summaryrefslogtreecommitdiffstats
path: root/include/linux/mfd/rdc321x.h
diff options
context:
space:
mode:
authorBabu Moger <babu.moger@amd.com>2020-05-12 18:59:06 -0500
committerPaolo Bonzini <pbonzini@redhat.com>2020-05-13 11:27:41 -0400
commit37486135d3a7b03acc7755b63627a130437f066a (patch)
treed2466828e16813eef80e938f8c354ce7fa0fa2be /include/linux/mfd/rdc321x.h
parent7d611233b01613c866259d6e6f44c67f7f7eb2a3 (diff)
downloadlinux-stable-37486135d3a7b03acc7755b63627a130437f066a.tar.gz
linux-stable-37486135d3a7b03acc7755b63627a130437f066a.tar.bz2
linux-stable-37486135d3a7b03acc7755b63627a130437f066a.zip
KVM: x86: Fix pkru save/restore when guest CR4.PKE=0, move it to x86.c
Though rdpkru and wrpkru are contingent upon CR4.PKE, the PKRU resource isn't. It can be read with XSAVE and written with XRSTOR. So, if we don't set the guest PKRU value here(kvm_load_guest_xsave_state), the guest can read the host value. In case of kvm_load_host_xsave_state, guest with CR4.PKE clear could potentially use XRSTOR to change the host PKRU value. While at it, move pkru state save/restore to common code and the host_pkru field to kvm_vcpu_arch. This will let SVM support protection keys. Cc: stable@vger.kernel.org Reported-by: Jim Mattson <jmattson@google.com> Signed-off-by: Babu Moger <babu.moger@amd.com> Message-Id: <158932794619.44260.14508381096663848853.stgit@naples-babu.amd.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'include/linux/mfd/rdc321x.h')
0 files changed, 0 insertions, 0 deletions