According to section "CHECKING AND LOADING GUEST STATE" in Intel SDM vol 3C, the following check is performed on vmentry of L2 guests: If the "load IA32_PAT" VM-entry control is 1, the value of the field for the IA32_PAT MSR must be one that could be written by WRMSR without fault at CPL 0. Specifically, each of the 8 bytes in the field must have one of the values 0 (UC), 1 (WC), 4 (WT), 5 (WP), 6 (WB), or 7 (UC-). Signed-off-by: Krish Sadhukhan <krish.sadhukhan@xxxxxxxxxx> Reviewed-by: Karl Heubaum <karl.heubaum@xxxxxxxxxx> --- arch/x86/kvm/vmx/nested.c | 17 +++++++++++++++++ 1 file changed, 17 insertions(+) diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index a1b44d930d26..6185ba4e6e55 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -2637,6 +2637,20 @@ static int nested_check_host_control_regs(struct kvm_vcpu *vcpu, return 0; } +/* + * Checks related to Control Registers, Debug Registers and MSRs in + * Guest State Area. + */ +static int nested_check_guest_ctrl_dbg_regs_msrs(struct vmcs12 *vmcs12) +{ + if (vmcs12->vm_entry_controls & VM_ENTRY_LOAD_IA32_PAT) { + if (nested_check_pat_fields(vmcs12->guest_ia32_pat)) + return -EINVAL; + } + + return 0; +} + /* * Checks related to Guest Non-register State */ @@ -2660,6 +2674,9 @@ static int nested_vmx_check_vmentry_prereqs(struct kvm_vcpu *vcpu, if (nested_check_host_control_regs(vcpu, vmcs12)) return VMXERR_ENTRY_INVALID_HOST_STATE_FIELD; + if (nested_check_guest_ctrl_dbg_regs_msrs(vmcs12)) + return VMXERR_ENTRY_INVALID_CONTROL_FIELD; + if (nested_check_guest_non_reg_state(vmcs12)) return VMXERR_ENTRY_INVALID_CONTROL_FIELD; -- 2.17.2