diff options
| author | 2021-08-18 11:36:31 +0800 | |
|---|---|---|
| committer | 2021-09-22 10:33:11 -0400 | |
| commit | e9337c843c4b4eaa4afb752a7272ef3d04c46381 (patch) | |
| tree | ed5475418a692b52e865ae311c1104ad45359e66 /include/linux | |
| parent | KVM: SEV: Pin guest memory for write for RECEIVE_UPDATE_DATA (diff) | |
| download | linux-dev-e9337c843c4b4eaa4afb752a7272ef3d04c46381.tar.xz linux-dev-e9337c843c4b4eaa4afb752a7272ef3d04c46381.zip | |
kvm: fix wrong exception emulation in check_rdtsc
According to Intel's SDM Vol2 and AMD's APM Vol3, when
CR4.TSD is set, use rdtsc/rdtscp instruction above privilege
level 0 should trigger a #GP.
Fixes: d7eb82030699e ("KVM: SVM: Add intercept checks for remaining group7 instructions")
Signed-off-by: Hou Wenlong <houwenlong93@linux.alibaba.com>
Message-Id: <1297c0dd3f1bb47a6d089f850b629c7aa0247040.1629257115.git.houwenlong93@linux.alibaba.com>
Reviewed-by: Sean Christopherson <seanjc@google.com>
Reviewed-by: Jim Mattson <jmattson@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'include/linux')
0 files changed, 0 insertions, 0 deletions
