• P
    KVM: x86: do not modify masked bits of shared MSRs · de1fca5d
    Paolo Bonzini 提交于
    "Shared MSRs" are guest MSRs that are written to the host MSRs but
    keep their value until the next return to userspace.  They support
    a mask, so that some bits keep the host value, but this mask is
    only used to skip an unnecessary MSR write and the value written
    to the MSR is always the guest MSR.
    
    Fix this and, while at it, do not update smsr->values[slot].curr if
    for whatever reason the wrmsr fails.  This should only happen due to
    reserved bits, so the value written to smsr->values[slot].curr
    will not match when the user-return notifier and the host value will
    always be restored.  However, it is untidy and in rare cases this
    can actually avoid spurious WRMSRs on return to userspace.
    
    Cc: stable@vger.kernel.org
    Reviewed-by: NJim Mattson <jmattson@google.com>
    Tested-by: NJim Mattson <jmattson@google.com>
    Signed-off-by: NPaolo Bonzini <pbonzini@redhat.com>
    de1fca5d
x86.c 266.3 KB