From: Avi Kivity <avi@redhat.com>
To: "Nadav Har'El" <nyh@il.ibm.com>
Cc: kvm@vger.kernel.org, gleb@redhat.com
Subject: Re: [PATCH 06/27] nVMX: Implement reading and writing of VMX MSRs
Date: Sun, 17 Oct 2010 14:52:10 +0200 [thread overview]
Message-ID: <4CBAF17A.10000@redhat.com> (raw)
In-Reply-To: <201010171006.o9HA6crb029359@rice.haifa.ibm.com>
On 10/17/2010 12:06 PM, Nadav Har'El wrote:
> When the guest can use VMX instructions (when the "nested" module option is
> on), it should also be able to read and write VMX MSRs, e.g., to query about
> VMX capabilities. This patch adds this support.
>
> Signed-off-by: Nadav Har'El<nyh@il.ibm.com>
> ---
> arch/x86/kvm/vmx.c | 117 +++++++++++++++++++++++++++++++++++++++++++
> arch/x86/kvm/x86.c | 6 +-
> 2 files changed, 122 insertions(+), 1 deletion(-)
>
> --- .before/arch/x86/kvm/x86.c 2010-10-17 11:52:00.000000000 +0200
> +++ .after/arch/x86/kvm/x86.c 2010-10-17 11:52:00.000000000 +0200
> @@ -789,7 +789,11 @@ static u32 msrs_to_save[] = {
> #ifdef CONFIG_X86_64
> MSR_CSTAR, MSR_KERNEL_GS_BASE, MSR_SYSCALL_MASK, MSR_LSTAR,
> #endif
> - MSR_IA32_TSC, MSR_IA32_CR_PAT, MSR_VM_HSAVE_PA
> + MSR_IA32_TSC, MSR_IA32_CR_PAT, MSR_VM_HSAVE_PA,
> + MSR_IA32_FEATURE_CONTROL, MSR_IA32_VMX_BASIC,
> + MSR_IA32_VMX_PINBASED_CTLS, MSR_IA32_VMX_PROCBASED_CTLS,
> + MSR_IA32_VMX_EXIT_CTLS, MSR_IA32_VMX_ENTRY_CTLS,
> + MSR_IA32_VMX_PROCBASED_CTLS2, MSR_IA32_VMX_EPT_VPID_CAP,
> };
These MSRs are read-only by the guest (except FEATURE_CONTROL). No need
to save/restore them.
>
> static unsigned num_msrs_to_save;
> --- .before/arch/x86/kvm/vmx.c 2010-10-17 11:52:00.000000000 +0200
> +++ .after/arch/x86/kvm/vmx.c 2010-10-17 11:52:00.000000000 +0200
> @@ -1216,6 +1216,119 @@ static void vmx_adjust_tsc_offset(struct
> }
>
> /*
> + * If we allow our guest to use VMX instructions (i.e., nested VMX), we should
> + * also let it use VMX-specific MSRs.
> + * vmx_get_vmx_msr() and vmx_set_vmx_msr() return 0 when we handled a
> + * VMX-specific MSR, or 1 when we haven't (and the caller should handled it
> + * like all other MSRs).
> + */
> +static int vmx_get_vmx_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 *pdata)
> +{
> + u64 vmx_msr = 0;
> + u32 vmx_msr_high, vmx_msr_low;
> +
> + switch (msr_index) {
> + case MSR_IA32_FEATURE_CONTROL:
> + *pdata = 0;
> + break;
> + case MSR_IA32_VMX_BASIC:
> + /*
> + * This MSR reports some information about VMX support of the
> + * processor. We should return information about the VMX we
> + * emulate for the guest, and the VMCS structure we give it -
> + * not about the VMX support of the underlying hardware.
> + * However, some capabilities of the underlying hardware are
> + * used directly by our emulation (e.g., the physical address
> + * width), so these are copied from what the hardware reports.
> + */
> + *pdata = VMCS12_REVISION | (((u64)sizeof(struct vmcs12))<< 32);
Let's reserve 4K unconditionally to avoid future complications.
> + rdmsrl(MSR_IA32_VMX_BASIC, vmx_msr);
> +#define VMX_BASIC_64 0x0001000000000000LLU
> +#define VMX_BASIC_MEM_TYPE 0x003c000000000000LLU
> +#define VMX_BASIC_INOUT 0x0040000000000000LLU
Please move the defines to vmx.h (or msr-index.h).
> + *pdata |= vmx_msr&
> + (VMX_BASIC_64 | VMX_BASIC_MEM_TYPE | VMX_BASIC_INOUT);
I don't see why we need the real data here. Nothing prevents us from
supporting 64-bit physical addresses on 32-bit hosts (so long as we use
gpa_t for addresses; ditto for MEM_TYPE and INOUT.
It's helpful to have fixed values here to remove obstacles to live
migration.
> + break;
> +#define CORE2_PINBASED_CTLS_MUST_BE_ONE 0x00000016
Please use the bit names instead.
