KVM: SVM: Don't allow nested guest to VMMCALL into host
authorJoerg Roedel <joerg.roedel@amd.com>
Wed, 5 May 2010 14:04:45 +0000 (16:04 +0200)
committerGreg Kroah-Hartman <gregkh@suse.de>
Mon, 5 Jul 2010 18:16:16 +0000 (11:16 -0700)
commit9ec38fcb983c4c11b7b2cebbc6dc4361ffdc58e2
treeb752a6dd345edccc6620f4e4a671ca380b554381
parentf7461bdc19bb04af2bd14b2936a485bbcfd9fb02
KVM: SVM: Don't allow nested guest to VMMCALL into host

This patch disables the possibility for a l2-guest to do a
VMMCALL directly into the host. This would happen if the
l1-hypervisor doesn't intercept VMMCALL and the l2-guest
executes this instruction.

Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
(cherry picked from commit 0d945bd9351199744c1e89d57a70615b6ee9f394)
arch/x86/kvm/svm.c