diff options
author | 2025-02-24 08:54:42 -0800 | |
---|---|---|
committer | 2025-02-28 09:15:23 -0800 | |
commit | f3513a335e71296a1851167b4e3b0e2bf09fc5f1 (patch) | |
tree | 02924fa407b1d5049eeb7713583853ca44c650af /scripts/lib/kdoc/kdoc_output.py | |
parent | KVM: SVM: Set RFLAGS.IF=1 in C code, to get VMRUN out of the STI shadow (diff) | |
download | linux-rng-f3513a335e71296a1851167b4e3b0e2bf09fc5f1.tar.xz linux-rng-f3513a335e71296a1851167b4e3b0e2bf09fc5f1.zip |
KVM: selftests: Assert that STI blocking isn't set after event injection
Add an L1 (guest) assert to the nested exceptions test to verify that KVM
doesn't put VMRUN in an STI shadow (AMD CPUs bleed the shadow into the
guest's int_state if a #VMEXIT occurs before VMRUN fully completes).
Add a similar assert to the VMX side as well, because why not.
Reviewed-by: Jim Mattson <jmattson@google.com>
Link: https://lore.kernel.org/r/20250224165442.2338294-3-seanjc@google.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
Diffstat (limited to 'scripts/lib/kdoc/kdoc_output.py')
0 files changed, 0 insertions, 0 deletions