[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-Id: <20201005195532.8674-1-sean.j.christopherson@intel.com>
Date: Mon, 5 Oct 2020 12:55:30 -0700
From: Sean Christopherson <sean.j.christopherson@...el.com>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: Sean Christopherson <sean.j.christopherson@...el.com>,
Vitaly Kuznetsov <vkuznets@...hat.com>,
Wanpeng Li <wanpengli@...cent.com>,
Jim Mattson <jmattson@...gle.com>,
Joerg Roedel <joro@...tes.org>, kvm@...r.kernel.org,
linux-kernel@...r.kernel.org, Alexander Graf <graf@...zon.com>,
Aaron Lewis <aaronlewis@...gle.com>,
Peter Xu <peterx@...hat.com>
Subject: [PATCH 0/2] KVM: VMX: x2APIC + APICV MSR fix and cleanup
Patch 1 is an unofficial patch from Peter to fix x2APIC MSR interception
on non-APICV systems. As Peter suggested, it really should be squashed
with commit 3eb900173c71 ("KVM: x86: VMX: Prevent MSR passthrough when MSR
access is denied"). Without the fix, KVM is completely busted on
non-APICV systems.
Patch 2 is a cleanup of sorts to revert back to the pre-filtering approach
of initializing the x2APIC MSR bitmaps for APICV.
Note, I haven't tested on an APICV system. My APICV system appears to
have crashed over the weekend and I haven't yet journeyed back to the
lab to kick it.
Peter Xu (1):
KVM: VMX: Fix x2APIC MSR intercept handling on !APICV platforms
Sean Christopherson (1):
KVM: VMX: Ignore userspace MSR filters for x2APIC when APICV is
enabled
arch/x86/kvm/vmx/vmx.c | 45 ++++++++++++++++++++++++++++--------------
1 file changed, 30 insertions(+), 15 deletions(-)
--
2.28.0
Powered by blists - more mailing lists