[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[PATCH 3/6] kvm/i386: Stop using cpu->kvm_msr_buf in kvm_put_one_msr()
From: |
Siddharth Chandrasekaran |
Subject: |
[PATCH 3/6] kvm/i386: Stop using cpu->kvm_msr_buf in kvm_put_one_msr() |
Date: |
Mon, 24 May 2021 21:54:06 +0200 |
kvm_put_one_msr() zeros cpu->kvm_msr_buf and uses it to set one MSR to
KVM. It is pretty wasteful as cpu->kvm_msr_buf is 4096 bytes long;
instead use a local buffer to avoid memset.
Also, expose this method from kvm_i386.h as hyperv.c needs to set MSRs
in a subsequent patch.
Signed-off-by: Siddharth Chandrasekaran <sidcha@amazon.de>
---
target/i386/kvm/kvm.c | 12 ++++++++----
target/i386/kvm/kvm_i386.h | 1 +
2 files changed, 9 insertions(+), 4 deletions(-)
diff --git a/target/i386/kvm/kvm.c b/target/i386/kvm/kvm.c
index d972eb4705..d19a2913fd 100644
--- a/target/i386/kvm/kvm.c
+++ b/target/i386/kvm/kvm.c
@@ -2534,12 +2534,16 @@ static void kvm_msr_entry_add(X86CPU *cpu, uint32_t
index, uint64_t value)
msrs->nmsrs++;
}
-static int kvm_put_one_msr(X86CPU *cpu, int index, uint64_t value)
+int kvm_put_one_msr(X86CPU *cpu, int index, uint64_t value)
{
- kvm_msr_buf_reset(cpu);
- kvm_msr_entry_add(cpu, index, value);
+ uint8_t msr_buf[sizeof(struct kvm_msrs) + sizeof(struct kvm_msr_entry)] =
{ 0 };
+ struct kvm_msrs *msr = (struct kvm_msrs *)msr_buf;
+
+ msr->nmsrs = 1;
+ msr->entries[0].index = index;
+ msr->entries[0].data = value;
- return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_MSRS, cpu->kvm_msr_buf);
+ return kvm_vcpu_ioctl(CPU(cpu), KVM_SET_MSRS, msr);
}
void kvm_put_apicbase(X86CPU *cpu, uint64_t value)
diff --git a/target/i386/kvm/kvm_i386.h b/target/i386/kvm/kvm_i386.h
index dc72508389..0c4cd08071 100644
--- a/target/i386/kvm/kvm_i386.h
+++ b/target/i386/kvm/kvm_i386.h
@@ -40,6 +40,7 @@ void kvm_synchronize_all_tsc(void);
void kvm_arch_reset_vcpu(X86CPU *cs);
void kvm_arch_do_init_vcpu(X86CPU *cs);
+int kvm_put_one_msr(X86CPU *cpu, int index, uint64_t value);
void kvm_put_apicbase(X86CPU *cpu, uint64_t value);
bool kvm_enable_x2apic(void);
--
2.17.1
Amazon Development Center Germany GmbH
Krausenstr. 38
10117 Berlin
Geschaeftsfuehrung: Christian Schlaeger, Jonathan Weiss
Eingetragen am Amtsgericht Charlottenburg unter HRB 149173 B
Sitz: Berlin
Ust-ID: DE 289 237 879
- [PATCH 0/6] Handle hypercall code overlay page in userspace, Siddharth Chandrasekaran, 2021/05/24
- [PATCH 1/6] hyper-v: Overlay abstraction for synic event and msg pages, Siddharth Chandrasekaran, 2021/05/24
- [PATCH 3/6] kvm/i386: Stop using cpu->kvm_msr_buf in kvm_put_one_msr(),
Siddharth Chandrasekaran <=
- [PATCH 2/6] hyper-v: Use -1 as invalid overlay address, Siddharth Chandrasekaran, 2021/05/24
- [PATCH 4/6] kvm/i386: Avoid multiple calls to check_extension(KVM_CAP_HYPERV), Siddharth Chandrasekaran, 2021/05/24
- [PATCH 5/6] kvm/i386: Add support for user space MSR filtering, Siddharth Chandrasekaran, 2021/05/24
- [PATCH 6/6] hyper-v: Handle hypercall code page as an overlay page, Siddharth Chandrasekaran, 2021/05/24