Re: [PATCH 3/3] KVM: x86: clear SMM flags before loading state while leaving SMM

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Vitaly Kuznetsov <vkuznets@xxxxxxxxxx> writes:

> Sean Christopherson <sean.j.christopherson@xxxxxxxxx> writes:
>
>> RSM emulation is currently broken on VMX when the interrupted guest has
>> CR4.VMXE=1.  Stop dancing around the issue of HF_SMM_MASK being set when
>> loading SMSTATE into architectural state, e.g. by toggling it for
>> problematic flows, and simply clear HF_SMM_MASK prior to loading
>> architectural state (from SMRAM save state area).
>>
>> Reported-by: Jon Doron <arilou@xxxxxxxxx>
>> Cc: Jim Mattson <jmattson@xxxxxxxxxx>
>> Cc: Liran Alon <liran.alon@xxxxxxxxxx>
>> Cc: Vitaly Kuznetsov <vkuznets@xxxxxxxxxx>
>> Fixes: 5bea5123cbf0 ("KVM: VMX: check nested state and CR4.VMXE against SMM")
>> Signed-off-by: Sean Christopherson <sean.j.christopherson@xxxxxxxxx>
>
> I checked Hyper-V 2019 + secureboot on both VMX and SVM and they seem to
> boot fine. So,

Doh, it actually was Hyper-V 2016, not 2019.

-- 
Vitaly



[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]

  Powered by Linux