diff options
author | Tom Lendacky <thomas.lendacky@amd.com> | 2020-12-10 20:09:45 +0300 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2020-12-15 13:20:46 +0300 |
commit | 8164a5ffe4c65291efecc03a590c978fd14c240f (patch) | |
tree | 8356050a7dfc6e9ce6af56898ad1e1927a056dd8 /arch/x86/kvm/svm/svm.c | |
parent | bc624d9f1bbbfd6ae7057437cd3fcfef17066399 (diff) | |
download | linux-8164a5ffe4c65291efecc03a590c978fd14c240f.tar.xz |
KVM: SVM: Cannot re-initialize the VMCB after shutdown with SEV-ES
When a SHUTDOWN VMEXIT is encountered, normally the VMCB is re-initialized
so that the guest can be re-launched. But when a guest is running as an
SEV-ES guest, the VMSA cannot be re-initialized because it has been
encrypted. For now, just return -EINVAL to prevent a possible attempt at
a guest reset.
Signed-off-by: Tom Lendacky <thomas.lendacky@amd.com>
Message-Id: <aa6506000f6f3a574de8dbcdab0707df844cb00c.1607620209.git.thomas.lendacky@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/kvm/svm/svm.c')
-rw-r--r-- | arch/x86/kvm/svm/svm.c | 7 |
1 files changed, 7 insertions, 0 deletions
diff --git a/arch/x86/kvm/svm/svm.c b/arch/x86/kvm/svm/svm.c index cade703d6edb..19d1c9707fb7 100644 --- a/arch/x86/kvm/svm/svm.c +++ b/arch/x86/kvm/svm/svm.c @@ -2011,6 +2011,13 @@ static int shutdown_interception(struct vcpu_svm *svm) struct kvm_run *kvm_run = svm->vcpu.run; /* + * The VM save area has already been encrypted so it + * cannot be reinitialized - just terminate. + */ + if (sev_es_guest(svm->vcpu.kvm)) + return -EINVAL; + + /* * VMCB is undefined after a SHUTDOWN intercept * so reinitialize it. */ |