diff options
author | Brijesh Singh <brijesh.singh@amd.com> | 2018-02-19 10:14:44 -0600 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2018-02-24 02:24:12 +0100 |
commit | 7607b7174405aec7441ff6c970833c463114040a (patch) | |
tree | b507a9bd87b758a01a532ac98814f614bffd3b38 /fs/jffs2 | |
parent | 3e233385ef4a217a2812115ed84d4be36eb16817 (diff) |
KVM: SVM: install RSM intercept
RSM instruction is used by the SMM handler to return from SMM mode.
Currently, rsm causes a #UD - which results in instruction fetch, decode,
and emulate. By installing the RSM intercept we can avoid the instruction
fetch since we know that #VMEXIT was due to rsm.
The patch is required for the SEV guest, because in case of SEV guest
memory is encrypted with guest-specific key and hypervisor will not
able to fetch the instruction bytes from the guest memory.
Cc: Paolo Bonzini <pbonzini@redhat.com>
Cc: Radim Krčmář <rkrcmar@redhat.com>
Cc: Joerg Roedel <joro@8bytes.org>
Cc: Borislav Petkov <bp@suse.de>
Cc: Tom Lendacky <thomas.lendacky@amd.com>
Signed-off-by: Brijesh Singh <brijesh.singh@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'fs/jffs2')
0 files changed, 0 insertions, 0 deletions