Re: [PATCH v8 6/8] KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied

2020-10-05 Thread Sean Christopherson
On Thu, Oct 01, 2020 at 09:11:39PM -0400, Peter Xu wrote: > Hi, > > I reported in the v13 cover letter of kvm dirty ring series that this patch > seems to have been broken. Today I tried to reproduce with a simplest vm, and > after a closer look... > > On Fri, Sep 25, 2020 at 04:34:20PM +0200,

Re: [PATCH v8 6/8] KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied

2020-10-01 Thread Peter Xu
Hi, I reported in the v13 cover letter of kvm dirty ring series that this patch seems to have been broken. Today I tried to reproduce with a simplest vm, and after a closer look... On Fri, Sep 25, 2020 at 04:34:20PM +0200, Alexander Graf wrote: > @@ -3764,15 +3859,14 @@ static u8

[PATCH v8 6/8] KVM: x86: VMX: Prevent MSR passthrough when MSR access is denied

2020-09-25 Thread Alexander Graf
We will introduce the concept of MSRs that may not be handled in kernel space soon. Some MSRs are directly passed through to the guest, effectively making them handled by KVM from user space's point of view. This patch introduces all logic required to ensure that MSRs that user space wants