> +#define MSR_IA32_VMX_TRUE_PINBASED_CTLS 0x48d
msr-index.h
> + case MSR_IA32_VMX_TRUE_PINBASED_CTLS:
> + case MSR_IA32_VMX_PINBASED_CTLS:
> + vmx_msr_low = CORE2_PINBASED_CTLS_MUST_BE_ONE;
> + vmx_msr_high = CORE2_PINBASED_CTLS_MUST_BE_ONE |
> + PIN_BASED_EXT_INTR_MASK |
> + PIN_BASED_NMI_EXITING |
> + PIN_BASED_VIRTUAL_NMIS;
> + *pdata = vmx_msr_low | ((u64)vmx_msr_high<< 32);
> + break;
> + case MSR_IA32_VMX_PROCBASED_CTLS:
> + /* This MSR determines which vm-execution controls the L1
> + * hypervisor may ask, or may not ask, to enable. Normally we
> + * can only allow enabling features which the hardware can
> + * support, but we limit ourselves to allowing only known
> + * features that were tested nested. We allow disabling any
> + * feature (even if the hardware can't disable it).
> + */
> + rdmsr(MSR_IA32_VMX_PROCBASED_CTLS, vmx_msr_low, vmx_msr_high);
> +
> + vmx_msr_low = 0; /* allow disabling any feature */
What if the host doesn't allow disabling a feature? I think we can't
modify vmx_msr_low.
> + vmx_msr_high&= /* do not expose new untested features */
> + CPU_BASED_HLT_EXITING | CPU_BASED_CR3_LOAD_EXITING |
> + CPU_BASED_CR3_STORE_EXITING | CPU_BASED_USE_IO_BITMAPS |
> + CPU_BASED_MOV_DR_EXITING | CPU_BASED_USE_TSC_OFFSETING |
> + CPU_BASED_MWAIT_EXITING | CPU_BASED_MONITOR_EXITING |
> + CPU_BASED_INVLPG_EXITING | CPU_BASED_TPR_SHADOW |
> + CPU_BASED_USE_MSR_BITMAPS |
> +#ifdef CONFIG_X86_64
> + CPU_BASED_CR8_LOAD_EXITING |
> + CPU_BASED_CR8_STORE_EXITING |
> +#endif
> + CPU_BASED_ACTIVATE_SECONDARY_CONTROLS;
> + *pdata = vmx_msr_low | ((u64)vmx_msr_high<< 32);
> + break;
> + case MSR_IA32_VMX_EXIT_CTLS:
> + *pdata = 0;
> +#ifdef CONFIG_X86_64
> + *pdata |= VM_EXIT_HOST_ADDR_SPACE_SIZE;
> +#endif
> + break;
> + case MSR_IA32_VMX_ENTRY_CTLS:
> + *pdata = 0;
> + break;
> + case MSR_IA32_VMX_PROCBASED_CTLS2:
> + *pdata = 0;
> + if (vm_need_virtualize_apic_accesses(vcpu->kvm))
> + *pdata |= SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES;
> + break;
> + case MSR_IA32_VMX_EPT_VPID_CAP:
> + *pdata = 0;
> + break;
> + default:
> + return 1;
> + }
> +
> + return 0;
> +}
> +
> +static int vmx_set_vmx_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 data)
> +{
> + switch (msr_index) {
> + case MSR_IA32_FEATURE_CONTROL:
> + case MSR_IA32_VMX_BASIC:
> + case MSR_IA32_VMX_TRUE_PINBASED_CTLS:
> + case MSR_IA32_VMX_PINBASED_CTLS:
> + case MSR_IA32_VMX_PROCBASED_CTLS:
> + case MSR_IA32_VMX_EXIT_CTLS:
> + case MSR_IA32_VMX_ENTRY_CTLS:
> + case MSR_IA32_VMX_PROCBASED_CTLS2:
> + case MSR_IA32_VMX_EPT_VPID_CAP:
> + pr_unimpl(vcpu, "unimplemented VMX MSR write: 0x%x data %llx\n",
> + msr_index, data);
> + return 0;
These are illegal to write anyway and should #GP (except
FEATURE_CONTROL). We will however need a way for userspace to write
these MSRs to allow fine tuning the exposed features (as we do with cpuid).
