KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied
authorAlexander Graf <graf@amazon.com>
Fri, 25 Sep 2020 14:34:20 +0000 (16:34 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 28 Sep 2020 11:58:07 +0000 (07:58 -0400)
commit3eb900173c71392087f4b0ada66f67ceae7e75f0
tree82313f364ad1795ad48146753ad7b26413085aec
parentfd6fa73d13377f2bff6ed668c99ca76adcda1336
KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied

We will introduce the concept of MSRs that may not be handled in kernel
space soon. Some MSRs are directly passed through to the guest, effectively
making them handled by KVM from user space's point of view.

This patch introduces all logic required to ensure that MSRs that
user space wants trapped are not marked as direct access for guests.

Signed-off-by: Alexander Graf <graf@amazon.com>
Message-Id: <20200925143422.21718-7-graf@amazon.com>
[Replace "_idx" with "_slot". - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx/vmx.c
arch/x86/kvm/vmx/vmx.h