diff options
| author | 2022-08-30 15:37:19 +0200 | |
|---|---|---|
| committer | 2022-09-26 12:02:47 -0400 | |
| commit | 4da77090b0fcec1aa430e67631a1474343a33738 (patch) | |
| tree | 77de6c389ad807036971e1c9aa2c1dd25489903f /tools/testing/selftests/exec/git:/ssh: | |
| parent | KVM: nVMX: WARN once and fail VM-Enter if eVMCS sees VMFUNC[63:32] != 0 (diff) | |
| download | linux-dev-4da77090b0fcec1aa430e67631a1474343a33738.tar.xz linux-dev-4da77090b0fcec1aa430e67631a1474343a33738.zip | |
KVM: nVMX: Support PERF_GLOBAL_CTRL with enlightened VMCS
Enlightened VMCS v1 got updated and now includes the required fields
for loading PERF_GLOBAL_CTRL upon VMENTER/VMEXIT features. For KVM on
Hyper-V enablement, KVM can just observe VMX control MSRs and use the
features (with or without eVMCS) when possible.
Hyper-V on KVM is messier as Windows 11 guests fail to boot if the
controls are advertised and a new PV feature flag, CPUID.0x4000000A.EBX
BIT(0), is not set. Honor the Hyper-V CPUID feature flag to play nice
with Windows guests.
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
Link: https://lore.kernel.org/r/20220830133737.1539624-16-vkuznets@redhat.com
Signed-off-by: Sean Christopherson <seanjc@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'tools/testing/selftests/exec/git:/ssh:')
0 files changed, 0 insertions, 0 deletions
