KVM: x86: SVM: Prevent MSR passthrough when MSR access is denied
authorAlexander Graf <graf@amazon.com>
Fri, 25 Sep 2020 14:34:19 +0000 (16:34 +0200)
committerPaolo Bonzini <pbonzini@redhat.com>
Mon, 28 Sep 2020 11:58:06 +0000 (07:58 -0400)
commitfd6fa73d13377f2bff6ed668c99ca76adcda1336
tree8f7e991a4297611d705f317a41836fceea985ebc
parent476c9bd8e997b495524500cd82471e59b3aac20e
KVM: x86: SVM: Prevent MSR passthrough when MSR access is denied

We will introduce the concept of MSRs that may not be handled in kernel
space soon. Some MSRs are directly passed through to the guest, effectively
making them handled by KVM from user space's point of view.

This patch introduces all logic required to ensure that MSRs that
user space wants trapped are not marked as direct access for guests.

Signed-off-by: Alexander Graf <graf@amazon.com>
Message-Id: <20200925143422.21718-6-graf@amazon.com>
[Make terminology a bit more similar to VMX. - Paolo]
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/svm/svm.c
arch/x86/kvm/svm/svm.h