From: "Radim Krčmář" <rkrcmar@redhat.com>
To: David Hildenbrand <david@redhat.com>
Cc: linux-kernel@vger.kernel.org, kvm@vger.kernel.org,
Paolo Bonzini <pbonzini@redhat.com>
Subject: Re: [PATCH] KVM: x86: restrict maximal physical address
Date: Tue, 29 Nov 2016 17:53:25 +0100 [thread overview]
Message-ID: <20161129165321.GA15101@potion> (raw)
In-Reply-To: <1cca4e4d-97f8-91b9-4e71-66f4a3c3cfb2@redhat.com>
2016-11-25 17:43+0100, David Hildenbrand:
>> > This check is correct.
>> >
>> > However, I wonder if there is any way for user space to query this property?
>>
>> Do you mean boot_cpu_data.x86_phys_bits?
>> Userspace can execute CPUID instruction and read the value; QEMU does.
>
> Thanks, good to know. I remember that on s390x we explicitly decided to
> query the maximum address from KVM (KVM_S390_VM_MEM_LIMIT_SIZE) for two
> reasons. One of them was "just because our CPU supports it doesn't mean KVM
> supports it". Just like with all CPU features.
>
> However, this applies only for configuring hardware virtualization. The
> value that is exposed to the guest comes from the cpu model (with s390x cpu
> model support). So it will also not change during migration.
>
> But if this will never be relevant for x86 (KVM will always support host
> x86_phys_bits), fine.
>
>>
>> > On s390x, there is a kvm capability to export this information to user
>> > space. So QEMU can fail (e.g. migration) with a nice error message about
>> > missing hardware support.
>> >
>> > (most probably we still want to block this case, as migration will seem to
>> > work but than simply fail due to missing hardware support I guess). Maybe
>> > there is also already a nice check in QEMU that I am not yet aware of :)
>>
>> This patch is bad. It would break QEMU on all old machines, because
>> QEMU sets 40 by default.
>
> Not sure if rounding that value down (so it is at least consistent in KVM)
> makes sense (and documenting this behavior "may be rounded down"). And then
> implementing appropriate checks in QEMU (if not already present).
Silently rouding down doesn't fix bugs that we introduce to the guest,
just makes them behave differently and changing the value while the
guest is running could introduce more bugs. :(
I slightly prefer doing nothing for the case I was writing this patch
for: VMX checks for CR3 reserved bits -- doing nothing means that the
guest gets killed; rouding down would make the guest misbehave, which a
bit harder to debug.
Changing QEMU makes sense even if KVM stays the same. I'd touch QEMU
first, actually and after few years (decades), we could just apply this
patch. :)
>> Heh, QEMU doesn't check at all -- it even allows migration with
>> "host-phys-bits" feature and will happily change phys-bits when
>> migrating to another machine.
>>
>
> Either migrate that value (hmmm... ) or glue it to a command line parameter,
> so it won't change while migrating. E.g.
> - cpu models (if this value was always the same for a CPU generation - no
> expert on x86 cpu models).
> - "-cpu maxmem..." - could be a fit when thinking about "maximum VM size ==
> max phys bits for our guest". But depends how this value is actually
> interpreted by guests.
Yes, the host value has to be migrated in that case. QEMU also has
"phys-bits=N" feature and the default protected by machine types is 40,
so both work as expected on migration.
next prev parent reply other threads:[~2016-11-29 16:53 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-11-25 14:51 [PATCH] KVM: x86: restrict maximal physical address Radim Krčmář
2016-11-25 15:11 ` David Hildenbrand
2016-11-25 16:14 ` Radim Krčmář
2016-11-25 16:43 ` David Hildenbrand
2016-11-29 16:53 ` Radim Krčmář [this message]
2016-11-25 16:10 ` Paolo Bonzini
2016-11-25 16:57 ` Radim Krčmář
2016-11-25 17:21 ` Paolo Bonzini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20161129165321.GA15101@potion \
--to=rkrcmar@redhat.com \
--cc=david@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=linux-kernel@vger.kernel.org \
--cc=pbonzini@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox