* [PATCH] CPUID Masking MSRs
@ 2009-01-07 8:53 Alexander Graf
2009-01-07 10:07 ` Avi Kivity
0 siblings, 1 reply; 7+ messages in thread
From: Alexander Graf @ 2009-01-07 8:53 UTC (permalink / raw)
To: kvm; +Cc: joerg.roedel
Current AMD CPUs support masking of CPUID bits. Using this functionality,
a VMM can limit what features are exposed to the guest, even if it's not
using SVM/VMX.
While I'm not aware of any open source hypervisor that uses these MSRs
atm, VMware ESX does and patches exist for Xen, where trapping CPUID is
non-trivial.
This patch implements emulation for this masking, which is pretty trivial
because we're intercepting CPUID anyways.
Because it's so simple and can be pretty effective, I put it into the
generic code paths, so VMX benefits from it as well.
Signed-off-by: Alexander Graf <agraf@suse.de>
diff --git a/arch/x86/include/asm/kvm_host.h b/arch/x86/include/asm/kvm_host.h
index 863ea73..e2f0dde 100644
--- a/arch/x86/include/asm/kvm_host.h
+++ b/arch/x86/include/asm/kvm_host.h
@@ -370,6 +370,9 @@ struct kvm_vcpu_arch {
unsigned long dr6;
unsigned long dr7;
unsigned long eff_db[KVM_NR_DB_REGS];
+
+ u64 cpuid_mask;
+ u64 cpuid_mask_ext;
};
struct kvm_mem_alias {
diff --git a/arch/x86/include/asm/msr-index.h b/arch/x86/include/asm/msr-index.h
index 1890032..03b53ba 100644
--- a/arch/x86/include/asm/msr-index.h
+++ b/arch/x86/include/asm/msr-index.h
@@ -337,5 +337,7 @@
#define MSR_VM_CR 0xc0010114
#define MSR_VM_HSAVE_PA 0xc0010117
+#define MSR_VM_MASK_CPUID 0xc0011004
+#define MSR_VM_MASK_CPUID_EXT 0xc0011005
#endif /* _ASM_X86_MSR_INDEX_H */
diff --git a/arch/x86/kvm/x86.c b/arch/x86/kvm/x86.c
index 18bba94..83b4877 100644
--- a/arch/x86/kvm/x86.c
+++ b/arch/x86/kvm/x86.c
@@ -782,6 +784,12 @@ int kvm_set_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 data)
kvm_write_guest_time(vcpu);
break;
}
+ case MSR_VM_MASK_CPUID:
+ vcpu->arch.cpuid_mask = data;
+ break;
+ case MSR_VM_MASK_CPUID_EXT:
+ vcpu->arch.cpuid_mask_ext = data;
+ break;
default:
pr_unimpl(vcpu, "unhandled wrmsr: 0x%x data %llx\n", msr, data);
return 1;
@@ -896,6 +904,12 @@ int kvm_get_msr_common(struct kvm_vcpu *vcpu, u32 msr, u64 *pdata)
case MSR_KVM_SYSTEM_TIME:
data = vcpu->arch.time;
break;
+ case MSR_VM_MASK_CPUID:
+ data = vcpu->arch.cpuid_mask;
+ break;
+ case MSR_VM_MASK_CPUID_EXT:
+ data = vcpu->arch.cpuid_mask_ext;
+ break;
default:
pr_unimpl(vcpu, "unhandled rdmsr: 0x%x\n", msr);
return 1;
@@ -2901,10 +2915,19 @@ void kvm_emulate_cpuid(struct kvm_vcpu *vcpu)
kvm_register_write(vcpu, VCPU_REGS_RDX, 0);
best = kvm_find_cpuid_entry(vcpu, function, index);
if (best) {
+ u32 ecx = best->ecx;
+ u32 edx = best->edx;
kvm_register_write(vcpu, VCPU_REGS_RAX, best->eax);
kvm_register_write(vcpu, VCPU_REGS_RBX, best->ebx);
- kvm_register_write(vcpu, VCPU_REGS_RCX, best->ecx);
- kvm_register_write(vcpu, VCPU_REGS_RDX, best->edx);
+ if ( function == 1 ) {
+ ecx &= (u32)vcpu->arch.cpuid_mask;
+ edx &= (u32)(vcpu->arch.cpuid_mask >> 32);
+ } else if ( function == 0x80000001 ) {
+ ecx &= (u32)vcpu->arch.cpuid_mask_ext;
+ edx &= (u32)(vcpu->arch.cpuid_mask_ext >> 32);
+ }
+ kvm_register_write(vcpu, VCPU_REGS_RCX, ecx);
+ kvm_register_write(vcpu, VCPU_REGS_RDX, edx);
