On Wed, Apr 18, 2018 at 11:18:25AM +0800, Youquan Song wrote: > From: Paolo Bonzini <pbonzini@xxxxxxxxxx> > > (cherry picked from commit 904e14fb7cb96401a7dc803ca2863fd5ba32ffe6) > > Place the MSR bitmap in struct loaded_vmcs, and update it in place > every time the x2apic or APICv state can change. This is rare and > the loop can handle 64 MSRs per iteration, in a similar fashion as > nested_vmx_prepare_msr_bitmap. > > This prepares for choosing, on a per-VM basis, whether to intercept > the SPEC_CTRL and PRED_CMD MSRs. > > Cc: stable@xxxxxxxxxxxxxxx # prereq for Spectre mitigation > Suggested-by: Jim Mattson <jmattson@xxxxxxxxxx> > Signed-off-by: Paolo Bonzini <pbonzini@xxxxxxxxxx> > Signed-off-by: David Woodhouse <dwmw@xxxxxxxxxxxx> > Signed-off-by: Yi Sun <yi.y.sun@xxxxxxxxxxxxxxx> [v4.4 backport] > > Conflicts: > arch/x86/kvm/vmx.c Same problem :(