From mboxrd@z Thu Jan 1 00:00:00 1970 From: Radim =?utf-8?B?S3LEjW3DocWZ?= Subject: Re: [PATCH 1/3] kvm: vmx: Do not disable intercepts for BNDCFGS Date: Wed, 7 Jun 2017 16:31:09 +0200 Message-ID: <20170607143108.GD28750@potion> References: <20170523185254.98780-1-jmattson@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Cc: kvm@vger.kernel.org To: Jim Mattson Return-path: Received: from mx1.redhat.com ([209.132.183.28]:47636 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751608AbdFGObM (ORCPT ); Wed, 7 Jun 2017 10:31:12 -0400 Content-Disposition: inline In-Reply-To: <20170523185254.98780-1-jmattson@google.com> Sender: kvm-owner@vger.kernel.org List-ID: 2017-05-23 11:52-0700, Jim Mattson: > The MSR permission bitmaps are shared by all VMs. However, some VMs > may not be configured to support MPX, even when the host does. If the > host supports VMX and the guest does not, we should intercept accesses > to the BNDCFGS MSR, so that we can synthesize a #GP > fault. Furthermore, if the host does not support MPX and the > "ignore_msrs" kvm kernel parameter is set, then we should intercept > accesses to the BNDCFGS MSR, so that we can skip over the rdmsr/wrmsr > without raising a #GP fault. > > Fixes: da8999d31818fdc8 ("KVM: x86: Intel MPX vmx and msr handle") > Signed-off-by: Jim Mattson > --- Queued all, thanks.