KVM: SVM: Don't try to pointlessly single-step SEV-ES guests for NMI window
authorSean Christopherson <seanjc@google.com>
Thu, 15 Jun 2023 06:37:57 +0000 (16:37 +1000)
committerSean Christopherson <seanjc@google.com>
Fri, 28 Jul 2023 23:13:43 +0000 (16:13 -0700)
commita6bb5709029756a6151afed0eec26ba2bfabed51
tree5da00559c390f412f46737f589073008c25969c4
parent389fbbec261b2842fd0e34b26a2b288b122cc406
KVM: SVM: Don't try to pointlessly single-step SEV-ES guests for NMI window

Bail early from svm_enable_nmi_window() for SEV-ES guests without trying
to enable single-step of the guest, as single-stepping an SEV-ES guest is
impossible and the guest is responsible for *telling* KVM when it is ready
for an new NMI to be injected.

Functionally, setting TF and RF in svm->vmcb->save.rflags is benign as the
field is ignored by hardware, but it's all kinds of confusing.

Signed-off-by: Alexey Kardashevskiy <aik@amd.com>
Link: https://lore.kernel.org/r/20230615063757.3039121-10-aik@amd.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
arch/x86/kvm/svm/svm.c