}
kvm_x86_ops->skip_emulated_instruction(vcpu);
KVMTRACE_5D(CPUID, vcpu, function,
@@ -4089,6 +4112,8 @@ int kvm_arch_vcpu_reset(struct kvm_vcpu *vcpu)
memset(vcpu->arch.db, 0, sizeof(vcpu->arch.db));
vcpu->arch.dr6 = DR6_FIXED_1;
vcpu->arch.dr7 = DR7_FIXED_1;
+ vcpu->arch.cpuid_mask = 0xffffffffffffffff;
+ vcpu->arch.cpuid_mask_ext = 0xffffffffffffffff;
return kvm_x86_ops->vcpu_reset(vcpu);
}
--
1.5.6
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH] CPUID Masking MSRs
2009-01-07 8:53 [PATCH] CPUID Masking MSRs Alexander Graf
@ 2009-01-07 10:07 ` Avi Kivity
2009-01-07 10:10 ` Alexander Graf
0 siblings, 1 reply; 7+ messages in thread
From: Avi Kivity @ 2009-01-07 10:07 UTC (permalink / raw)
To: Alexander Graf; +Cc: kvm, joerg.roedel
Alexander Graf wrote:
> Current AMD CPUs support masking of CPUID bits. Using this functionality,
> a VMM can limit what features are exposed to the guest, even if it's not
> using SVM/VMX.
>
> While I'm not aware of any open source hypervisor that uses these MSRs
> atm, VMware ESX does and patches exist for Xen, where trapping CPUID is
> non-trivial.
>
> This patch implements emulation for this masking, which is pretty trivial
> because we're intercepting CPUID anyways.
>
> Because it's so simple and can be pretty effective, I put it into the
> generic code paths, so VMX benefits from it as well.
>
>
Missing save/restore support.
Note that Intel has similar functionality, called FlexMigration IIRC,
likely using different MSRs.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] CPUID Masking MSRs
2009-01-07 10:07 ` Avi Kivity
@ 2009-01-07 10:10 ` Alexander Graf
2009-01-07 10:22 ` Avi Kivity
0 siblings, 1 reply; 7+ messages in thread
From: Alexander Graf @ 2009-01-07 10:10 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm, joerg.roedel
On 07.01.2009, at 11:07, Avi Kivity wrote:
> Alexander Graf wrote:
>> Current AMD CPUs support masking of CPUID bits. Using this
>> functionality,
>> a VMM can limit what features are exposed to the guest, even if
>> it's not
>> using SVM/VMX.
>>
>> While I'm not aware of any open source hypervisor that uses these
>> MSRs
>> atm, VMware ESX does and patches exist for Xen, where trapping
>> CPUID is
>> non-trivial.
>>
>> This patch implements emulation for this masking, which is pretty
>> trivial
>> because we're intercepting CPUID anyways.
>>
>> Because it's so simple and can be pretty effective, I put it into the
>> generic code paths, so VMX benefits from it as well.
>>
>>
>
> Missing save/restore support.
Right. I keep forgetting about that one ;-).
> Note that Intel has similar functionality, called FlexMigration
> IIRC, likely using different MSRs.
Hum. I'll take a look at it to see if that's as easy to implement then.
Alex
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] CPUID Masking MSRs
2009-01-07 10:10 ` Alexander Graf
@ 2009-01-07 10:22 ` Avi Kivity
2009-01-07 10:33 ` Alexander Graf
0 siblings, 1 reply; 7+ messages in thread
From: Avi Kivity @ 2009-01-07 10:22 UTC (permalink / raw)
To: Alexander Graf; +Cc: kvm, joerg.roedel
Alexander Graf wrote:
>> Note that Intel has similar functionality, called FlexMigration IIRC,
>> likely using different MSRs.
