KVM: x86: Set intercept for Intel PT MSRs read/write
authorChao Peng <chao.p.peng@linux.intel.com>
Wed, 24 Oct 2018 08:05:15 +0000 (16:05 +0800)
committerPaolo Bonzini <pbonzini@redhat.com>
Fri, 21 Dec 2018 10:28:37 +0000 (11:28 +0100)
commitb08c28960f254bd246af8e30a468dfc7dd56e03b
tree07ded28e09d131d36afc941e23fc422777f24bf2
parentbf8c55d8dc094c85a3f98cd302a4dddb720dd63f
KVM: x86: Set intercept for Intel PT MSRs read/write

To save performance overhead, disable intercept Intel PT MSRs
read/write when Intel PT is enabled in guest.
MSR_IA32_RTIT_CTL is an exception that will always be intercepted.

Signed-off-by: Chao Peng <chao.p.peng@linux.intel.com>
Signed-off-by: Luwei Kang <luwei.kang@intel.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
arch/x86/kvm/vmx/vmx.c
arch/x86/kvm/vmx/vmx.h