diff options
author | Sean Christopherson <sean.j.christopherson@intel.com> | 2019-04-02 08:03:11 -0700 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2019-04-16 15:37:36 +0200 |
commit | 9ec19493fb86d6d5fbf9286b94ff21e56ef66376 (patch) | |
tree | 3de9d350da3033b6ba31a107b6b05cc73cbdafa8 /fs/ntfs/mft.c | |
parent | c5833c7a43a66bfe2f36439cb2f1281a588668af (diff) | |
download | linux-stable-9ec19493fb86d6d5fbf9286b94ff21e56ef66376.tar.gz linux-stable-9ec19493fb86d6d5fbf9286b94ff21e56ef66376.tar.bz2 linux-stable-9ec19493fb86d6d5fbf9286b94ff21e56ef66376.zip |
KVM: x86: clear SMM flags before loading state while leaving SMM
RSM emulation is currently broken on VMX when the interrupted guest has
CR4.VMXE=1. Stop dancing around the issue of HF_SMM_MASK being set when
loading SMSTATE into architectural state, e.g. by toggling it for
problematic flows, and simply clear HF_SMM_MASK prior to loading
architectural state (from SMRAM save state area).
Reported-by: Jon Doron <arilou@gmail.com>
Cc: Jim Mattson <jmattson@google.com>
Cc: Liran Alon <liran.alon@oracle.com>
Cc: Vitaly Kuznetsov <vkuznets@redhat.com>
Fixes: 5bea5123cbf0 ("KVM: VMX: check nested state and CR4.VMXE against SMM")
Signed-off-by: Sean Christopherson <sean.j.christopherson@intel.com>
Tested-by: Vitaly Kuznetsov <vkuznets@redhat.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'fs/ntfs/mft.c')
0 files changed, 0 insertions, 0 deletions