On Tue, 10 Jun 2025 16:20:02 -0700, Sean Christopherson wrote: > Preserve the host's FREEZE_IN_SMM setting by stuffing GUEST_DEBUGCTL, so that > SMM activity doesn't bleed into PMU events while running the guest. > > Along the way, enforce the supported set of DEBUGCTL bits when processing > vmcs12.GUEST_DEBUGCTL, as KVM can't rely on hardware to reject an MSR value > that is supported in hardware. > > [...] Applied to kvm-x86 misc, thanks! [1/8] KVM: TDX: Use kvm_arch_vcpu.host_debugctl to restore the host's DEBUGCTL https://github.com/kvm-x86/linux/commit/7d390a9da823 [2/8] KVM: x86: Convert vcpu_run()'s immediate exit param into a generic bitmap https://github.com/kvm-x86/linux/commit/2478b1b220c4 [3/8] KVM: x86: Drop kvm_x86_ops.set_dr6() in favor of a new KVM_RUN flag https://github.com/kvm-x86/linux/commit/80c64c7afea1 [4/8] KVM: VMX: Allow guest to set DEBUGCTL.RTM_DEBUG if RTM is supported https://github.com/kvm-x86/linux/commit/17ec2f965344 [5/8] KVM: VMX: Extract checking of guest's DEBUGCTL into helper https://github.com/kvm-x86/linux/commit/8a4351ac302c [6/8] KVM: nVMX: Check vmcs12->guest_ia32_debugctl on nested VM-Enter https://github.com/kvm-x86/linux/commit/095686e6fcb4 [7/8] KVM: VMX: Wrap all accesses to IA32_DEBUGCTL with getter/setter APIs https://github.com/kvm-x86/linux/commit/7d0cce6cbe71 [8/8] KVM: VMX: Preserve host's DEBUGCTLMSR_FREEZE_IN_SMM while running the guest https://github.com/kvm-x86/linux/commit/6b1dd26544d0 -- https://github.com/kvm-x86/kvm-unit-tests/tree/next