x86/svm: correct EFER.SVME intercept checks
authorBrian Woods <brian.woods@amd.com>
Mon, 5 Feb 2018 09:15:25 +0000 (10:15 +0100)
committerJan Beulich <jbeulich@suse.com>
Mon, 5 Feb 2018 09:15:25 +0000 (10:15 +0100)
commit4619bff28cc709d0fea32494bda1786e63338295
tree8e1ff26e99640f6f839c51e1c8a65dcd2e0a1c1f
parent05bb1116b8c1fc42527bf3b2406eef86a27e3dc3
x86/svm: correct EFER.SVME intercept checks

Corrects some EFER.SVME checks in intercepts.  See AMD APM vol2 section
15.4 for more details.  VMMCALL isn't checked due to guests needing it
to boot.

Reported-by: Andrew Cooper <andrew.cooper3@citrix.com>
Signed-off-by: Brian Woods <brian.woods@amd.com>
Reviewed-by: Boris Ostrovsky <boris.ostrovsky@oracle.com>
xen/arch/x86/hvm/svm/nestedsvm.c
xen/arch/x86/hvm/svm/svm.c