linux_dsm_epyc7002/arch/x86/kvm/svm
Krish Sadhukhan 761e416934 KVM: nSVM: Check that MBZ bits in CR3 and CR4 are not set on vmrun of nested guests
According to section "Canonicalization and Consistency Checks" in APM vol. 2
the following guest state is illegal:

    "Any MBZ bit of CR3 is set."
    "Any MBZ bit of CR4 is set."

Suggeted-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Krish Sadhukhan <krish.sadhukhan@oracle.com>
Message-Id: <1594168797-29444-3-git-send-email-krish.sadhukhan@oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2020-07-08 16:21:59 -04:00
..
avic.c KVM: SVM: Add vmcb_ prefix to mark_*() functions 2020-07-08 16:21:48 -04:00
nested.c KVM: nSVM: Check that MBZ bits in CR3 and CR4 are not set on vmrun of nested guests 2020-07-08 16:21:59 -04:00
pmu.c KVM: x86/pmu: Tweak kvm_pmu_get_msr to pass 'struct msr_data' in 2020-06-01 04:26:08 -04:00
sev.c KVM: SVM: Add vmcb_ prefix to mark_*() functions 2020-07-08 16:21:48 -04:00
svm.c KVM: SVM: Rename svm_nested_virtualize_tpr() to nested_svm_virtualize_tpr() 2020-07-08 16:21:49 -04:00
svm.h KVM: nSVM: Check that MBZ bits in CR3 and CR4 are not set on vmrun of nested guests 2020-07-08 16:21:59 -04:00
vmenter.S KVM: SVM: Do not setup frame pointer in __svm_vcpu_run 2020-04-15 12:08:38 -04:00