diff options
| author | Lukas Gerlach <lukas.gerlach@cispa.de> | 2026-03-03 17:19:42 +0300 |
|---|---|---|
| committer | Anup Patel <anup@brainfault.org> | 2026-03-06 08:50:30 +0300 |
| commit | ec87a82ca8740891bce9e93e79ea2cd6c2d70ac8 (patch) | |
| tree | 1aa86e8a4eb059048a3c591af45630982ff16036 /include/linux | |
| parent | f9e26fc325411a34555ad07ddf0a19ff72ea06d4 (diff) | |
| download | linux-ec87a82ca8740891bce9e93e79ea2cd6c2d70ac8.tar.xz | |
KVM: riscv: Fix Spectre-v1 in AIA CSR access
User-controlled indices are used to access AIA CSR registers.
Sanitize them with array_index_nospec() to prevent speculative
out-of-bounds access.
Similar to x86 commit 8c86405f606c ("KVM: x86: Protect
ioapic_read_indirect() from Spectre-v1/L1TF attacks") and arm64
commit 41b87599c743 ("KVM: arm/arm64: vgic: fix possible spectre-v1
in vgic_get_irq()").
Reviewed-by: Radim Krčmář <radim.krcmar@oss.qualcomm.com>
Signed-off-by: Lukas Gerlach <lukas.gerlach@cispa.de>
Link: https://lore.kernel.org/r/20260303-kvm-riscv-spectre-v1-v2-2-192caab8e0dc@cispa.de
Signed-off-by: Anup Patel <anup@brainfault.org>
Diffstat (limited to 'include/linux')
0 files changed, 0 insertions, 0 deletions
