]> www.infradead.org Git - users/jedix/linux-maple.git/commit
x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests
authorNikunj A Dadhania <nikunj@amd.com>
Mon, 6 Jan 2025 12:46:28 +0000 (18:16 +0530)
committerBorislav Petkov (AMD) <bp@alien8.de>
Tue, 7 Jan 2025 20:26:20 +0000 (21:26 +0100)
commiteef679a4b52e35be3b4a982a7f42bcc16054ec62
tree82aae4a35f53c7ba6712c19d8c11cf5e500042cb
parent38cc6495cdec18a448b9e1de45fedce4118833a2
x86/sev: Prevent RDTSC/RDTSCP interception for Secure TSC enabled guests

The hypervisor should not be intercepting RDTSC/RDTSCP when Secure TSC is
enabled. A #VC exception will be generated if the RDTSC/RDTSCP instructions
are being intercepted. If this should occur and Secure TSC is enabled,
guest execution should be terminated as the guest cannot rely on the TSC
value provided by the hypervisor.

Signed-off-by: Nikunj A Dadhania <nikunj@amd.com>
Signed-off-by: Borislav Petkov (AMD) <bp@alien8.de>
Reviewed-by: Tom Lendacky <thomas.lendacky@amd.com>
Tested-by: Peter Gonda <pgonda@google.com>
Link: https://lore.kernel.org/r/20250106124633.1418972-9-nikunj@amd.com
arch/x86/coco/sev/shared.c