-
- Downloads
Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
Pull KVM x86 fixes from Paolo Bonzini: - Disable AVIC on SNP-enabled systems that don't allow writes to the virtual APIC page, as such hosts will hit unexpected RMP #PFs in the host when running VMs of any flavor. - Fix a WARN in the hypercall completion path due to KVM trying to determine if a guest with protected register state is in 64-bit mode (KVM's ABI is to assume such guests only make hypercalls in 64-bit mode). - Allow the guest to write to supported bits in MSR_AMD64_DE_CFG to fix a regression with Windows guests, and because KVM's read-only behavior appears to be entirely made up. - Treat TDP MMU faults as spurious if the faulting access is allowed given the existing SPTE. This fixes a benign WARN (other than the WARN itself) due to unexpectedly replacing a writable SPTE with a read-only SPTE. - Emit a warning when KVM is configured with ignore_msrs=1 and also to hide the MSRs that the guest is looking for from the kernel logs. ignore_msrs can trick guests into assuming that certain processor features are present, and this in turn leads to bogus bug reports. * tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm: KVM: x86: let it be known that ignore_msrs is a bad idea KVM: VMX: don't include '<linux/find.h>' directly KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits KVM: x86: Play nice with protected guests in complete_hypercall_exit() KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature
Showing
- arch/x86/include/asm/cpufeatures.h 1 addition, 0 deletionsarch/x86/include/asm/cpufeatures.h
- arch/x86/kvm/mmu/mmu.c 0 additions, 12 deletionsarch/x86/kvm/mmu/mmu.c
- arch/x86/kvm/mmu/spte.h 17 additions, 0 deletionsarch/x86/kvm/mmu/spte.h
- arch/x86/kvm/mmu/tdp_mmu.c 5 additions, 0 deletionsarch/x86/kvm/mmu/tdp_mmu.c
- arch/x86/kvm/svm/avic.c 6 additions, 0 deletionsarch/x86/kvm/svm/avic.c
- arch/x86/kvm/svm/svm.c 0 additions, 9 deletionsarch/x86/kvm/svm/svm.c
- arch/x86/kvm/vmx/posted_intr.h 1 addition, 1 deletionarch/x86/kvm/vmx/posted_intr.h
- arch/x86/kvm/x86.c 8 additions, 1 deletionarch/x86/kvm/x86.c
Loading
Please register or sign in to comment