diff options
author | 2024-12-22 12:59:33 -0500 | |
---|---|---|
committer | 2024-12-22 12:59:33 -0500 | |
commit | 10b2c8a67c4b8ec15f9d07d177f63b563418e948 (patch) | |
tree | 8979d344d5567661ef536e83d202afcc3bab2bb2 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | Merge tag 'kvm-selftests-treewide-6.14' of https://github.com/kvm-x86/linux into HEAD (diff) | |
parent | KVM: x86/mmu: Treat TDP MMU faults as spurious if access is already allowed (diff) | |
download | linux-rng-10b2c8a67c4b8ec15f9d07d177f63b563418e948.tar.xz linux-rng-10b2c8a67c4b8ec15f9d07d177f63b563418e948.zip |
Merge tag 'kvm-x86-fixes-6.13-rcN' of https://github.com/kvm-x86/linux into HEAD
KVM x86 fixes for 6.13:
- Disable AVIC on SNP-enabled systems that don't allow writes to the virtual
APIC page, as such hosts will hit unexpected RMP #PFs in the host when
running VMs of any flavor.
- Fix a WARN in the hypercall completion path due to KVM trying to determine
if a guest with protected register state is in 64-bit mode (KVM's ABI is to
assume such guests only make hypercalls in 64-bit mode).
- Allow the guest to write to supported bits in MSR_AMD64_DE_CFG to fix a
regression with Windows guests, and because KVM's read-only behavior appears
to be entirely made up.
- Treat TDP MMU faults as spurious if the faulting access is allowed given the
existing SPTE. This fixes a benign WARN (other than the WARN itself) due to
unexpectedly replacing a writable SPTE with a read-only SPTE.
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions