KVM: SVM: Don't allow nested guest to VMMCALL into host
commit87557bf5f6a941708534ae8f5f83cd68988d5063
authorJoerg Roedel <joerg.roedel@amd.com>
Wed, 5 May 2010 14:04:45 +0000 (5 16:04 +0200)
committerGreg Kroah-Hartman <gregkh@suse.de>
Mon, 5 Jul 2010 18:23:06 +0000 (5 11:23 -0700)
treefec537db6667cbb54f4e064e7eeff15d27a52d6b
parentce9fea841204616bc21fe42bdfbd60db8ae12d9e
KVM: SVM: Don't allow nested guest to VMMCALL into host

This patch disables the possibility for a l2-guest to do a
VMMCALL directly into the host. This would happen if the
l1-hypervisor doesn't intercept VMMCALL and the l2-guest
executes this instruction.

Signed-off-by: Joerg Roedel <joerg.roedel@amd.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@suse.de>
(Cherry-picked from commit 0d945bd9351199744c1e89d57a70615b6ee9f394)
arch/x86/kvm/svm.c