|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v3 5/8] x86/pv: allow reading FEATURE_CONTROL MSR
On Wed, Sep 02, 2020 at 09:56:48PM +0100, Andrew Cooper wrote:
> On 01/09/2020 11:54, Roger Pau Monne wrote:
> > Linux PV guests will attempt to read the FEATURE_CONTROL MSR, so move
> > the handling done in VMX code into guest_rdmsr as it can be shared
> > between PV and HVM guests that way.
> >
> > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> > ---
> > Changes from v1:
> > - Move the VMX implementation into guest_rdmsr.
> > ---
> > xen/arch/x86/hvm/vmx/vmx.c | 8 +-------
> > xen/arch/x86/msr.c | 13 +++++++++++++
> > 2 files changed, 14 insertions(+), 7 deletions(-)
> >
> > diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
> > index 4717e50d4a..f6657af923 100644
> > --- a/xen/arch/x86/hvm/vmx/vmx.c
> > +++ b/xen/arch/x86/hvm/vmx/vmx.c
> > @@ -2980,13 +2980,7 @@ static int vmx_msr_read_intercept(unsigned int msr,
> > uint64_t *msr_content)
> > case MSR_IA32_DEBUGCTLMSR:
> > __vmread(GUEST_IA32_DEBUGCTL, msr_content);
> > break;
> > - case MSR_IA32_FEATURE_CONTROL:
> > - *msr_content = IA32_FEATURE_CONTROL_LOCK;
> > - if ( vmce_has_lmce(curr) )
> > - *msr_content |= IA32_FEATURE_CONTROL_LMCE_ON;
> > - if ( nestedhvm_enabled(curr->domain) )
> > - *msr_content |= IA32_FEATURE_CONTROL_ENABLE_VMXON_OUTSIDE_SMX;
> > - break;
> > +
> > case MSR_IA32_VMX_BASIC...MSR_IA32_VMX_VMFUNC:
> > if ( !nvmx_msr_read_intercept(msr, msr_content) )
> > goto gp_fault;
> > diff --git a/xen/arch/x86/msr.c b/xen/arch/x86/msr.c
> > index e84107ac7b..cc2f111a90 100644
> > --- a/xen/arch/x86/msr.c
> > +++ b/xen/arch/x86/msr.c
> > @@ -25,6 +25,7 @@
> > #include <xen/sched.h>
> >
> > #include <asm/debugreg.h>
> > +#include <asm/hvm/nestedhvm.h>
> > #include <asm/hvm/viridian.h>
> > #include <asm/msr.h>
> > #include <asm/setup.h>
> > @@ -197,6 +198,18 @@ int guest_rdmsr(struct vcpu *v, uint32_t msr, uint64_t
> > *val)
> > /* Not offered to guests. */
> > goto gp_fault;
> >
> > + case MSR_IA32_FEATURE_CONTROL:
> > + if ( !(cp->x86_vendor & X86_VENDOR_INTEL) )
> > + goto gp_fault;
>
> The MSR is available if:
>
> "If any one enumeration
> condition for defined bit
> field position greater than
> bit 0 holds."
>
> which for us means cp->basic.vmx || cp->feat.lmce at the moment, with
> perhaps some smx/sgx in the future.
I don't think there's a lmce cpu bit (seems to be signaled in
IA32_MCG_CAP[27] = 1), maybe I should just use vmce_has_lmce?
if ( !cp->basic.vmx || !vmce_has_lmce(v) )
goto gp_fault;
Is it fine however to return a #GP if we don't provide any of those
features to guests, but the underlying CPU does support them?
That seems to be slightly different from how we currently handle reads
to FEATURE_CONTROL, since it will never fault on Intel (or compliant),
even if we just return with bit 0 set alone. The new approach seems
closer to what real hardware would do.
Thanks, Roger.
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |