Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp608732pxk; Wed, 23 Sep 2020 11:09:51 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxDPmpLooQ/6bKSBYjBjB+hxzR2jo1KCDwtY8yG3cgwq48ArluB2DBHgtCBjtYu4skt94GF X-Received: by 2002:a17:906:7fcc:: with SMTP id r12mr907091ejs.360.1600884590817; Wed, 23 Sep 2020 11:09:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1600884590; cv=none; d=google.com; s=arc-20160816; b=U3E1UhVbJBHBszYkDQvTIp4mKRmSlwYnh74DmeqehITseZx5boPxUPRs5XISIqK3HS XLydsOvU5Sg+o/a9O3uz+R3RLXivPCbCGMfkVXWhcuAgrZh/cNJMR+GjMtVfnXZGTRUD nAq9nkES2dj92/g0+uBGgd2c/kwOjnMVZq0uob+BUgAcw72okDOfiIGu+cAvWbJldzrN /bYDrBga6gQc9JHkVWdJKahr6mprwqcnDwUw7KvMJ3PV86OgXYAd6V8IeDpOPMlyQEz9 AyyfQtnRcSXpxxQ6R0uLOZUNtL6SEaKVKF/mLMa1XS+11LpauswjI82S4p4vAfuq1V20 g6JQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=Y5Ti1BnPXSnGURhgJc6ve2f+4dj6gd16JSZHWj2Clo8=; b=uFbqL4A94UpfqGKjoJcbtLTdGqCOUQRWeTKX9jMamumCKJeJ16y9+J4xI8OIXzT+3r ct45bLlgW42TNlbcwSMGHKUbZgmBJHggP16CcxaqDVWdbtGPQx2WPV0byPUDTXqDRrgT gT1dh0zPgiIBeb9XCjKHLqwIGN19fA5koj/WEhk0NKIkzqOBZsEzPmBUeq5rWWEKhS+q Akh15y3D0NatpkvoULkslay4gzS4/wI2IWoqiEi3gFiFhsuIrKo1m21lJ345mEUmuEm6 6O6IPYHYD1zMO1cT3M0qqBIS7w4gAK51slt/sTDW/g/tNVITzDfllRQfyWB6n7HLoNmS ACyg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id dr7si362548ejc.447.2020.09.23.11.09.26; Wed, 23 Sep 2020 11:09:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726904AbgIWSFU (ORCPT + 99 others); Wed, 23 Sep 2020 14:05:20 -0400 Received: from mga02.intel.com ([134.134.136.20]:16542 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726600AbgIWSEP (ORCPT ); Wed, 23 Sep 2020 14:04:15 -0400 IronPort-SDR: chf+stAV9PLR/PM6FHkVhP1JZpAXxuYiNK7LcsLB3kKVF9kRSpfBy9FKKfdiY5JW/+81ikg0p6 KG4e5ptSKKNQ== X-IronPort-AV: E=McAfee;i="6000,8403,9753"; a="148637138" X-IronPort-AV: E=Sophos;i="5.77,293,1596524400"; d="scan'208";a="148637138" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga101.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 23 Sep 2020 11:04:12 -0700 IronPort-SDR: q1WeNgmHjf5+QY7p//TdKZzQvlT8meVf0Ubk5TISC/rm/33xll1ExtYt62+Rq9jlVfIpwEuRev rOie6SPhJKRg== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,293,1596524400"; d="scan'208";a="322670288" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by orsmga002.jf.intel.com with ESMTP; 23 Sep 2020 11:04:11 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH v2 09/15] KVM: VMX: Check guest support for RDTSCP before processing MSR_TSC_AUX Date: Wed, 23 Sep 2020 11:04:03 -0700 Message-Id: <20200923180409.32255-10-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200923180409.32255-1-sean.j.christopherson@intel.com> References: <20200923180409.32255-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Check for RDTSCP support prior to checking if MSR_TSC_AUX is in the uret MSRs array so that the array lookup and manipulation are back-to-back. This paves the way toward adding a helper to wrap the lookup and manipulation. No functional change intended. Signed-off-by: Sean Christopherson --- arch/x86/kvm/vmx/vmx.c | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c index ca41ee8fac5d..ed9ce25d3807 100644 --- a/arch/x86/kvm/vmx/vmx.c +++ b/arch/x86/kvm/vmx/vmx.c @@ -1722,9 +1722,11 @@ static void setup_msrs(struct vcpu_vmx *vmx) index = __vmx_find_uret_msr(vmx, MSR_EFER); if (index >= 0 && update_transition_efer(vmx, index)) move_msr_up(vmx, index, nr_active_uret_msrs++); - index = __vmx_find_uret_msr(vmx, MSR_TSC_AUX); - if (index >= 0 && guest_cpuid_has(&vmx->vcpu, X86_FEATURE_RDTSCP)) - move_msr_up(vmx, index, nr_active_uret_msrs++); + if (guest_cpuid_has(&vmx->vcpu, X86_FEATURE_RDTSCP)) { + index = __vmx_find_uret_msr(vmx, MSR_TSC_AUX); + if (index >= 0) + move_msr_up(vmx, index, nr_active_uret_msrs++); + } index = __vmx_find_uret_msr(vmx, MSR_IA32_TSX_CTRL); if (index >= 0) move_msr_up(vmx, index, nr_active_uret_msrs++); -- 2.28.0