diff options
author | Paolo Bonzini <pbonzini@redhat.com> | 2024-12-22 20:07:16 +0300 |
---|---|---|
committer | Paolo Bonzini <pbonzini@redhat.com> | 2024-12-22 20:07:16 +0300 |
commit | 8afa5b10af9d748b055a43949f819d9991d63938 (patch) | |
tree | e991f2e5e5ee5264c95a8fd39b5c256c3a4e21b7 /tools/perf/scripts/python/export-to-postgresql.py | |
parent | 398b7b6cb9e046f137a188670da12f790492b56b (diff) | |
parent | 386d69f9f29b0814881fa4f92ac7b8dfa9b4f44a (diff) | |
download | linux-8afa5b10af9d748b055a43949f819d9991d63938.tar.xz |
Merge tag 'kvm-x86-fixes-6.13-rcN' of https://github.com/kvm-x86/linux into HEAD
KVM x86 fixes for 6.13:
- Disable AVIC on SNP-enabled systems that don't allow writes to the virtual
APIC page, as such hosts will hit unexpected RMP #PFs in the host when
running VMs of any flavor.
- Fix a WARN in the hypercall completion path due to KVM trying to determine
if a guest with protected register state is in 64-bit mode (KVM's ABI is to
assume such guests only make hypercalls in 64-bit mode).
- Allow the guest to write to supported bits in MSR_AMD64_DE_CFG to fix a
regression with Windows guests, and because KVM's read-only behavior appears
to be entirely made up.
- Treat TDP MMU faults as spurious if the faulting access is allowed given the
existing SPTE. This fixes a benign WARN (other than the WARN itself) due to
unexpectedly replacing a writable SPTE with a read-only SPTE.
Diffstat (limited to 'tools/perf/scripts/python/export-to-postgresql.py')
0 files changed, 0 insertions, 0 deletions