diff options
author | Ladi Prosek | 2017-10-17 16:02:39 +0200 |
---|---|---|
committer | Radim Krčmář | 2017-10-18 21:21:22 +0200 |
commit | cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2 (patch) | |
tree | b5a6a7dc1f6c9c181be3bab24d05b5066b423ce0 /arch/x86/kvm/vmx.c | |
parent | KVM: x86: extend usage of RET_MMIO_PF_* constants (diff) | |
download | kernel-qcow2-linux-cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2.tar.gz kernel-qcow2-linux-cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2.tar.xz kernel-qcow2-linux-cc3d967f7e32ceeb9b78dc962126ebcf1a2b24b2.zip |
KVM: SVM: detect opening of SMI window using STGI intercept
Commit 05cade71cf3b ("KVM: nSVM: fix SMI injection in guest mode") made
KVM mask SMI if GIF=0 but it didn't do anything to unmask it when GIF is
enabled.
The issue manifests for me as a significantly longer boot time of Windows
guests when running with SMM-enabled OVMF.
This commit fixes it by intercepting STGI instead of requesting immediate
exit if the reason why SMM was masked is GIF.
Fixes: 05cade71cf3b ("KVM: nSVM: fix SMI injection in guest mode")
Signed-off-by: Ladi Prosek <lprosek@redhat.com>
Signed-off-by: Radim Krčmář <rkrcmar@redhat.com>
Diffstat (limited to 'arch/x86/kvm/vmx.c')
-rw-r--r-- | arch/x86/kvm/vmx.c | 6 |
1 files changed, 6 insertions, 0 deletions
diff --git a/arch/x86/kvm/vmx.c b/arch/x86/kvm/vmx.c index c460b0b439d3..69d45734091f 100644 --- a/arch/x86/kvm/vmx.c +++ b/arch/x86/kvm/vmx.c @@ -11973,6 +11973,11 @@ static int vmx_pre_leave_smm(struct kvm_vcpu *vcpu, u64 smbase) return 0; } +static int enable_smi_window(struct kvm_vcpu *vcpu) +{ + return 0; +} + static struct kvm_x86_ops vmx_x86_ops __ro_after_init = { .cpu_has_kvm_support = cpu_has_kvm_support, .disabled_by_bios = vmx_disabled_by_bios, @@ -12102,6 +12107,7 @@ static struct kvm_x86_ops vmx_x86_ops __ro_after_init = { .smi_allowed = vmx_smi_allowed, .pre_enter_smm = vmx_pre_enter_smm, .pre_leave_smm = vmx_pre_leave_smm, + .enable_smi_window = enable_smi_window, }; static int __init vmx_init(void) |