• Sean Christopherson's avatar
    KVM: nVMX: Don't stuff secondary execution control if it's not supported · a0860d68
    Sean Christopherson authored
    
    
    When stuffing the allowed secondary execution controls for nested VMX in
    response to CPUID updates, don't set the allowed-1 bit for a feature that
    isn't supported by KVM, i.e. isn't allowed by the canonical vmcs_config.
    
    WARN if KVM attempts to manipulate a feature that isn't supported.  All
    features that are currently stuffed are always advertised to L1 for
    nested VMX if they are supported in KVM's base configuration, and no
    additional features should ever be added to the CPUID-induced stuffing
    (updating VMX MSRs in response to CPUID updates is a long-standing KVM
    flaw that is slowly being fixed).
    Signed-off-by: default avatarSean Christopherson <seanjc@google.com>
    Message-Id: <20221213062306.667649-3-seanjc@google.com>
    Signed-off-by: default avatarPaolo Bonzini <pbonzini@redhat.com>
    a0860d68
vmx.c 244 KB