linux_dsm_epyc7002/arch/x86/kvm/vmx
Sean Christopherson 9389b9d5d3 KVM: VMX: Ignore userspace MSR filters for x2APIC
Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore userspace
filtering.  Allowing userspace to intercept reads to x2APIC MSRs when
APICV is fully enabled for the guest simply can't work; the LAPIC and thus
virtual APIC is in-kernel and cannot be directly accessed by userspace.
To keep things simple we will in fact forbid intercepting x2APIC MSRs
altogether, independent of the default_allow setting.

Cc: Alexander Graf <graf@amazon.com>
Cc: Aaron Lewis <aaronlewis@google.com>
Cc: Peter Xu <peterx@redhat.com>
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Message-Id: <20201005195532.8674-3-sean.j.christopherson@intel.com>
[Modified to operate even if APICv is disabled, adjust documentation. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2020-10-21 17:36:19 -04:00
..
capabilities.h KVM: VMX: Rename RDTSCP secondary exec control name to insert "ENABLE" 2020-09-28 07:57:30 -04:00
evmcs.c
evmcs.h
nested.c KVM: x86: rename KVM_REQ_GET_VMCS12_PAGES 2020-09-28 07:58:49 -04:00
nested.h
pmu_intel.c
posted_intr.c KVM: VMX: Extract posted interrupt support to separate files 2020-09-28 07:57:38 -04:00
posted_intr.h KVM: VMX: Extract posted interrupt support to separate files 2020-09-28 07:57:38 -04:00
vmcs12.c
vmcs12.h
vmcs_shadow_fields.h
vmcs.h KVM: VMX: Add a helper to test for a valid error code given an intr info 2020-09-28 07:57:50 -04:00
vmenter.S KVM: VMX: Move IRQ invocation to assembly subroutine 2020-09-28 07:57:20 -04:00
vmx_ops.h KVM: VMX: Rename ops.h to vmx_ops.h 2020-09-28 07:57:38 -04:00
vmx.c KVM: VMX: Ignore userspace MSR filters for x2APIC 2020-10-21 17:36:19 -04:00
vmx.h KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied 2020-09-28 07:58:07 -04:00