Re: [PATCH 2/2] KVM: VMX: Ignore userspace MSR filters for x2APIC when APICV is enabled

2020-10-19 Thread Paolo Bonzini
On 07/10/20 18:44, Peter Xu wrote: > If we want to forbid apicv msrs, should we even fail KVM_X86_SET_MSR_FILTER > directly then? Yes, probably it should. I'll send a patch shortly. Paolo

Re: [PATCH 2/2] KVM: VMX: Ignore userspace MSR filters for x2APIC when APICV is enabled

2020-10-07 Thread Peter Xu
On Wed, Oct 07, 2020 at 04:01:59PM +0200, Alexander Graf wrote: > > > On 05.10.20 21:55, Sean Christopherson wrote: > > > > Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore > > userspace filtering when APICV is enabled. Allowing userspace to > > intercept reads to x2APIC MSRs

Re: [PATCH 2/2] KVM: VMX: Ignore userspace MSR filters for x2APIC when APICV is enabled

2020-10-07 Thread Alexander Graf
On 05.10.20 21:55, Sean Christopherson wrote: Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore userspace filtering when APICV is enabled. Allowing userspace to intercept reads to x2APIC MSRs when APICV is fully enabled for the guest simply can't work. The LAPIC and thus

[PATCH 2/2] KVM: VMX: Ignore userspace MSR filters for x2APIC when APICV is enabled

2020-10-05 Thread Sean Christopherson
Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore userspace filtering when APICV is enabled. Allowing userspace to intercept reads to x2APIC MSRs when APICV is fully enabled for the guest simply can't work. The LAPIC and thus virtual APIC is in-kernel and cannot be directly