Re: [PATCH v2] i386/kvm: Disable hypercall patching quirk by default

2025-07-23 Thread Xiaoyao Li
On 7/23/2025 4:42 PM, Xiaoyao Li wrote: On 7/23/2025 3:53 PM, Mathias Krause wrote: I would leave it to Paolo to decide whether a compat property is needed to disable the hypercall patching by default for newer machine, and keep the old machine with old behavior (hypercall patching is enabled) b

Re: [PATCH v2] i386/kvm: Disable hypercall patching quirk by default

2025-07-23 Thread Xiaoyao Li
On 7/23/2025 3:53 PM, Mathias Krause wrote: I would leave it to Paolo to decide whether a compat property is needed to disable the hypercall patching by default for newer machine, and keep the old machine with old behavior (hypercall patching is enabled) by default. Bleh, I just noticed that the

Re: [PATCH v2] i386/kvm: Disable hypercall patching quirk by default

2025-07-23 Thread Mathias Krause
On 23.07.25 08:54, Xiaoyao Li wrote: > On 7/23/2025 4:43 AM, Mathias Krause wrote: >> KVM has a weird behaviour when a guest executes VMCALL on an AMD system >> or VMMCALL on an Intel CPU. Both naturally generate an invalid opcode >> exception (#UD) as they are just the wrong instruction for the CP

Re: [PATCH v2] i386/kvm: Disable hypercall patching quirk by default

2025-07-22 Thread Xiaoyao Li
On 7/23/2025 4:43 AM, Mathias Krause wrote: KVM has a weird behaviour when a guest executes VMCALL on an AMD system or VMMCALL on an Intel CPU. Both naturally generate an invalid opcode exception (#UD) as they are just the wrong instruction for the CPU given. But instead of forwarding the excepti

[PATCH v2] i386/kvm: Disable hypercall patching quirk by default

2025-07-22 Thread Mathias Krause
KVM has a weird behaviour when a guest executes VMCALL on an AMD system or VMMCALL on an Intel CPU. Both naturally generate an invalid opcode exception (#UD) as they are just the wrong instruction for the CPU given. But instead of forwarding the exception to the guest, KVM tries to patch the guest