diff options
author | Paul Mackerras <paulus@ozlabs.org> | 2019-12-18 11:43:06 +1100 |
---|---|---|
committer | Paul Mackerras <paulus@ozlabs.org> | 2019-12-18 15:46:34 +1100 |
commit | d89c69f42bf0fe42d1f52ea9b3dca15b1ade7601 (patch) | |
tree | a1a27270ba9f4cc28303477f42c41433e1221777 /virt | |
parent | 7d73710d9ca2564f29d291d0b3badc09efdf25e9 (diff) |
KVM: PPC: Book3S HV: Don't do ultravisor calls on systems without ultravisor
Commit 22945688acd4 ("KVM: PPC: Book3S HV: Support reset of secure
guest") added a call to uv_svm_terminate, which is an ultravisor
call, without any check that the guest is a secure guest or even that
the system has an ultravisor. On a system without an ultravisor,
the ultracall will degenerate to a hypercall, but since we are not
in KVM guest context, the hypercall will get treated as a system
call, which could have random effects depending on what happens to
be in r0, and could also corrupt the current task's kernel stack.
Hence this adds a test for the guest being a secure guest before
doing uv_svm_terminate().
Fixes: 22945688acd4 ("KVM: PPC: Book3S HV: Support reset of secure guest")
Signed-off-by: Paul Mackerras <paulus@ozlabs.org>
Diffstat (limited to 'virt')
0 files changed, 0 insertions, 0 deletions