Received: by 10.223.185.116 with SMTP id b49csp919268wrg; Wed, 21 Feb 2018 09:02:23 -0800 (PST) X-Google-Smtp-Source: AH8x224tofks3BxfYz+AFsR9Ax44P38TRXmcx24T2W+EtwIXcwKAMPdnA1byQKGy42tOvGffk69F X-Received: by 2002:a17:902:8c95:: with SMTP id t21-v6mr3724921plo.36.1519232543202; Wed, 21 Feb 2018 09:02:23 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519232543; cv=none; d=google.com; s=arc-20160816; b=DATqsn9Gq18HsCnBfo3kJ/USRUBxZURzDwbhZ4agheHuho9rsq9yftM9aVnj70LXTa V2aKj1xZnHlOO+pvEsvDpPRCswv4GBrKd4K1fgpTmqh25yedvK1JPbHKwBbdABTb1Owi WLq87QthdWpde8URBYjbH1Yk8O/IMXMzylbD9CkQNwvtKbuQTEPcQkPpxM2uyuvQqjnY GhVi07cOzeZwPSUnu3OJo0SMTWZZQVvQ1a0FPSQPQXDFPjrku0dQr0qHgJj88FlrZd3V 1dV0572xjD2xSswK+HGrp286lgnzjA/NwKS3rp9+28R98DOdqE1GRcsalESGvSs6uuoP ytOA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=3TTwxreY1gLQbeFZrpztIL3Xb8zYmyiiyNuG7K98lLo=; b=HlLPHucsGreN3FJCFi0bkFxgjoxEqrvp9OGfHfdUgjgBWnA4G4x2wgwIdCx2CgrOJj 10R5/ABsnQ1l2O5lCj9vwRg8+aMuUHhRdE84SHvUaSjZRe06euCMVRuX8AD3Ub/+ngbJ qIjdrtglPsB84LgHXHp/CIQDYuTq5Gg+ersjTYAvRtzudVqwsW9nR8M4za3KVzF+bIUc QZUHfJ44nqHYqASnFkwzmCTHerYBvWo16OCijyGfbOa2BsLNc8pt7/fEgBhOgSQxOa8G gZDQtABz9KX/dVrmYIZTCSf7GBdRJYv2+tRxOi9lSoKB9q25K03XzU4W6BO/OklP151K vBCg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id q2-v6si35646plh.499.2018.02.21.09.01.47; Wed, 21 Feb 2018 09:02:23 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933598AbeBULlv (ORCPT + 99 others); Wed, 21 Feb 2018 06:41:51 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:36670 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932556AbeBULlt (ORCPT ); Wed, 21 Feb 2018 06:41:49 -0500 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id CCDD28182D2F; Wed, 21 Feb 2018 11:41:48 +0000 (UTC) Received: from [10.36.118.60] (unknown [10.36.118.60]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 6C6D82026E03; Wed, 21 Feb 2018 11:41:46 +0000 (UTC) Subject: Re: [PATCH v2 1/2] KVM: x86: Add a framework for supporting MSR-based features To: Tom Lendacky , x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Joerg Roedel , Borislav Petkov , Thomas Gleixner , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= References: <20180215231156.31016.79657.stgit@tlendack-t1.amdoffice.net> <20180215231206.31016.78914.stgit@tlendack-t1.amdoffice.net> From: Paolo Bonzini Message-ID: <00583b68-d599-b709-133a-3741c258df13@redhat.com> Date: Wed, 21 Feb 2018 12:41:45 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180215231206.31016.78914.stgit@tlendack-t1.amdoffice.net> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.4 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 21 Feb 2018 11:41:49 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Wed, 21 Feb 2018 11:41:49 +0000 (UTC) for IP:'10.11.54.4' DOMAIN:'int-mx04.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'pbonzini@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 16/02/2018 00:12, Tom Lendacky wrote: > +static u32 msr_based_features[] = { > +}; > + > +static unsigned int num_msr_based_features = ARRAY_SIZE(msr_based_features); > + > bool kvm_valid_efer(struct kvm_vcpu *vcpu, u64 efer) > { > if (efer & efer_reserved_bits) > @@ -2785,6 +2794,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) > case KVM_CAP_SET_BOOT_CPU_ID: > case KVM_CAP_SPLIT_IRQCHIP: > case KVM_CAP_IMMEDIATE_EXIT: > + case KVM_CAP_GET_MSR_FEATURES: > r = 1; > break; > case KVM_CAP_ADJUST_CLOCK: > @@ -4410,6 +4420,47 @@ long kvm_arch_vm_ioctl(struct file *filp, > r = kvm_x86_ops->mem_enc_unreg_region(kvm, ®ion); > break; > } > + case KVM_GET_MSR_INDEX_LIST: { > + struct kvm_msr_list __user *user_msr_list = argp; > + struct kvm_msr_list msr_list; > + unsigned int n; > + > + r = -EFAULT; > + if (copy_from_user(&msr_list, user_msr_list, sizeof(msr_list))) > + goto out; > + n = msr_list.nmsrs; > + msr_list.nmsrs = num_msr_based_features; > + if (copy_to_user(user_msr_list, &msr_list, sizeof(msr_list))) > + goto out; > + r = -E2BIG; > + if (n < msr_list.nmsrs) > + goto out; > + r = -EFAULT; > + if (copy_to_user(user_msr_list->indices, &msr_based_features, > + num_msr_based_features * sizeof(u32))) > + goto out; > + r = 0; > + break; I think it's better to have some logic in kvm_init_msr_list, to filter the MSR list based on whatever MSRs the backend provides. > + } > + case KVM_GET_MSR: { It's not that the API isn't usable, KVM_GET_MSR is fine for what we need here (it's not a fast path), but it's a bit confusing to have KVM_GET_MSR and KVM_GET_MSRS. I see two possibilities: 1) reuse KVM_GET_MSRS as in the previous version. It's okay to cut-and-paste code from msr_io. 2) find a name for KVM_GET_MSR that is better and different from KVM_GET_MSRS. KVM_GET_HOST_MSR or KVM_GET_HOST_FEATURE_MSR come to mind, but I'm obviously open to other suggestions. Thanks! Paolo > + struct kvm_msr_entry __user *user_msr = argp; > + struct kvm_msr_entry msr; > + > + r = -EFAULT; > + if (copy_from_user(&msr, user_msr, sizeof(msr))) > + goto out; > + > + r = 1; > + if (!kvm_x86_ops->msr_feature || kvm_x86_ops->msr_feature(&msr)) > + goto out; > + > + r = -EFAULT; > + if (copy_to_user(user_msr, &msr, sizeof(msr))) > + goto out; > + > + r = 0; > + break; > + }