linux_dsm_epyc7002/arch/x86/kvm/vmx
Sean Christopherson 9ec19493fb KVM: x86: clear SMM flags before loading state while leaving SMM
RSM emulation is currently broken on VMX when the interrupted guest has
CR4.VMXE=1.  Stop dancing around the issue of HF_SMM_MASK being set when
loading SMSTATE into architectural state, e.g. by toggling it for
problematic flows, and simply clear HF_SMM_MASK prior to loading
architectural state (from SMRAM save state area).

Reported-by: Jon Doron <arilou@gmail.com>
Cc: Jim Mattson <jmattson@google.com>
Cc: Liran Alon <liran.alon@oracle.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Fixes: 5bea5123cb ("KVM: VMX: check nested state and CR4.VMXE against SMM")
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Tested-by: Vitaly Kuznetsov <vkuznets@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-04-16 15:37:36 +02:00
..
capabilities.h KVM: x86: Add Intel PT virtualization work mode 2018-12-21 11:28:34 +01:00
evmcs.c x86/kvm/hyper-v: nested_enable_evmcs() sets vmcs_version incorrectly 2019-01-25 19:11:37 +01:00
evmcs.h x86/kvm/hyper-v: Introduce nested_get_evmcs_version() helper 2018-12-14 17:59:54 +01:00
nested.c KVM: nVMX: always use early vmcs check when EPT is disabled 2019-04-16 15:37:12 +02:00
nested.h KVM: nVMX: Move nested code to dedicated files 2018-12-14 17:59:46 +01:00
ops.h KVM: VMX: Move VMX instruction wrappers to a dedicated header file 2018-12-14 17:17:27 +01:00
pmu_intel.c
vmcs12.c KVM: nVMX: Move vmcs12 code to dedicated files 2018-12-14 12:34:30 +01:00
vmcs12.h KVM: nVMX: Move vmcs12 code to dedicated files 2018-12-14 12:34:30 +01:00
vmcs_shadow_fields.h
vmcs.h KVM: nVMX: Cache host_rsp on a per-VMCS basis 2019-02-12 13:12:22 +01:00
vmenter.S KVM: VMX: Reorder clearing of registers in the vCPU-run assembly flow 2019-02-20 22:48:18 +01:00
vmx.c KVM: x86: clear SMM flags before loading state while leaving SMM 2019-04-16 15:37:36 +02:00
vmx.h KVM: nVMX: allow tests to use bad virtual-APIC page address 2019-04-16 10:59:07 +02:00