Received: by 2002:a05:6a10:22f:0:0:0:0 with SMTP id 15csp4281428pxk; Tue, 29 Sep 2020 21:19:03 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxffDUVKVEHBlDhuIPthra96eL0wHyTk3Lfta+NUPnB+7TL4vUJO8IsgGbS2UiVWlixqNmz X-Received: by 2002:a05:6402:1558:: with SMTP id p24mr712133edx.194.1601439542816; Tue, 29 Sep 2020 21:19:02 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1601439542; cv=none; d=google.com; s=arc-20160816; b=Lh2zHwkdJoYbpM3gyerlMN7CimIICs77cM7czn+CNd4qLFqurDNzERKbaQABtQuPOm GA/6UodE5Ii60BFDdHPN1v8lOKzpFA+Qpnoh3q4qBvLt/CFV/gOT7MC/h+/SzuP+CSbd Xrefp/L/xupsAtECwmwoB7ZWx07I/Lcer1TRH+TW8HGDyA8Uo18BBlYSQyKdcp/tYQGy VKhzvVQzr/7nqOzmulLNyhaAV8+pTHkdt4q6N9D/TVI6CkIXIvpxmPgvH1oKk4M+wuzo BGvFnxEIQpcxEfMIFz/SSNGMJTtN6ky/rDK9GeZQmpdYp4T99BMufpt4L0Bs5O4XFWdW 1fqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :ironport-sdr:ironport-sdr; bh=cEAn4Dgi/Z99qYQql9I+yP8ndlRUeT6spESVLsDIy/Y=; b=EJRTV3Uj700vi5wxnHT3eLb1Ejmcm1W/udKiiaTfeNFtsqD+/3IunJbtdj8JyvHXPE VO2iyUhOcHjOOEytULpLNID0BNF3AF2P8TxCt0MRdGM3pG9u+xCjLh7uB25aD55vPmIV BDg2gqt8uLQVB8KkDMeOjsaZ+2kgFom8/RDKl+IwZkb98EJ3LjmLc6C7biS1dshBFa90 Nuv9sLLtAD52rqsJ+hf6JIXoGC1JyZ1H3/oqdAPU3ylEGmqrJJPG7TJtpNbZxxLecnmh pv/RZeTwSrJAteSmF4B20+fmeGzfLZc54YYVLfMyZQlgW+I5otT3y+MK0qJTb8jZgmnl SuCw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id x13si381766ejj.368.2020.09.29.21.18.26; Tue, 29 Sep 2020 21:19:02 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1725877AbgI3ERM (ORCPT + 99 others); Wed, 30 Sep 2020 00:17:12 -0400 Received: from mga18.intel.com ([134.134.136.126]:60796 "EHLO mga18.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725839AbgI3ERF (ORCPT ); Wed, 30 Sep 2020 00:17:05 -0400 IronPort-SDR: BamU55C/aaQPyjxkn/PoFetVVBwvj3fi0UMC9v4Of+/tMIAygAiIWlZtc6xuH+288BBkEd6E52 T5KbvXBF7WBA== X-IronPort-AV: E=McAfee;i="6000,8403,9759"; a="150137455" X-IronPort-AV: E=Sophos;i="5.77,321,1596524400"; d="scan'208";a="150137455" X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Sep 2020 21:17:03 -0700 IronPort-SDR: /saY0BVd/QPYHi2iRfhP+TIsXqXfC2ZUELIrQ5kKEmWXwWZ/Kt5OUuoP71JLRX3Tj3J2liN954 uoWY0rpNQ4uw== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.77,321,1596524400"; d="scan'208";a="415607871" Received: from sjchrist-coffee.jf.intel.com ([10.54.74.160]) by fmsmga001.fm.intel.com with ESMTP; 29 Sep 2020 21:17:03 -0700 From: Sean Christopherson To: Paolo Bonzini Cc: Sean Christopherson , Vitaly Kuznetsov , Wanpeng Li , Jim Mattson , Joerg Roedel , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Lai Jiangshan , Lai Jiangshan Subject: [PATCH 5/5] KVM: x86: Let the guest own CR4.FSGSBASE Date: Tue, 29 Sep 2020 21:16:59 -0700 Message-Id: <20200930041659.28181-6-sean.j.christopherson@intel.com> X-Mailer: git-send-email 2.28.0 In-Reply-To: <20200930041659.28181-1-sean.j.christopherson@intel.com> References: <20200930041659.28181-1-sean.j.christopherson@intel.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Lai Jiangshan Add FSGSBASE to the set of possible guest-owned CR4 bits, i.e. let the guest own it on VMX. KVM never queries the guest's CR4.FSGSBASE value, thus there is no reason to force VM-Exit on FSGSBASE being toggled. Note, because FSGSBASE is conditionally available, this is dependent on recent changes to intercept reserved CR4 bits and to update the CR4 guest/host mask in response to guest CPUID changes. Cc: Paolo Bonzini Signed-off-by: Lai Jiangshan [sean: added justification in changelog] Signed-off-by: Sean Christopherson --- arch/x86/kvm/kvm_cache_regs.h | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/arch/x86/kvm/kvm_cache_regs.h b/arch/x86/kvm/kvm_cache_regs.h index ca0781b41df9..a889563ad02d 100644 --- a/arch/x86/kvm/kvm_cache_regs.h +++ b/arch/x86/kvm/kvm_cache_regs.h @@ -7,7 +7,7 @@ #define KVM_POSSIBLE_CR0_GUEST_BITS X86_CR0_TS #define KVM_POSSIBLE_CR4_GUEST_BITS \ (X86_CR4_PVI | X86_CR4_DE | X86_CR4_PCE | X86_CR4_OSFXSR \ - | X86_CR4_OSXMMEXCPT | X86_CR4_PGE | X86_CR4_TSD) + | X86_CR4_OSXMMEXCPT | X86_CR4_PGE | X86_CR4_TSD | X86_CR4_FSGSBASE) #define BUILD_KVM_GPR_ACCESSORS(lname, uname) \ static __always_inline unsigned long kvm_##lname##_read(struct kvm_vcpu *vcpu)\ -- 2.28.0