Skip to content
Commit af2e8c68 authored by Michael Ellerman's avatar Michael Ellerman
Browse files

KVM: PPC: Book3S HV: Flush link stack on guest exit to host kernel



On some systems that are vulnerable to Spectre v2, it is up to
software to flush the link stack (return address stack), in order to
protect against Spectre-RSB.

When exiting from a guest we do some house keeping and then
potentially exit to C code which is several stack frames deep in the
host kernel. We will then execute a series of returns without
preceeding calls, opening up the possiblity that the guest could have
poisoned the link stack, and direct speculative execution of the host
to a gadget of some sort.

To prevent this we add a flush of the link stack on exit from a guest.

Signed-off-by: default avatarMichael Ellerman <mpe@ellerman.id.au>
parent 39e72bf9
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment