]> git.baikalelectronics.ru Git - kernel.git/commit
KVM: x86: SVM: Prevent MSR passthrough when MSR access is denied
authorAlexander Graf <graf@amazon.com>
Fri, 25 Sep 2020 14:34:19 +0000 (16:34 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 28 Sep 2020 11:58:06 +0000 (07:58 -0400)
commit49e5a60ae0bee67628e95f37bf7cb04ad630524f
tree8f7e991a4297611d705f317a41836fceea985ebc
parent6e7e9ba95d0bbc120f5657c302f532b6ae816c07
KVM: x86: SVM: Prevent MSR passthrough when MSR access is denied

We will introduce the concept of MSRs that may not be handled in kernel
space soon. Some MSRs are directly passed through to the guest, effectively
making them handled by KVM from user space's point of view.

This patch introduces all logic required to ensure that MSRs that
user space wants trapped are not marked as direct access for guests.

Signed-off-by: Alexander Graf <graf@amazon.com>
Message-Id: <20200925143422.21718-6-graf@amazon.com>
[Make terminology a bit more similar to VMX. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/svm/svm.c
arch/x86/kvm/svm/svm.h