KVM: SVM: Do not virtualize MSR accesses for APIC LVTT register
authorSuravee Suthikulpanit <suravee.suthikulpanit@amd.com>
Mon, 25 Jul 2022 03:34:28 +0000 (22:34 -0500)
committerPaolo Bonzini <pbonzini@redhat.com>
Thu, 28 Jul 2022 17:51:42 +0000 (13:51 -0400)
commit0a8735a6acf36ac35499563dc44f3e3d5034a2ce
treee94f57ed33bae624ffbcaa50e636752a0b987bc8
parentce30d8b976b46b697cfcbc0aa5dab03edb0301dc
KVM: SVM: Do not virtualize MSR accesses for APIC LVTT register

AMD does not support APIC TSC-deadline timer mode. AVIC hardware
will generate GP fault when guest kernel writes 1 to bits [18]
of the APIC LVTT register (offset 0x32) to set the timer mode.
(Note: bit 18 is reserved on AMD system).

Therefore, always intercept and let KVM emulate the MSR accesses.

Fixes: f3d7c8aa6882 ("KVM: SVM: Fix x2APIC MSRs interception")
Signed-off-by: Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>
Message-Id: <20220725033428.3699-1-suravee.suthikulpanit@amd.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/svm/svm.c