summaryrefslogtreecommitdiffstats
path: root/arch/x86/kvm/vmx/pmu_intel.c
diff options
context:
space:
mode:
authorSean Christopherson <seanjc@google.com>2022-06-11 00:57:51 +0000
committerPaolo Bonzini <pbonzini@redhat.com>2022-06-20 11:49:35 -0400
commit5d4283df5a0fc8299fba9443c33d219939eccc2d (patch)
tree06dbedf6745666a1f86bb32be212ad40c8084a8a /arch/x86/kvm/vmx/pmu_intel.c
parent0f4a7185270c4879fa40b33d7e07b6ac38353b34 (diff)
downloadlinux-5d4283df5a0fc8299fba9443c33d219939eccc2d.tar.bz2
Revert "KVM: x86/pmu: Accept 0 for absent PMU MSRs when host-initiated if !enable_pmu"
Eating reads and writes to all "PMU" MSRs when there is no PMU is wildly broken as it results in allowing accesses to _any_ MSR on Intel CPUs as intel_is_valid_msr() returns true for all host_initiated accesses. A revert of commit d1c88a402056 ("KVM: x86: always allow host-initiated writes to PMU MSRs") will soon follow. This reverts commit 8e6a58e28b34e8d247e772159b8fa8f6bae39192. Signed-off-by: Sean Christopherson <seanjc@google.com> Message-Id: <20220611005755.753273-4-seanjc@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/kvm/vmx/pmu_intel.c')
0 files changed, 0 insertions, 0 deletions