[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] x86/vvmx: Use hvm_cr4_guest_valid_bits() to calculate MSR_IA32_VMX_CR4_FIXED1
commit 1b6e063f5ee717a9ec6cfd770756fc4bc0695539 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Wed Jan 11 11:59:02 2017 +0000 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Wed Jan 11 11:59:02 2017 +0000 x86/vvmx: Use hvm_cr4_guest_valid_bits() to calculate MSR_IA32_VMX_CR4_FIXED1 Reuse the logic in hvm_cr4_guest_valid_bits() instead of duplicating it. This fixes a bug to do with the handling of X86_CR4_PCE. The RDPMC instruction predate the architectural performance feature, and has been around since the P6. X86_CR4_PCE is like X86_CR4_TSD and only controls whether RDPMC is available at cpl!=0, not whether RDPMC is generally unavailable. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Kevin Tian <kevin.tian@xxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> --- xen/arch/x86/hvm/vmx/vvmx.c | 58 +++------------------------------------------ 1 file changed, 3 insertions(+), 55 deletions(-) diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c index cfc9a88..9caebe5 100644 --- a/xen/arch/x86/hvm/vmx/vvmx.c +++ b/xen/arch/x86/hvm/vmx/vvmx.c @@ -1840,16 +1840,12 @@ int nvmx_handle_invvpid(struct cpu_user_regs *regs) int nvmx_msr_read_intercept(unsigned int msr, u64 *msr_content) { struct vcpu *v = current; - unsigned int eax, ebx, ecx, edx; + struct domain *d = v->domain; u64 data = 0, host_data = 0; int r = 1; - if ( !nestedhvm_enabled(v->domain) ) - return 0; - /* VMX capablity MSRs are available only when guest supports VMX. */ - hvm_cpuid(0x1, NULL, NULL, &ecx, &edx); - if ( !(ecx & cpufeat_mask(X86_FEATURE_VMX)) ) + if ( !nestedhvm_enabled(d) || !d->arch.cpuid->basic.vmx ) return 0; /* @@ -1995,55 +1991,7 @@ int nvmx_msr_read_intercept(unsigned int msr, u64 *msr_content) data = X86_CR4_VMXE; break; case MSR_IA32_VMX_CR4_FIXED1: - if ( edx & cpufeat_mask(X86_FEATURE_VME) ) - data |= X86_CR4_VME | X86_CR4_PVI; - if ( edx & cpufeat_mask(X86_FEATURE_TSC) ) - data |= X86_CR4_TSD; - if ( edx & cpufeat_mask(X86_FEATURE_DE) ) - data |= X86_CR4_DE; - if ( edx & cpufeat_mask(X86_FEATURE_PSE) ) - data |= X86_CR4_PSE; - if ( edx & cpufeat_mask(X86_FEATURE_PAE) ) - data |= X86_CR4_PAE; - if ( edx & cpufeat_mask(X86_FEATURE_MCE) ) - data |= X86_CR4_MCE; - if ( edx & cpufeat_mask(X86_FEATURE_PGE) ) - data |= X86_CR4_PGE; - if ( edx & cpufeat_mask(X86_FEATURE_FXSR) ) - data |= X86_CR4_OSFXSR; - if ( edx & cpufeat_mask(X86_FEATURE_SSE) ) - data |= X86_CR4_OSXMMEXCPT; - if ( ecx & cpufeat_mask(X86_FEATURE_VMX) ) - data |= X86_CR4_VMXE; - if ( ecx & cpufeat_mask(X86_FEATURE_SMX) ) - data |= X86_CR4_SMXE; - if ( ecx & cpufeat_mask(X86_FEATURE_PCID) ) - data |= X86_CR4_PCIDE; - if ( ecx & cpufeat_mask(X86_FEATURE_XSAVE) ) - data |= X86_CR4_OSXSAVE; - - hvm_cpuid(0x0, &eax, NULL, NULL, NULL); - switch ( eax ) - { - default: - hvm_cpuid(0xa, &eax, NULL, NULL, NULL); - /* Check whether guest has the perf monitor feature. */ - if ( (eax & 0xff) && (eax & 0xff00) ) - data |= X86_CR4_PCE; - /* fall through */ - case 0x7 ... 0x9: - ecx = 0; - hvm_cpuid(0x7, NULL, &ebx, &ecx, NULL); - if ( ebx & cpufeat_mask(X86_FEATURE_FSGSBASE) ) - data |= X86_CR4_FSGSBASE; - if ( ebx & cpufeat_mask(X86_FEATURE_SMEP) ) - data |= X86_CR4_SMEP; - if ( ebx & cpufeat_mask(X86_FEATURE_SMAP) ) - data |= X86_CR4_SMAP; - /* fall through */ - case 0x0 ... 0x6: - break; - } + data = hvm_cr4_guest_valid_bits(v, 0); break; case MSR_IA32_VMX_MISC: /* Do not support CR3-target feature now */ -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |