24 19:04 ` Sean Christopherson
2025-07-25 4:42 ` Greg Kroah-Hartman
2025-07-25 10:24 ` Thijs Raymakers
2025-08-11 11:34 ` Greg Kroah-Hartman
2025-08-11 14:35 ` Sean Christopherson
2025-08-11 15:16 ` Greg Kroah-Hartman
2025-08-15 22:23 ` Sean Christopherson
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).