> + default:
> + return 1;
> + }
> +}
--
error compiling committee.c: too many arguments to function
next prev parent reply other threads:[~2010-10-17 12:52 UTC|newest]
Thread overview: 56+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-10-17 10:03 [PATCH 0/27] nVMX: Nested VMX, v6 Nadav Har'El
2010-10-17 10:04 ` [PATCH 01/27] nVMX: Add "nested" module option to vmx.c Nadav Har'El
2010-10-17 10:04 ` [PATCH 02/27] nVMX: Add VMX and SVM to list of supported cpuid features Nadav Har'El
2010-10-17 10:05 ` [PATCH 03/27] nVMX: Implement VMXON and VMXOFF Nadav Har'El
2010-10-17 12:24 ` Avi Kivity
2010-10-17 12:47 ` Nadav Har'El
2010-10-17 13:07 ` Avi Kivity
2010-10-17 10:05 ` [PATCH 04/27] nVMX: Allow setting the VMXE bit in CR4 Nadav Har'El
2010-10-17 12:31 ` Avi Kivity
2010-10-17 10:06 ` [PATCH 05/27] nVMX: Introduce vmcs12: a VMCS structure for L1 Nadav Har'El
2010-10-17 12:34 ` Avi Kivity
2010-10-17 13:18 ` Nadav Har'El
2010-10-17 13:29 ` Avi Kivity
2010-10-17 10:06 ` [PATCH 06/27] nVMX: Implement reading and writing of VMX MSRs Nadav Har'El
2010-10-17 12:52 ` Avi Kivity [this message]
2010-10-17 10:07 ` [PATCH 07/27] nVMX: Decoding memory operands of VMX instructions Nadav Har'El
2010-10-17 10:07 ` [PATCH 08/27] nVMX: Hold a vmcs02 for each vmcs12 Nadav Har'El
2010-10-17 13:00 ` Avi Kivity
2010-10-17 10:08 ` [PATCH 09/27] nVMX: Success/failure of VMX instructions Nadav Har'El
2010-10-17 10:08 ` [PATCH 10/27] nVMX: Implement VMCLEAR Nadav Har'El
2010-10-17 13:05 ` Avi Kivity
2010-10-17 13:25 ` Nadav Har'El
2010-10-17 13:27 ` Avi Kivity
2010-10-17 13:37 ` Nadav Har'El
2010-10-17 14:12 ` Avi Kivity
2010-10-17 14:14 ` Gleb Natapov
2010-10-17 10:09 ` [PATCH 11/27] nVMX: Implement VMPTRLD Nadav Har'El
2010-10-17 10:09 ` [PATCH 12/27] nVMX: Implement VMPTRST Nadav Har'El
2010-10-17 10:10 ` [PATCH 13/27] nVMX: Add VMCS fields to the vmcs12 Nadav Har'El
2010-10-17 13:15 ` Avi Kivity
2010-10-17 10:10 ` [PATCH 14/27] nVMX: Implement VMREAD and VMWRITE Nadav Har'El
2010-10-17 13:25 ` Avi Kivity
2010-10-17 10:11 ` [PATCH 15/27] nVMX: Prepare vmcs02 from vmcs01 and vmcs12 Nadav Har'El
2010-10-17 14:08 ` Avi Kivity
2011-02-08 12:13 ` Nadav Har'El
2011-02-08 12:27 ` Avi Kivity
2011-02-08 12:36 ` Nadav Har'El
2011-02-08 12:39 ` Avi Kivity
2011-02-08 12:27 ` Avi Kivity
2010-10-17 10:11 ` [PATCH 16/27] nVMX: Move register-syncing to a function Nadav Har'El
2010-10-17 10:12 ` [PATCH 17/27] nVMX: Implement VMLAUNCH and VMRESUME Nadav Har'El
2010-10-17 15:06 ` Avi Kivity
2010-10-17 10:12 ` [PATCH 18/27] nVMX: No need for handle_vmx_insn function any more Nadav Har'El
2010-10-17 10:13 ` [PATCH 19/27] nVMX: Exiting from L2 to L1 Nadav Har'El
2010-10-17 15:58 ` Avi Kivity
2010-10-17 10:13 ` [PATCH 20/27] nVMX: Deciding if L0 or L1 should handle an L2 exit Nadav Har'El
2010-10-20 12:13 ` Avi Kivity
2010-10-20 14:57 ` Avi Kivity
2010-10-17 10:14 ` [PATCH 21/27] nVMX: Correct handling of interrupt injection Nadav Har'El
2010-10-17 10:14 ` [PATCH 22/27] nVMX: Correct handling of exception injection Nadav Har'El
2010-10-17 10:15 ` [PATCH 23/27] nVMX: Correct handling of idt vectoring info Nadav Har'El
2010-10-17 10:15 ` [PATCH 24/27] nVMX: Handling of CR0.TS and #NM for Lazy FPU loading Nadav Har'El
2010-10-17 10:16 ` [PATCH 25/27] nVMX: Additional TSC-offset handling Nadav Har'El
2010-10-19 19:13 ` Zachary Amsden
2010-10-17 10:16 ` [PATCH 26/27] nVMX: Miscellenous small corrections Nadav Har'El
2010-10-17 10:17 ` [PATCH 27/27] nVMX: Documentation Nadav Har'El
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4CBAF17A.10000@redhat.com \
--to=avi@redhat.com \
--cc=gleb@redhat.com \
--cc=kvm@vger.kernel.org \
--cc=nyh@il.ibm.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).