diff options
author | Sean Christopherson <seanjc@google.com> | 2025-06-10 15:57:20 -0700 |
---|---|---|
committer | Sean Christopherson <seanjc@google.com> | 2025-06-20 13:07:26 -0700 |
commit | 3a0f09b361e1c6245c544f9ea9e14ab651979a4f (patch) | |
tree | f07744d8a531be8cb8defdb752dc89af3281e57e /tools/perf/scripts/python/export-to-sqlite.py | |
parent | 6b7315fe54ce24e65ba2c7b13ae22c6ab6caac5a (diff) |
KVM: SVM: Pass through GHCB MSR if and only if VM is an SEV-ES guest
Disable interception of the GHCB MSR if and only if the VM is an SEV-ES
guest. While the exact behavior is completely undocumented in the APM,
common sense and testing on SEV-ES capable CPUs says that accesses to the
GHCB from non-SEV-ES guests will #GP. I.e. from the guest's perspective,
no functional change intended.
Fixes: 376c6d285017 ("KVM: SVM: Provide support for SEV-ES vCPU creation/loading")
Link: https://lore.kernel.org/r/20250610225737.156318-16-seanjc@google.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
Diffstat (limited to 'tools/perf/scripts/python/export-to-sqlite.py')
0 files changed, 0 insertions, 0 deletions