Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755156AbcDKUya (ORCPT ); Mon, 11 Apr 2016 16:54:30 -0400 Received: from mx1.redhat.com ([209.132.183.28]:52111 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752777AbcDKUy2 (ORCPT ); Mon, 11 Apr 2016 16:54:28 -0400 Date: Mon, 11 Apr 2016 22:54:24 +0200 From: Radim =?utf-8?B?S3LEjW3DocWZ?= To: Suravee Suthikulpanit Cc: pbonzini@redhat.com, joro@8bytes.org, bp@alien8.de, gleb@kernel.org, alex.williamson@redhat.com, kvm@vger.kernel.org, linux-kernel@vger.kernel.org, wei@redhat.com, sherry.hurwitz@amd.com Subject: Re: [PART1 RFC v4 09/11] svm: Do not expose x2APIC when enable AVIC Message-ID: <20160411205423.GA29328@potion.brq.redhat.com> References: <1460017232-17429-1-git-send-email-Suravee.Suthikulpanit@amd.com> <1460017232-17429-10-git-send-email-Suravee.Suthikulpanit@amd.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1460017232-17429-10-git-send-email-Suravee.Suthikulpanit@amd.com> X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Mon, 11 Apr 2016 20:54:28 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 1857 Lines: 55 2016-04-07 03:20-0500, Suravee Suthikulpanit: > From: Suravee Suthikulpanit > > Since AVIC only virtualizes xAPIC hardware for the guest, this patch > disable x2APIC support in guest CPUID. > > Signed-off-by: Suravee Suthikulpanit > --- > diff --git a/arch/x86/kvm/svm.c b/arch/x86/kvm/svm.c > @@ -4560,14 +4560,26 @@ static u64 svm_get_mt_mask(struct kvm_vcpu *vcpu, gfn_t gfn, bool is_mmio) > static void svm_cpuid_update(struct kvm_vcpu *vcpu) > { > struct vcpu_svm *svm = to_svm(vcpu); > + struct kvm_cpuid_entry2 *entry; > > /* Update nrips enabled cache */ > svm->nrips_enabled = !!guest_cpuid_has_nrips(&svm->vcpu); > + > + if (!svm_vcpu_avic_enabled(svm)) > + return; > + > + entry = kvm_find_cpuid_entry(vcpu, 0x1, 0); > + if (entry->function == 1) entry->function == 1 will always be true, because entry can be NULL otherwise, so we would bug before. Check for entry. > + entry->ecx &= ~bit(X86_FEATURE_X2APIC); > } > > static void svm_set_supported_cpuid(u32 func, struct kvm_cpuid_entry2 *entry) > { > switch (func) { > + case 0x00000001: ("case 1:" or "case 0x1:" would be easier to read.) > + if (avic) > + entry->ecx &= ~bit(X86_FEATURE_X2APIC); > + break; --- A rant for the unlikely case I get back to fix the broader situation: Only one of these two additions is needed. If we do the second one, then userspace should not set X2APIC, therefore the first one is useless. Omitting the second one allows userspace to clear apicv_active and set X86_FEATURE_X2APIC, but it needs a non-intuitive order of ioctls, so I think we should have the second one. The problem is that KVM doesn't seems to check whether userspace sets cpuid that is a subset of supported ones, so omitting the first one needlessly expands the space for potential failures.