On 07/10/20 18:44, Peter Xu wrote:
> If we want to forbid apicv msrs, should we even fail KVM_X86_SET_MSR_FILTER
> directly then?
Yes, probably it should. I'll send a patch shortly.
Paolo
On Wed, Oct 07, 2020 at 04:01:59PM +0200, Alexander Graf wrote:
>
>
> On 05.10.20 21:55, Sean Christopherson wrote:
> >
> > Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore
> > userspace filtering when APICV is enabled. Allowing userspace to
> > intercept reads to x2APIC MSRs
On 05.10.20 21:55, Sean Christopherson wrote:
Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore
userspace filtering when APICV is enabled. Allowing userspace to
intercept reads to x2APIC MSRs when APICV is fully enabled for the guest
simply can't work. The LAPIC and thus
Rework the resetting of the MSR bitmap for x2APIC MSRs to ignore
userspace filtering when APICV is enabled. Allowing userspace to
intercept reads to x2APIC MSRs when APICV is fully enabled for the guest
simply can't work. The LAPIC and thus virtual APIC is in-kernel and
cannot be directly
4 matches
Mail list logo