On 20/08/20 11:13, Maxim Levitsky wrote:
> @@ -3912,6 +3914,14 @@ static int svm_pre_leave_smm(struct kvm_vcpu *vcpu,
> const char *smstate)
> vmcb_gpa = GET_SMSTATE(u64, smstate, 0x7ee0);
>
> if (guest) {
> + /*
> + * This can happen if SVM was not enabled prior to #SMI,
> + * but guest corrupted the #SMI state and marked it as
> + * enabled it there
> + */
> + if (!svm->nested.initialized)
> + return 1;
> +
> if (kvm_vcpu_map(&svm->vcpu, gpa_to_gfn(vmcb_gpa), &map) ==
> -EINVAL)
> return 1;
This can also happen if you live migrate while in SMM (EFER.SVME=0).
You need to check for the SVME bit in the SMM state save area, and:
1) triple fault if it is clear
2) call svm_allocate_nested if it is set.
Paolo