KVM: x86: handle missing MPX in nested virtualization
When doing nested virtualization, we may be able to read BNDCFGS but still not be allowed to write to GUEST_BNDCFGS in the VMCS. Guard writes to the field with vmx_mpx_supported(), and similarly hide the MSR from userspace if the processor does not support the field. We could work around this with the generic MSR save/load machinery, but there is only a limited number of MSR save/load slots and it is not really worthwhile to waste one for a scenario that should not happen except in the nested virtualization case. Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
This commit is contained in:
@@ -4089,6 +4089,11 @@ static bool svm_invpcid_supported(void)
|
||||
return false;
|
||||
}
|
||||
|
||||
static bool svm_mpx_supported(void)
|
||||
{
|
||||
return false;
|
||||
}
|
||||
|
||||
static bool svm_has_wbinvd_exit(void)
|
||||
{
|
||||
return true;
|
||||
@@ -4371,6 +4376,7 @@ static struct kvm_x86_ops svm_x86_ops = {
|
||||
|
||||
.rdtscp_supported = svm_rdtscp_supported,
|
||||
.invpcid_supported = svm_invpcid_supported,
|
||||
.mpx_supported = svm_mpx_supported,
|
||||
|
||||
.set_supported_cpuid = svm_set_supported_cpuid,
|
||||
|
||||
|
Reference in New Issue
Block a user