diff options
author | 2023-05-09 03:23:48 +0000 | |
---|---|---|
committer | 2023-05-21 04:05:51 -0400 | |
commit | b9846a698c9aff4eb2214a06ac83638ad098f33f (patch) | |
tree | 44e609f3ef25d9456391cbea343b67ac83a22bab /scripts/generate_rust_analyzer.py | |
parent | KVM: x86: Don't adjust guest's CPUID.0x12.1 (allowed SGX enclave XFRM) (diff) | |
download | wireguard-linux-b9846a698c9aff4eb2214a06ac83638ad098f33f.tar.xz wireguard-linux-b9846a698c9aff4eb2214a06ac83638ad098f33f.zip |
KVM: VMX: add MSR_IA32_TSX_CTRL into msrs_to_save
Add MSR_IA32_TSX_CTRL into msrs_to_save[] to explicitly tell userspace to
save/restore the register value during migration. Missing this may cause
userspace that relies on KVM ioctl(KVM_GET_MSR_INDEX_LIST) fail to port the
value to the target VM.
In addition, there is no need to add MSR_IA32_TSX_CTRL when
ARCH_CAP_TSX_CTRL_MSR is not supported in kvm_get_arch_capabilities(). So
add the checking in kvm_probe_msr_to_save().
Fixes: c11f83e0626b ("KVM: vmx: implement MSR_IA32_TSX_CTRL disable RTM functionality")
Reported-by: Jim Mattson <jmattson@google.com>
Signed-off-by: Mingwei Zhang <mizhang@google.com>
Reviewed-by: Xiaoyao Li <xiaoyao.li@intel.com>
Reviewed-by: Jim Mattson <jmattson@google.com>
Message-Id: <20230509032348.1153070-1-mizhang@google.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions