diff options
author | Sean Christopherson <sean.j.christopherson@intel.com> | 2018-03-12 10:56:13 -0700 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2018-03-16 22:01:38 +0100 |
commit | 2bb8cafea80bf69c0e729bf1ad1bcd1d6c53248d (patch) | |
tree | 38958959d708fa92778368a7e269fe9b474e465f /mm/hwpoison-inject.c | |
parent | e1de91ccab311ec8007c6e77b0dbb4e3421fd298 (diff) | |
download | linux-stable-2bb8cafea80bf69c0e729bf1ad1bcd1d6c53248d.tar.gz linux-stable-2bb8cafea80bf69c0e729bf1ad1bcd1d6c53248d.tar.bz2 linux-stable-2bb8cafea80bf69c0e729bf1ad1bcd1d6c53248d.zip |
KVM: vVMX: signal failure for nested VMEntry if emulation_required
Fail a nested VMEntry with EXIT_REASON_INVALID_STATE if L2 guest state
is invalid, i.e. vmcs12 contained invalid guest state, and unrestricted
guest is disabled in L0 (and by extension disabled in L1).
WARN_ON_ONCE in handle_invalid_guest_state() if we're attempting to
emulate L2, i.e. nested_run_pending is true, to aid debug in the
(hopefully unlikely) scenario that we somehow skip the nested VMEntry
consistency check, e.g. due to a L0 bug.
Note: KVM relies on hardware to detect the scenario where unrestricted
guest is enabled in L0 but disabled in L1 and vmcs12 contains invalid
guest state, i.e. checking emulation_required in prepare_vmcs02 is
required only to handle the case were unrestricted guest is disabled
in L0 since L0 never actually attempts VMLAUNCH/VMRESUME with vmcs02.
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'mm/hwpoison-inject.c')
0 files changed, 0 insertions, 0 deletions