[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20241220020005.3526402-1-seanjc@google.com>
Date: Thu, 19 Dec 2024 18:00:05 -0800
From: Sean Christopherson <seanjc@...gle.com>
To: Paolo Bonzini <pbonzini@...hat.com>
Cc: kvm@...r.kernel.org, linux-kernel@...r.kernel.org,
Sean Christopherson <seanjc@...gle.com>
Subject: [GIT PULL] KVM: x86: Fixes for 6.13-rcN
I'm a moron and initially based this on kvm/next, and didn't notice until the
diffstat for the pull request was absurdly large. As a result, all commits
were *just* rebased, like 5 minutes ago.
I smoke tested the branch, but didn't do anywhere near my usual level of testing.
I'm sending it now, because I suspect it'll be far easier on you to get this
today, and because we've probably got bigger problems if these don't work on
kvm/master.
*sigh*
The following changes since commit 7d4050728c83aa63828494ad0f4d0eb4faf5f97a:
Merge tag 'vfs-6.13-rc1.fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/vfs/vfs (2024-11-27 08:11:46 -0800)
are available in the Git repository at:
https://github.com/kvm-x86/linux.git tags/kvm-x86-fixes-6.13-rcN
for you to fetch changes up to 386d69f9f29b0814881fa4f92ac7b8dfa9b4f44a:
KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed (2024-12-19 17:47:52 -0800)
----------------------------------------------------------------
KVM x86 fixes for 6.13:
- Disable AVIC on SNP-enabled systems that don't allow writes to the virtual
APIC page, as such hosts will hit unexpected RMP #PFs in the host when
running VMs of any flavor.
- Fix a WARN in the hypercall completion path due to KVM trying to determine
if a guest with protected register state is in 64-bit mode (KVM's ABI is to
assume such guests only make hypercalls in 64-bit mode).
- Allow the guest to write to supported bits in MSR_AMD64_DE_CFG to fix a
regression with Windows guests, and because KVM's read-only behavior appears
to be entirely made up.
- Treat TDP MMU faults as spurious if the faulting access is allowed given the
existing SPTE. This fixes a benign WARN (other than the WARN itself) due to
unexpectedly replacing a writable SPTE with a read-only SPTE.
----------------------------------------------------------------
Sean Christopherson (3):
KVM: x86: Play nice with protected guests in complete_hypercall_exit()
KVM: SVM: Allow guest writes to set MSR_AMD64_DE_CFG bits
KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed
Suravee Suthikulpanit (1):
KVM: SVM: Disable AVIC on SNP-enabled system without HvInUseWrAllowed feature
arch/x86/include/asm/cpufeatures.h | 1 +
arch/x86/kvm/mmu/mmu.c | 12 ------------
arch/x86/kvm/mmu/spte.h | 17 +++++++++++++++++
arch/x86/kvm/mmu/tdp_mmu.c | 5 +++++
arch/x86/kvm/svm/avic.c | 6 ++++++
arch/x86/kvm/svm/svm.c | 9 ---------
arch/x86/kvm/x86.c | 2 +-
7 files changed, 30 insertions(+), 22 deletions(-)
Powered by blists - more mailing lists