From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?UTF-8?q?Adalber=20Laz=C4=83r?= Subject: [RFC PATCH v4 15/18] kvm: x86: hook in kvmi_xsetbv_event() Date: Mon, 18 Dec 2017 21:06:39 +0200 Message-ID: <20171218190642.7790-16-alazar@bitdefender.com> References: <20171218190642.7790-1-alazar@bitdefender.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Cc: linux-mm@kvack.org, Paolo Bonzini , =?UTF-8?q?Radim=20Kr=C4=8Dm=C3=A1=C5=99?= , Xiao Guangrong , =?UTF-8?q?Mihai=20Don=C8=9Bu?= , Adalbert Lazar To: kvm@vger.kernel.org Return-path: In-Reply-To: <20171218190642.7790-1-alazar@bitdefender.com> Sender: owner-linux-mm@kvack.org List-Id: kvm.vger.kernel.org From: Adalbert Lazar Notify the guest introspection tool that the extended control register has been changed. Signed-off-by: Mihai Donțu --- arch/x86/kvm/x86.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c index 8f5cc81c8760..284bb4c740fa 100644 --- a/arch/x86/kvm/x86.c +++ b/arch/x86/kvm/x86.c @@ -765,6 +765,9 @@ static int __kvm_set_xcr(struct kvm_vcpu *vcpu, u32 index, u64 xcr) int kvm_set_xcr(struct kvm_vcpu *vcpu, u32 index, u64 xcr) { + if (xcr != vcpu->arch.xcr0) + kvmi_xsetbv_event(vcpu); + if (kvm_x86_ops->get_cpl(vcpu) != 0 || __kvm_set_xcr(vcpu, index, xcr)) { kvm_inject_gp(vcpu, 0); -- To unsubscribe, send a message with 'unsubscribe linux-mm' in the body to majordomo@kvack.org. For more info on Linux MM, see: http://www.linux-mm.org/ . Don't email: email@kvack.org