]> git.baikalelectronics.ru Git - kernel.git/commit
KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied
authorAlexander Graf <graf@amazon.com>
Fri, 25 Sep 2020 14:34:20 +0000 (16:34 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 28 Sep 2020 11:58:07 +0000 (07:58 -0400)
commit683e8827567c44f98ef8d294d73a3caaae01539b
tree82313f364ad1795ad48146753ad7b26413085aec
parent58b77379c440839757ba3c6b7ba5e6e4efd23115
KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied

We will introduce the concept of MSRs that may not be handled in kernel
space soon. Some MSRs are directly passed through to the guest, effectively
making them handled by KVM from user space's point of view.

This patch introduces all logic required to ensure that MSRs that
user space wants trapped are not marked as direct access for guests.

Signed-off-by: Alexander Graf <graf@amazon.com>
Message-Id: <20200925143422.21718-7-graf@amazon.com>
[Replace "_idx" with "_slot". - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx/vmx.c
arch/x86/kvm/vmx/vmx.h