]> xenbits.xensource.com Git - xen.git/commit
x86/vvmx: Fix the use of RDTSCP when it is intercepted at L0
authorAndrew Cooper <andrew.cooper3@citrix.com>
Mon, 25 Nov 2019 14:50:44 +0000 (15:50 +0100)
committerJan Beulich <jbeulich@suse.com>
Mon, 25 Nov 2019 14:50:44 +0000 (15:50 +0100)
commit58668f12a6e65cd6a384abad001ff5dae69b161f
tree7656c0c3e7fac36198affb17ee06f1c13d9f028e
parent0138da196c8c334589a25144d4d69bf6553e2658
x86/vvmx: Fix the use of RDTSCP when it is intercepted at L0

Linux has started using RDTSCP as of v5.1.  This has highlighted a bug in Xen,
where virtual vmexit simply gives up.

  (XEN) d1v1 Unhandled nested vmexit: reason 51
  (XEN) domain_crash called from vvmx.c:2671
  (XEN) Domain 1 (vcpu#1) crashed on cpu#2:

Handle RDTSCP in the virtual vmexit hander in the same was as RDTSC
intercepts.

Reported-by: Sarah Newman <srn@prgmr.com>
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
Tested-by: Chris Brannon <cmb@prgmr.com>
Reviewed-by: Wei Liu <wl@xen.org>
master commit: 9257c218e56e9902b78662e5852d69329b9cc204
master date: 2019-10-23 16:43:48 +0100
xen/arch/x86/hvm/vmx/vvmx.c