>
> Hum. I'll take a look at it to see if that's as easy to implement then.
It's probably easy (well supporting both might be tricky) but if you
don't have a real test case then it's best to wait with it.
--
error compiling committee.c: too many arguments to function
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] CPUID Masking MSRs
2009-01-07 10:22 ` Avi Kivity
@ 2009-01-07 10:33 ` Alexander Graf
2009-01-07 11:16 ` Andre Przywara
0 siblings, 1 reply; 7+ messages in thread
From: Alexander Graf @ 2009-01-07 10:33 UTC (permalink / raw)
To: Avi Kivity; +Cc: kvm, joerg.roedel
Avi Kivity wrote:
> Alexander Graf wrote:
>>> Note that Intel has similar functionality, called FlexMigration
>>> IIRC, likely using different MSRs.
>>
>> Hum. I'll take a look at it to see if that's as easy to implement then.
>
> It's probably easy (well supporting both might be tricky) but if you
> don't have a real test case then it's best to wait with it.
Well if I could take the FlexMigration design into account when putting
variables in the vcpu context, that'd be great. But I can't seem to find
it in the Intel documentation, so I'll leave it for now.
Alex
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] CPUID Masking MSRs
2009-01-07 10:33 ` Alexander Graf
@ 2009-01-07 11:16 ` Andre Przywara
2009-01-07 11:32 ` Alexander Graf
0 siblings, 1 reply; 7+ messages in thread
From: Andre Przywara @ 2009-01-07 11:16 UTC (permalink / raw)
To: Alexander Graf; +Cc: Avi Kivity, kvm, joerg.roedel
Alexander Graf wrote:
> Well if I could take the FlexMigration design into account when putting
> variables in the vcpu context, that'd be great. But I can't seem to find
> it in the Intel documentation, so I'll leave it for now.
Not real documentation (tell me if you find some!), but this code shows
almost everything you probably need:
http://xenbits.xensource.com/xen-unstable.hg?rev/be20b11656bb
Regards,
Andre.
--
Andre Przywara
AMD-Operating System Research Center (OSRC), Dresden, Germany
Tel: +49 351 277-84917
----to satisfy European Law for business letters:
Advanced Micro Devices GmbH
Karl-Hammerschmidt-Str. 34, 85609 Dornach b. München
Geschäftsführer: Jochen Polster; Thomas M. McCoy; Giuliano Meroni
Sitz: Dornach, Gemeinde Aschheim, Landkreis München
Registergericht München, HRB Nr. 43632
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH] CPUID Masking MSRs
2009-01-07 11:16 ` Andre Przywara
@ 2009-01-07 11:32 ` Alexander Graf
0 siblings, 0 replies; 7+ messages in thread
From: Alexander Graf @ 2009-01-07 11:32 UTC (permalink / raw)
To: Andre Przywara; +Cc: Avi Kivity, kvm, joerg.roedel
On 07.01.2009, at 12:16, Andre Przywara wrote:
> Alexander Graf wrote:
>> Well if I could take the FlexMigration design into account when
>> putting
>> variables in the vcpu context, that'd be great. But I can't seem to
>> find
>> it in the Intel documentation, so I'll leave it for now.
> Not real documentation (tell me if you find some!), but this code
> shows almost everything you probably need:
> http://xenbits.xensource.com/xen-unstable.hg?rev/be20b11656bb
It only shows two of the four feature values, but it's definitely a
start :-). Thanks a lot! Looks like the Intel way is about the same.
Alex
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2009-01-07 11:32 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2009-01-07 8:53 [PATCH] CPUID Masking MSRs Alexander Graf
2009-01-07 10:07 ` Avi Kivity
2009-01-07 10:10 ` Alexander Graf
2009-01-07 10:22 ` Avi Kivity
2009-01-07 10:33 ` Alexander Graf
2009-01-07 11:16 ` Andre Przywara
2009-01-07 11:32 ` Alexander Graf
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox