• P
    KVM: VMX: Forbid userspace MSR filters for x2APIC · 043248b3
    Paolo Bonzini 提交于
    Allowing userspace to intercept reads to x2APIC MSRs when APICV is
    fully enabled for the guest simply can't work.   But more in general,
    the LAPIC could be set to in-kernel after the MSR filter is setup
    and allowing accesses by userspace would be very confusing.
    
    We could in principle allow userspace to intercept reads and writes to TPR,
    and writes to EOI and SELF_IPI, but while that could be made it work, it
    would still be silly.
    
    Cc: Alexander Graf <graf@amazon.com>
    Cc: Aaron Lewis <aaronlewis@google.com>
    Cc: Peter Xu <peterx@redhat.com>
    Cc: Sean Christopherson <sean.j.christopherson@intel.com>
    Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
    043248b3
api.rst 208.8 KB