]> git.baikalelectronics.ru Git - kernel.git/commit
KVM: VMX: Forbid userspace MSR filters for x2APIC
authorPaolo Bonzini <pbonzini@redhat.com>
Tue, 20 Oct 2020 14:57:01 +0000 (10:57 -0400)
committerPaolo Bonzini <pbonzini@redhat.com>
Wed, 21 Oct 2020 21:36:24 +0000 (17:36 -0400)
commit1d97e38c8e06f748479f702d2e71bb14cb6c431a
tree9f89c66f4f9942396c4de8151717b3b179f35232
parent3f0062fd7a16e493533eb5aa38b80242f89b001c
KVM: VMX: Forbid userspace MSR filters for x2APIC

Allowing userspace to intercept reads to x2APIC MSRs when APICV is
fully enabled for the guest simply can't work.   But more in general,
the LAPIC could be set to in-kernel after the MSR filter is setup
and allowing accesses by userspace would be very confusing.

We could in principle allow userspace to intercept reads and writes to TPR,
and writes to EOI and SELF_IPI, but while that could be made it work, it
would still be silly.

Cc: Alexander Graf <graf@amazon.com>
Cc: Aaron Lewis <aaronlewis@google.com>
Cc: Peter Xu <peterx@redhat.com>
Cc: Sean Christopherson <sean.j.christopherson@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Documentation/virt/kvm/api.rst
arch/x86/kvm/x86.c