• Tom Lendacky's avatar
    KVM: SVM: Add required changes to support intercepts under SEV-ES · f1c6366e
    Tom Lendacky authored
    When a guest is running under SEV-ES, the hypervisor cannot access the
    guest register state. There are numerous places in the KVM code where
    certain registers are accessed that are not allowed to be accessed (e.g.
    RIP, CR0, etc). Add checks to prevent register accesses and add intercept
    update support at various points within the KVM code.
    
    Also, when handling a VMGEXIT, exceptions are passed back through the
    GHCB. Since the RDMSR/WRMSR intercepts (may) inject a #GP on error,
    update the SVM intercepts to handle this for SEV-ES guests.
    Signed-off-by: default avatarTom Lendacky <thomas.lendacky@amd.com>
    [Redo MSR part using the .complete_emulated_msr callback. - Paolo]
    Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
    f1c6366e
x86.c 294 KB