@@ -4214,7 +4214,9 @@ whether or not KVM_CAP_X86_USER_SPACE_MSR's KVM_MSR_EXIT_REASON_FILTER is
4214
4214
enabled. If KVM_MSR_EXIT_REASON_FILTER is enabled, KVM will exit to userspace
4215
4215
on denied accesses, i.e. userspace effectively intercepts the MSR access. If
4216
4216
KVM_MSR_EXIT_REASON_FILTER is not enabled, KVM will inject a #GP into the guest
4217
- on denied accesses.
4217
+ on denied accesses. Note, if an MSR access is denied during emulation of MSR
4218
+ load/stores during VMX transitions, KVM ignores KVM_MSR_EXIT_REASON_FILTER.
4219
+ See the below warning for full details.
4218
4220
4219
4221
If an MSR access is allowed by userspace, KVM will emulate and/or virtualize
4220
4222
the access in accordance with the vCPU model. Note, KVM may still ultimately
@@ -4229,9 +4231,22 @@ filtering. In that mode, ``KVM_MSR_FILTER_DEFAULT_DENY`` is invalid and causes
4229
4231
an error.
4230
4232
4231
4233
.. warning ::
4232
- MSR accesses as part of nested VM-Enter/VM-Exit are not filtered.
4233
- This includes both writes to individual VMCS fields and reads/writes
4234
- through the MSR lists pointed to by the VMCS.
4234
+ MSR accesses that are side effects of instruction execution (emulated or
4235
+ native) are not filtered as hardware does not honor MSR bitmaps outside of
4236
+ RDMSR and WRMSR, and KVM mimics that behavior when emulating instructions
4237
+ to avoid pointless divergence from hardware. E.g. RDPID reads MSR_TSC_AUX,
4238
+ SYSENTER reads the SYSENTER MSRs, etc.
4239
+
4240
+ MSRs that are loaded/stored via dedicated VMCS fields are not filtered as
4241
+ part of VM-Enter/VM-Exit emulation.
4242
+
4243
+ MSRs that are loaded/store via VMX's load/store lists _are_ filtered as part
4244
+ of VM-Enter/VM-Exit emulation. If an MSR access is denied on VM-Enter, KVM
4245
+ synthesizes a consistency check VM-Exit(EXIT_REASON_MSR_LOAD_FAIL). If an
4246
+ MSR access is denied on VM-Exit, KVM synthesizes a VM-Abort. In short, KVM
4247
+ extends Intel's architectural list of MSRs that cannot be loaded/saved via
4248
+ the VM-Enter/VM-Exit MSR list. It is platform owner's responsibility to
4249
+ to communicate any such restrictions to their end users.
4235
4250
4236
4251
x2APIC MSR accesses cannot be filtered (KVM silently ignores filters that
4237
4252
cover any x2APIC MSRs).
@@ -8082,6 +8097,14 @@ KVM_X86_QUIRK_MWAIT_NEVER_UD_FAULTS By default, KVM emulates MONITOR/MWAIT (if
8082
8097
guest CPUID on writes to MISC_ENABLE if
8083
8098
KVM_X86_QUIRK_MISC_ENABLE_NO_MWAIT is
8084
8099
disabled.
8100
+
8101
+ KVM_X86_QUIRK_SLOT_ZAP_ALL By default, KVM invalidates all SPTEs in
8102
+ fast way for memslot deletion when VM type
8103
+ is KVM_X86_DEFAULT_VM.
8104
+ When this quirk is disabled or when VM type
8105
+ is other than KVM_X86_DEFAULT_VM, KVM zaps
8106
+ only leaf SPTEs that are within the range of
8107
+ the memslot being deleted.
8085
8108
=================================== ============================================
8086
8109
8087
8110
7.32 KVM_CAP_MAX_VCPU_ID
0 commit comments