[<prev] [next>] [day] [month] [year] [list]
Message-ID: <fddc0183-d0e7-41ed-9869-e31e5320182e@default>
Date: Tue, 9 Jan 2018 05:17:21 -0800 (PST)
From: Liran Alon <liran.alon@...cle.com>
To: <pbonzini@...hat.com>
Cc: <jmattson@...gle.com>, <x86@...nel.org>, <dwmw@...zon.co.uk>,
<bp@...en8.de>, <thomas.lendacky@....com>, <aliguori@...zon.com>,
<rkrcmar@...hat.com>, <linux-kernel@...r.kernel.org>,
<kvm@...r.kernel.org>
Subject: Re: [PATCH 5/8] KVM: SVM: fix comment
----- pbonzini@...hat.com wrote:
> If always==true, then read/write bits are cleared from
> the MSR permission bitmap, thus passing-through the MSR.
> Fix the comment to match reality.
>
> Signed-off-by: Paolo Bonzini <pbonzini@...hat.com>
> ---
> arch/x86/kvm/svm.c | 2 +-
> 1 file changed, 1 insertion(+), 1 deletion(-)
>
> diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c
> index 55dde3896898..31ace8d7774a 100644
> --- a/arch/x86/kvm/svm.c
> +++ b/arch/x86/kvm/svm.c
> @@ -236,7 +236,7 @@ struct amd_svm_iommu_ir {
>
> static const struct svm_direct_access_msrs {
> u32 index; /* Index of the MSR */
> - bool always; /* True if intercept is always on */
> + bool always; /* True if intercept is always off */
> } direct_access_msrs[] = {
> { .index = MSR_STAR, .always = true },
> { .index = MSR_IA32_SYSENTER_CS, .always = true },
> --
> 1.8.3.1
Reviewed-by: Liran Alon <liran.alon@...cle.com>
Powered by blists - more mailing lists