summaryrefslogtreecommitdiff
path: root/arch/x86/kvm/svm/pmu.c
diff options
context:
space:
mode:
authorSean Christopherson <seanjc@google.com>2022-06-11 03:57:51 +0300
committerPaolo Bonzini <pbonzini@redhat.com>2022-06-20 18:49:35 +0300
commit5d4283df5a0fc8299fba9443c33d219939eccc2d (patch)
tree06dbedf6745666a1f86bb32be212ad40c8084a8a /arch/x86/kvm/svm/pmu.c
parent0f4a7185270c4879fa40b33d7e07b6ac38353b34 (diff)
downloadlinux-5d4283df5a0fc8299fba9443c33d219939eccc2d.tar.xz
Revert "KVM: x86/pmu: Accept 0 for absent PMU MSRs when host-initiated if !enable_pmu"
Eating reads and writes to all "PMU" MSRs when there is no PMU is wildly broken as it results in allowing accesses to _any_ MSR on Intel CPUs as intel_is_valid_msr() returns true for all host_initiated accesses. A revert of commit d1c88a402056 ("KVM: x86: always allow host-initiated writes to PMU MSRs") will soon follow. This reverts commit 8e6a58e28b34e8d247e772159b8fa8f6bae39192. Signed-off-by: Sean Christopherson <seanjc@google.com> Message-Id: <20220611005755.753273-4-seanjc@google.com> Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
Diffstat (limited to 'arch/x86/kvm/svm/pmu.c')
-rw-r--r--arch/x86/kvm/svm/pmu.c11
1 files changed, 1 insertions, 10 deletions
diff --git a/arch/x86/kvm/svm/pmu.c b/arch/x86/kvm/svm/pmu.c
index fe520b2649b5..256244b8f89c 100644
--- a/arch/x86/kvm/svm/pmu.c
+++ b/arch/x86/kvm/svm/pmu.c
@@ -182,16 +182,7 @@ static struct kvm_pmc *amd_rdpmc_ecx_to_pmc(struct kvm_vcpu *vcpu,
static bool amd_is_valid_msr(struct kvm_vcpu *vcpu, u32 msr, bool host_initiated)
{
/* All MSRs refer to exactly one PMC, so msr_idx_to_pmc is enough. */
- if (!host_initiated)
- return false;
-
- switch (msr) {
- case MSR_K7_EVNTSEL0 ... MSR_K7_PERFCTR3:
- case MSR_F15H_PERF_CTL0 ... MSR_F15H_PERF_CTR5:
- return true;
- default:
- return false;
- }
+ return false;
}
static struct kvm_pmc *amd_msr_idx_to_pmc(struct kvm_vcpu *vcpu, u32 msr)