linux_dsm_epyc7002/arch/x86/include/uapi/asm
Jim Mattson 0cb8410b90 kvm: svm: Intercept RDPRU
The RDPRU instruction gives the guest read access to the IA32_APERF
MSR and the IA32_MPERF MSR. According to volume 3 of the APM, "When
virtualization is enabled, this instruction can be intercepted by the
Hypervisor. The intercept bit is at VMCB byte offset 10h, bit 14."
Since we don't enumerate the instruction in KVM_SUPPORTED_CPUID,
intercept it and synthesize #UD.

Signed-off-by: Jim Mattson <jmattson@google.com>
Reviewed-by: Drew Schmitt <dasch@google.com>
Reviewed-by: Jacob Xu <jacobhxu@google.com>
Reviewed-by: Peter Shier <pshier@google.com>
Reviewed-by: Krish Sadhukhan <krish.sadhukhan@oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-09-24 16:15:36 +02:00
..
a.out.h
auxvec.h
bitsperlong.h
boot.h
bootparam.h
byteorder.h treewide: add "WITH Linux-syscall-note" to SPDX tag of uapi headers 2019-07-25 11:05:10 +02:00
debugreg.h
e820.h
hw_breakpoint.h
hwcap2.h treewide: add "WITH Linux-syscall-note" to SPDX tag of uapi headers 2019-07-25 11:05:10 +02:00
ist.h
Kbuild
kvm_para.h
kvm_perf.h
kvm.h KVM: x86: Add fixed counters to PMU filter 2019-07-20 09:00:48 +02:00
ldt.h
mce.h
mman.h
msgbuf.h
msr.h
mtrr.h
perf_regs.h
posix_types_32.h
posix_types_64.h
posix_types_x32.h
posix_types.h
prctl.h
processor-flags.h
ptrace-abi.h
ptrace.h
sembuf.h
setup.h
shmbuf.h
sigcontext32.h treewide: add "WITH Linux-syscall-note" to SPDX tag of uapi headers 2019-07-25 11:05:10 +02:00
sigcontext.h
siginfo.h
signal.h
stat.h
statfs.h
svm.h kvm: svm: Intercept RDPRU 2019-09-24 16:15:36 +02:00
swab.h
ucontext.h
unistd.h x86/syscalls: Make __X32_SYSCALL_BIT be unsigned long 2019-07-22 10:31:22 +02:00
vm86.h
vmx.h KVM: vmx: Introduce handle_unexpected_vmexit and handle WAITPKG vmexit 2019-09-24 14:34:51 +02:00
vsyscall.h