Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp7987374imm; Thu, 28 Jun 2018 12:35:31 -0700 (PDT) X-Google-Smtp-Source: AAOMgpcUNB9Aw9mFhF2i+AvboyAXsvV/EkZYOgaj2lYggbb6U1Eaj3wRXk5LCxb0KzXWPOY1LfJN X-Received: by 2002:a62:5e06:: with SMTP id s6-v6mr11377541pfb.253.1530214531471; Thu, 28 Jun 2018 12:35:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1530214531; cv=none; d=google.com; s=arc-20160816; b=CFcSVSBvWWa9CnulYVDkmD4cKJJUXVdKdO/C1jLTe+e2reV6KeTLfHlzWYgAe5+0xR wMiNEpDk9K6kf627oQ8DzsRcuRKaj/cj5B6Wpw2+9ZG4YMYFOiJIRJbFbRg/0tkxeLPK NB/MwOdNBBQ1KeA38ElXlfGiZCYSldqD+Di1OCFmHIJ3LQtOyZ88BOzUlf+gcjEVq7q2 Pl8MsX0gQwscEGB5cRvkqmdexsy8wHlwGqVNm2ohYMdvO8KzU2V6YbiQRgYVkaTapQSL bzGNDOQW8ki3iTLdVqihdAXtWuE9Du7keDcD2ga/SWcBnHFSj60u71y66HRM4aUrtSMB iANw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:references:in-reply-to:message-id:date :subject:cc:to:from:arc-authentication-results; bh=N5yLmPV/rbPdUdWYcj9XAt/bFxRGvblXZUrtOz1iBVI=; b=dvD/sZJEEJACopfTH5kOBLvpBytSmvhDNgouWZwr3cfUMjxKz81mB+a57nI00tkUeN 6bvW/hGGwVp/cqjy89jMbk0YK+dE0XsNaFUzPXa84s1+2O1udb5E1x20JDIEOvBsJnYR 3JOEskfxcrmZMimW8qaUyWCKeJsx8eJmDsr0TnA3Rg33ca2+FM3cc7NzcwBGy3n2L1tM 9/7RYdhNZKT1gVCuSubX8nziU/Usmg8I+Dfn5JiVzIovNh3yrHYPhe/Jq8TbYBCJ6spp iVQztdE635/HS86lqzYtsa5BFYJccQEV24ENxoJLjws+Wn+kKaB3/kd+i0fdfviWTGon w/4Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r20-v6si6439878pga.142.2018.06.28.12.35.16; Thu, 28 Jun 2018 12:35:31 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S967603AbeF1Ri4 (ORCPT + 99 others); Thu, 28 Jun 2018 13:38:56 -0400 Received: from mail.skyhub.de ([5.9.137.197]:37060 "EHLO mail.skyhub.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S967553AbeF1RiS (ORCPT ); Thu, 28 Jun 2018 13:38:18 -0400 X-Virus-Scanned: Nedap ESD1 at mail.skyhub.de Received: from mail.skyhub.de ([127.0.0.1]) by localhost (blast.alien8.de [127.0.0.1]) (amavisd-new, port 10026) with ESMTP id rikyp9sJ7Nb2; Thu, 28 Jun 2018 19:38:16 +0200 (CEST) Received: from zn.tnic (p200300EC2BD08A00329C23FFFEA6A903.dip0.t-ipconnect.de [IPv6:2003:ec:2bd0:8a00:329c:23ff:fea6:a903]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.skyhub.de (SuperMail on ZX Spectrum 128k) with ESMTPSA id 8F2651EC03AD; Thu, 28 Jun 2018 19:38:16 +0200 (CEST) From: Borislav Petkov To: KVM Cc: Joerg Roedel , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Tom Lendacky , Tony Luck , Yazen Ghannam , LKML Subject: [PATCH 1/2] kvm/x86: Move MSR_K7_HWCR to svm.c Date: Thu, 28 Jun 2018 19:38:07 +0200 Message-Id: <20180628173808.25885-2-bp@alien8.de> X-Mailer: git-send-email 2.17.0.582.gccdcbd54c In-Reply-To: <20180628173808.25885-1-bp@alien8.de> References: <20180628173808.25885-1-bp@alien8.de> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Borislav Petkov This is an AMD-specific MSR. Put it where it belongs. Signed-off-by: Borislav Petkov --- arch/x86/kvm/svm.c | 14 ++++++++++++++ arch/x86/kvm/x86.c | 12 ------------ 2 files changed, 14 insertions(+), 12 deletions(-) diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c index f059a73f0fd0..72e60daf3ab8 100644 --- a/arch/x86/kvm/svm.c +++ b/arch/x86/kvm/svm.c @@ -4153,6 +4153,9 @@ static int svm_get_msr(struct kvm_vcpu *vcpu, struct msr_data *msr_info) case MSR_F10H_DECFG: msr_info->data = svm->msr_decfg; break; + case MSR_K7_HWCR: + msr_info->data = 0; + break; default: return kvm_get_msr_common(vcpu, msr_info); } @@ -4357,6 +4360,17 @@ static int svm_set_msr(struct kvm_vcpu *vcpu, struct msr_data *msr) svm->msr_decfg = data; break; } + case MSR_K7_HWCR: + data &= ~(u64)0x40; /* ignore flush filter disable */ + data &= ~(u64)0x100; /* ignore ignne emulation enable */ + data &= ~(u64)0x8; /* ignore TLB cache disable */ + data &= ~(u64)0x40000; /* ignore Mc status write enable */ + if (data != 0) { + vcpu_unimpl(vcpu, "unimplemented HWCR wrmsr: 0x%llx\n", + data); + return 1; + } + break; case MSR_IA32_APICBASE: if (kvm_vcpu_apicv_active(vcpu)) avic_update_vapic_bar(to_svm(vcpu), data); diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 0046aa70205a..3bf721c22124 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -2317,17 +2317,6 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) break; case MSR_EFER: return set_efer(vcpu, data); - case MSR_K7_HWCR: - data &= ~(u64)0x40; /* ignore flush filter disable */ - data &= ~(u64)0x100; /* ignore ignne emulation enable */ - data &= ~(u64)0x8; /* ignore TLB cache disable */ - data &= ~(u64)0x40000; /* ignore Mc status write enable */ - if (data != 0) { - vcpu_unimpl(vcpu, "unimplemented HWCR wrmsr: 0x%llx\n", - data); - return 1; - } - break; case MSR_FAM10H_MMIO_CONF_BASE: if (data != 0) { vcpu_unimpl(vcpu, "unimplemented MMIO_CONF_BASE wrmsr: " @@ -2597,7 +2586,6 @@ int kvm_get_msr_common(struct kvm_vcpu *vcpu, struct msr_data *msr_info) case MSR_K8_SYSCFG: case MSR_K8_TSEG_ADDR: case MSR_K8_TSEG_MASK: - case MSR_K7_HWCR: case MSR_VM_HSAVE_PA: case MSR_K8_INT_PENDING_MSG: case MSR_AMD64_NB_CFG: -- 2.17.0.582.gccdcbd54c