summaryrefslogtreecommitdiffstats
path: root/fs/ntfs/mft.c
diff options
context:
space:
mode:
authorSean Christopherson <sean.j.christopherson@intel.com>2019-04-02 08:03:11 -0700
committerPaolo Bonzini <pbonzini@redhat.com>2019-04-16 15:37:36 +0200
commit9ec19493fb86d6d5fbf9286b94ff21e56ef66376 (patch)
tree3de9d350da3033b6ba31a107b6b05cc73cbdafa8 /fs/ntfs/mft.c
parentc5833c7a43a66bfe2f36439cb2f1281a588668af (diff)
downloadlinux-stable-9ec19493fb86d6d5fbf9286b94ff21e56ef66376.tar.gz
linux-stable-9ec19493fb86d6d5fbf9286b94ff21e56ef66376.tar.bz2
linux-stable-9ec19493fb86d6d5fbf9286b94ff21e56ef66376.zip
KVM: x86: clear SMM flags before loading state while leaving SMM
RSM emulation is currently broken on VMX when the interrupted guest has CR4.VMXE=1. Stop dancing around the issue of HF_SMM_MASK being set when loading SMSTATE into architectural state, e.g. by toggling it for problematic flows, and simply clear HF_SMM_MASK prior to loading architectural state (from SMRAM save state area). Reported-by: Jon Doron <arilou@gmail.com> Cc: Jim Mattson <jmattson@google.com> Cc: Liran Alon <liran.alon@oracle.com> Cc: Vitaly Kuznetsov <vkuznets@redhat.com> Fixes: 5bea5123cbf0 ("KVM: VMX: check nested state and CR4.VMXE against SMM") Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com> Tested-by: Vitaly Kuznetsov <vkuznets@redhat.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'fs/ntfs/mft.c')
0 files changed, 0 insertions, 0 deletions