On Thu, Feb 12, 2026 at 07:58:50AM -0800, Jim Mattson wrote:
> Cache g_pat from vmcb12 in vmcb_save_area_cached to avoid TOCTTOU issues,
> and add a validity check so that when nested paging is enabled for vmcb12,
> an invalid g_pat at emulated VMRUN causes an immediate VMEXIT with exit
> code VMEXIT_INVALID, as specified in the APM, volume 2: "Nested Paging and
> VMRUN/VMEXIT."
> 
> Fixes: 3d6368ef580a ("KVM: SVM: Add VMRUN handler")
> Signed-off-by: Jim Mattson <[email protected]>
> ---
>  arch/x86/kvm/svm/nested.c | 17 +++++++++++++----
>  arch/x86/kvm/svm/svm.h    |  1 +
>  2 files changed, 14 insertions(+), 4 deletions(-)
> 
> diff --git a/arch/x86/kvm/svm/nested.c b/arch/x86/kvm/svm/nested.c
> index b72a1f3c4144..91b35adb83f8 100644
> --- a/arch/x86/kvm/svm/nested.c
> +++ b/arch/x86/kvm/svm/nested.c
> @@ -426,7 +426,8 @@ static bool nested_vmcb_check_controls(struct kvm_vcpu 
> *vcpu,
>  
>  /* Common checks that apply to both L1 and L2 state.  */
>  static bool nested_vmcb_check_save(struct kvm_vcpu *vcpu,
> -                                struct vmcb_save_area_cached *save)
> +                                struct vmcb_save_area_cached *save,
> +                                bool check_gpat)
>  {
>       if (CC(!(save->efer & EFER_SVME)))
>               return false;
> @@ -462,6 +463,9 @@ static bool nested_vmcb_check_save(struct kvm_vcpu *vcpu,
>       if (CC(!kvm_valid_efer(vcpu, save->efer)))
>               return false;
>  
> +     if (check_gpat && CC(!kvm_pat_valid(save->g_pat)))
> +             return false;
> +
>       return true;
>  }
>  
> @@ -573,6 +577,7 @@ static void __nested_copy_vmcb_save_to_cache(struct 
> vmcb_save_area_cached *to,
>  
>       to->rax = from->rax;
>       to->cr2 = from->cr2;
> +     to->g_pat = from->g_pat;
>  
>       svm_copy_lbrs(to, from);
>  }
> @@ -1036,7 +1041,8 @@ int enter_svm_guest_mode(struct kvm_vcpu *vcpu, u64 
> vmcb12_gpa, bool from_vmrun)
>  
>       enter_guest_mode(vcpu);
>  
> -     if (!nested_vmcb_check_save(vcpu, &svm->nested.save) ||
> +     if (!nested_vmcb_check_save(vcpu, &svm->nested.save,
> +                                 nested_npt_enabled(svm)) ||
>           !nested_vmcb_check_controls(vcpu, &svm->nested.ctl,
>                                       svm->vmcb01.ptr->save.cr0))
>               return -EINVAL;
> @@ -2006,13 +2012,16 @@ static int svm_set_nested_state(struct kvm_vcpu *vcpu,
>  
>       /*
>        * Validate host state saved from before VMRUN (see
> -      * nested_svm_check_permissions).
> +      * nested_svm_check_permissions). Note that the g_pat field is not
> +      * validated, because (a) it may have been clobbered by SMM before
> +      * KVM_GET_NESTED_STATE, and (b) it is not loaded at emulated
> +      * #VMEXIT.

(b) here means that svm_copy_vmrun_state() does not copy it to vmcb01,
and the value is restored by KVM_SET_MSRS, right?

If my understanding is correct:

Reviewed-by: Yosry Ahmed <[email protected]>

>        */
>       __nested_copy_vmcb_save_to_cache(&save_cached, save);
>       if (!(save->cr0 & X86_CR0_PG) ||
>           !(save->cr0 & X86_CR0_PE) ||
>           (save->rflags & X86_EFLAGS_VM) ||
> -         !nested_vmcb_check_save(vcpu, &save_cached))
> +         !nested_vmcb_check_save(vcpu, &save_cached, false))
>               goto out_free;
>  
>  
> diff --git a/arch/x86/kvm/svm/svm.h b/arch/x86/kvm/svm/svm.h
> index 9850ed01e16e..a49c48459e0b 100644
> --- a/arch/x86/kvm/svm/svm.h
> +++ b/arch/x86/kvm/svm/svm.h
> @@ -161,6 +161,7 @@ struct vmcb_save_area_cached {
>       u64 isst_addr;
>       u64 rax;
>       u64 cr2;
> +     u64 g_pat;
>       u64 dbgctl;
>       u64 br_from;
>       u64 br_to;
> -- 
> 2.53.0.239.g8d8fc8a987-goog
> 

Reply via email to