aboutsummaryrefslogtreecommitdiff
path: root/scripts/lib/kdoc/kdoc_parser.py
diff options
context:
space:
mode:
authorXiaoyao Li <xiaoyao.li@intel.com>2025-07-30 17:52:52 +0800
committerPaolo Bonzini <pbonzini@redhat.com>2025-09-17 19:00:58 +0200
commit0516f4b70264b9710a25718d21bd35ef463c875e (patch)
treeecb3563e5c3791feea1110d32924543dc0d94443 /scripts/lib/kdoc/kdoc_parser.py
parentd99041a20328423bc6819ddd69b60cf98d8d84f1 (diff)
downloadqemu-0516f4b70264b9710a25718d21bd35ef463c875e.zip
qemu-0516f4b70264b9710a25718d21bd35ef463c875e.tar.gz
qemu-0516f4b70264b9710a25718d21bd35ef463c875e.tar.bz2
i386/cpu: Enable SMM cpu address space under KVM
Kirill Martynov reported assertation in cpu_asidx_from_attrs() being hit when x86_cpu_dump_state() is called to dump the CPU state[*]. It happens when the CPU is in SMM and KVM emulation failure due to misbehaving guest. The root cause is that QEMU i386 never enables the SMM address space for cpu since KVM SMM support has been added. Enable the SMM cpu address space under KVM when the SMM is enabled for the x86machine. [*] https://lore.kernel.org/qemu-devel/20250523154431.506993-1-stdcalllevi@yandex-team.ru/ Reported-by: Kirill Martynov <stdcalllevi@yandex-team.ru> Reviewed-by: Zhao Liu <zhao1.liu@intel.com> Tested-by: Kirill Martynov <stdcalllevi@yandex-team.ru> Signed-off-by: Xiaoyao Li <xiaoyao.li@intel.com> Link: https://lore.kernel.org/r/20250730095253.1833411-2-xiaoyao.li@intel.com Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'scripts/lib/kdoc/kdoc_parser.py')
0 files changed, 0 insertions, 0 deletions