linux/arch/x86
Nikunj A Dadhania 38cc6495cd x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests
The hypervisor should not be intercepting GUEST_TSC_FREQ MSR(0xcOO10134)
when Secure TSC is enabled. A #VC exception will be generated otherwise. If
this should occur and Secure TSC is enabled, terminate guest execution.

Signed-off-by: Nikunj A Dadhania <nikunj@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
Link: https://lore.kernel.org/r/20250106124633.1418972-8-nikunj@amd.com
2025-01-07 21:26:19 +01:00
..
boot
coco x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests 2025-01-07 21:26:19 +01:00
configs
crypto
entry
events
hyperv
ia32
include x86/sev: Prevent GUEST_TSC_FREQ MSR interception for Secure TSC enabled guests 2025-01-07 21:26:19 +01:00
kernel x86/sev: Require the RMPREAD instruction after Zen4 2024-12-14 10:55:28 +01:00
kvm
lib
math-emu
mm x86/sev: Add Secure TSC support for SNP guests 2025-01-07 20:27:23 +01:00
net
pci
platform
power
purgatory
ras
realmode
tools
um
video
virt x86/sev: Add full support for a segmented RMP table 2024-12-14 11:47:42 +01:00
xen
.gitignore
Kbuild
Kconfig x86/sev: Carve out and export SNP guest messaging init routines 2025-01-07 10:33:20 +01:00
Kconfig.assembler
Kconfig.cpu
Kconfig.debug
Makefile
Makefile.postlink
Makefile.um
Makefile_32.cpu