]> git.baikalelectronics.ru Git - kernel.git/commitdiff
kvm: x86: Disable RDMSR interception of IA32_XFD_ERR
authorJing Liu <jing2.liu@intel.com>
Wed, 5 Jan 2022 12:35:25 +0000 (04:35 -0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Fri, 14 Jan 2022 18:44:33 +0000 (13:44 -0500)
This saves one unnecessary VM-exit in guest #NM handler, given that the
MSR is already restored with the guest value before the guest is resumed.

Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
Signed-off-by: Jing Liu <jing2.liu@intel.com>
Signed-off-by: Yang Zhong <yang.zhong@intel.com>
Message-Id: <20220105123532.12586-15-yang.zhong@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx/vmx.c
arch/x86/kvm/vmx/vmx.h

index 84f6904cdb6e2d6ad7272d4132702167b3350c4f..b8b7f5c7b3df54cc83ed527618e58bbecd1d3f2b 100644 (file)
@@ -162,6 +162,7 @@ static u32 vmx_possible_passthrough_msrs[MAX_POSSIBLE_PASSTHROUGH_MSRS] = {
        MSR_FS_BASE,
        MSR_GS_BASE,
        MSR_KERNEL_GS_BASE,
+       MSR_IA32_XFD_ERR,
 #endif
        MSR_IA32_SYSENTER_CS,
        MSR_IA32_SYSENTER_ESP,
@@ -7288,6 +7289,11 @@ static void vmx_vcpu_after_set_cpuid(struct kvm_vcpu *vcpu)
                }
        }
 
+       if (kvm_cpu_cap_has(X86_FEATURE_XFD))
+               vmx_set_intercept_for_msr(vcpu, MSR_IA32_XFD_ERR, MSR_TYPE_R,
+                                         !guest_cpuid_has(vcpu, X86_FEATURE_XFD));
+
+
        set_cr4_guest_host_mask(vmx);
 
        vmx_write_encls_bitmap(vcpu, NULL);
index 18111368cf8500e39db68c38acc4f72c2c287966..69dd2f85abdc3b51ad5caa9a5621e93663f43a8f 100644 (file)
@@ -349,7 +349,7 @@ struct vcpu_vmx {
        struct lbr_desc lbr_desc;
 
        /* Save desired MSR intercept (read: pass-through) state */
-#define MAX_POSSIBLE_PASSTHROUGH_MSRS  13
+#define MAX_POSSIBLE_PASSTHROUGH_MSRS  14
        struct {
                DECLARE_BITMAP(read, MAX_POSSIBLE_PASSTHROUGH_MSRS);
                DECLARE_BITMAP(write, MAX_POSSIBLE_PASSTHROUGH_MSRS);