diff options
| author | Vitaly Kuznetsov <vkuznets@redhat.com> | 2021-06-28 12:44:21 +0200 | 
|---|---|---|
| committer | Paolo Bonzini <pbonzini@redhat.com> | 2021-07-15 10:19:43 -0400 | 
| commit | fb79f566e4c99db8647cf0435e3732f12e856ab0 (patch) | |
| tree | f2f27fa4a2df548393b11632f662d51f5a74c452 | |
| parent | fce7e152ffc8f89d02a80617b16c7aa1527847c8 (diff) | |
KVM: nSVM: Check that VM_HSAVE_PA MSR was set before VMRUN
APM states that "The address written to the VM_HSAVE_PA MSR, which holds
the address of the page used to save the host state on a VMRUN, must point
to a hypervisor-owned page. If this check fails, the WRMSR will fail with
a #GP(0) exception. Note that a value of 0 is not considered valid for the
VM_HSAVE_PA MSR and a VMRUN that is attempted while the HSAVE_PA is 0 will
fail with a #GP(0) exception."
svm_set_msr() already checks that the supplied address is valid, so only
check for '0' is missing. Add it to nested_svm_vmrun().
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
Message-Id: <20210628104425.391276-3-vkuznets@redhat.com>
Reviewed-by: Maxim Levitsky <mlevitsk@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
| -rw-r--r-- | arch/x86/kvm/svm/nested.c | 5 | 
1 files changed, 5 insertions, 0 deletions
| diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c index 2884c54a72bb..ec16a06f9aa8 100644 --- a/arch/x86/kvm/svm/nested.c +++ b/arch/x86/kvm/svm/nested.c @@ -622,6 +622,11 @@ int nested_svm_vmrun(struct kvm_vcpu *vcpu)  	struct kvm_host_map map;  	u64 vmcb12_gpa; +	if (!svm->nested.hsave_msr) { +		kvm_inject_gp(vcpu, 0); +		return 1; +	} +  	if (is_smm(vcpu)) {  		kvm_queue_exception(vcpu, UD_VECTOR);  		return 1; | 
