1. 21 Oct, 2020 3 commits
    • Li Qiang's avatar
      Documentation: kvm: fix a typo · 10f79cca
      Li Qiang authored
      Fixes: e287d6de ("Documentation: kvm: Convert cpuid.txt to .rst")
      Signed-off-by: default avatarLi Qiang <liq3ea@163.com>
      Message-Id: <20201001095333.7611-1-liq3ea@163.com>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      10f79cca
    • Paolo Bonzini's avatar
      KVM: VMX: Forbid userspace MSR filters for x2APIC · 043248b3
      Paolo Bonzini authored
      Allowing userspace to intercept reads to x2APIC MSRs when APICV is
      fully enabled for the guest simply can't work.   But more in general,
      the LAPIC could be set to in-kernel after the MSR filter is setup
      and allowing accesses by userspace would be very confusing.
      
      We could in principle allow userspace to intercept reads and writes to TPR,
      and writes to EOI and SELF_IPI, but while that could be made it work, it
      would still be silly.
      
      Cc: Alexander Graf <graf@amazon.com>
      Cc: Aaron Lewis <aaronlewis@google.com>
      Cc: Peter Xu <peterx@redhat.com>
      Cc: Sean Christopherson <sean.j.christopherson@intel.com>
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      043248b3
    • Sean Christopherson's avatar
      KVM: VMX: Ignore userspace MSR filters for x2APIC · 9389b9d5
      Sean Christopherson authored
      Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore userspace
      filtering.  Allowing userspace to intercept reads to x2APIC MSRs when
      APICV is fully enabled for the guest simply can't work; the LAPIC and thus
      virtual APIC is in-kernel and cannot be directly accessed by userspace.
      To keep things simple we will in fact forbid intercepting x2APIC MSRs
      altogether, independent of the default_allow setting.
      
      Cc: Alexander Graf <graf@amazon.com>
      Cc: Aaron Lewis <aaronlewis@google.com>
      Cc: Peter Xu <peterx@redhat.com>
      Signed-off-by: default avatarSean Christopherson <sean.j.christopherson@intel.com>
      Message-Id: <20201005195532.8674-3-sean.j.christopherson@intel.com>
      [Modified to operate even if APICv is disabled, adjust documentation. - Paolo]
      Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
      9389b9d5
  2. 20 Oct, 2020 1 commit
  3. 19 Oct, 2020 1 commit
  4. 02 Oct, 2020 4 commits
  5. 30 Sep, 2020 12 commits
  6. 29 Sep, 2020 19 commits