Two bugfixes.
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAABAgAGBQJbZLlkAAoJEL/70l94x66D0DkIAJidCqR7YYvsSspPpjbN30iK GE3AJhfXDgj+DZ+/HQpslGP7+rpcErtuSLA6pyX8oFewoOt0LNNXeEdGazfpEt76 lz112RBIjfYVs9GpoiqRbMhIkJQG8lrpP+Ji3yQAdlUcdhoK7IbkFGQpWUk8LBKH +11UMt7QYRnw9/BOYrAoY5fplt1PBjkban+s5VDZOMPq433i7pH7haDq5WVB9El7 n626YvbYXZ4V1mOeqVs4YCBfHZb8dIs58MKBbqJuYefjzX/f9zS72F50ZlJ1D2Sv a0gpmpWeDrR9gH+j/TYfHbdN4IWiD5zyk5tIHPLlAkf6FCpO1wOc7xERchx0VWM= =4vo0 -----END PGP SIGNATURE----- Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm Pull KVM fixes from Paolo Bonzini: "Two vmx bugfixes" * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: kvm: x86: vmx: fix vpid leak KVM: vmx: use local variable for current_vmptr when emulating VMPTRST
This commit is contained in:
commit
0b5b1f9a78
@ -7893,6 +7893,8 @@ static int enter_vmx_operation(struct kvm_vcpu *vcpu)
|
|||||||
HRTIMER_MODE_REL_PINNED);
|
HRTIMER_MODE_REL_PINNED);
|
||||||
vmx->nested.preemption_timer.function = vmx_preemption_timer_fn;
|
vmx->nested.preemption_timer.function = vmx_preemption_timer_fn;
|
||||||
|
|
||||||
|
vmx->nested.vpid02 = allocate_vpid();
|
||||||
|
|
||||||
vmx->nested.vmxon = true;
|
vmx->nested.vmxon = true;
|
||||||
return 0;
|
return 0;
|
||||||
|
|
||||||
@ -8480,21 +8482,20 @@ static int handle_vmptrld(struct kvm_vcpu *vcpu)
|
|||||||
/* Emulate the VMPTRST instruction */
|
/* Emulate the VMPTRST instruction */
|
||||||
static int handle_vmptrst(struct kvm_vcpu *vcpu)
|
static int handle_vmptrst(struct kvm_vcpu *vcpu)
|
||||||
{
|
{
|
||||||
unsigned long exit_qualification = vmcs_readl(EXIT_QUALIFICATION);
|
unsigned long exit_qual = vmcs_readl(EXIT_QUALIFICATION);
|
||||||
u32 vmx_instruction_info = vmcs_read32(VMX_INSTRUCTION_INFO);
|
u32 instr_info = vmcs_read32(VMX_INSTRUCTION_INFO);
|
||||||
gva_t vmcs_gva;
|
gpa_t current_vmptr = to_vmx(vcpu)->nested.current_vmptr;
|
||||||
struct x86_exception e;
|
struct x86_exception e;
|
||||||
|
gva_t gva;
|
||||||
|
|
||||||
if (!nested_vmx_check_permission(vcpu))
|
if (!nested_vmx_check_permission(vcpu))
|
||||||
return 1;
|
return 1;
|
||||||
|
|
||||||
if (get_vmx_mem_address(vcpu, exit_qualification,
|
if (get_vmx_mem_address(vcpu, exit_qual, instr_info, true, &gva))
|
||||||
vmx_instruction_info, true, &vmcs_gva))
|
|
||||||
return 1;
|
return 1;
|
||||||
/* *_system ok, nested_vmx_check_permission has verified cpl=0 */
|
/* *_system ok, nested_vmx_check_permission has verified cpl=0 */
|
||||||
if (kvm_write_guest_virt_system(vcpu, vmcs_gva,
|
if (kvm_write_guest_virt_system(vcpu, gva, (void *)¤t_vmptr,
|
||||||
(void *)&to_vmx(vcpu)->nested.current_vmptr,
|
sizeof(gpa_t), &e)) {
|
||||||
sizeof(u64), &e)) {
|
|
||||||
kvm_inject_page_fault(vcpu, &e);
|
kvm_inject_page_fault(vcpu, &e);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
@ -10370,11 +10371,9 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id)
|
|||||||
goto free_vmcs;
|
goto free_vmcs;
|
||||||
}
|
}
|
||||||
|
|
||||||
if (nested) {
|
if (nested)
|
||||||
nested_vmx_setup_ctls_msrs(&vmx->nested.msrs,
|
nested_vmx_setup_ctls_msrs(&vmx->nested.msrs,
|
||||||
kvm_vcpu_apicv_active(&vmx->vcpu));
|
kvm_vcpu_apicv_active(&vmx->vcpu));
|
||||||
vmx->nested.vpid02 = allocate_vpid();
|
|
||||||
}
|
|
||||||
|
|
||||||
vmx->nested.posted_intr_nv = -1;
|
vmx->nested.posted_intr_nv = -1;
|
||||||
vmx->nested.current_vmptr = -1ull;
|
vmx->nested.current_vmptr = -1ull;
|
||||||
@ -10391,7 +10390,6 @@ static struct kvm_vcpu *vmx_create_vcpu(struct kvm *kvm, unsigned int id)
|
|||||||
return &vmx->vcpu;
|
return &vmx->vcpu;
|
||||||
|
|
||||||
free_vmcs:
|
free_vmcs:
|
||||||
free_vpid(vmx->nested.vpid02);
|
|
||||||
free_loaded_vmcs(vmx->loaded_vmcs);
|
free_loaded_vmcs(vmx->loaded_vmcs);
|
||||||
free_msrs:
|
free_msrs:
|
||||||
kfree(vmx->guest_msrs);
|
kfree(vmx->guest_msrs);
|
||||||
|
Loading…
x
Reference in New Issue
Block a user