Received: by 10.223.185.116 with SMTP id b49csp1031667wrg; Wed, 21 Feb 2018 10:53:38 -0800 (PST) X-Google-Smtp-Source: AH8x224CIuf5s9f/3ivJVCSCT3phiGLNyfJa20sTtSm1KAu3rAgh2YsjSPr1NYiKqIjjJkolmvsQ X-Received: by 2002:a17:902:3103:: with SMTP id w3-v6mr3816214plb.99.1519239218129; Wed, 21 Feb 2018 10:53:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1519239218; cv=none; d=google.com; s=arc-20160816; b=IDUf3HyCCqd2k1j0xKUVuBG93NjA/zZ/BV+YT0o2MzWffBRmAOXw4lLcPKc9laHbJL Jg2mXn8n+eu6stkNZE+DDXTJ6hY2GEriCmuZnXMOKJVIkqDQJzTidrSJVtXguyt4L6TO diqMCZjSZVhxKIuRhuUfhpDubC7S+Y4qqJIzvXAnFKC0xRlV0Rq54BEGh0gGobhIA3Pi I4ZJl6sJzg6vMTz8CKVsd9CNUH4qkTjZzXhWKz75G1O0hK3CUFPX+E4q5y5bEO4RjWWl C0hbfSMgHi3IukA1wRY6A+3s7XwomMmA2RCl3vKVdkwM8kb/TfcPD5n6DHD1w14AWaHc IABA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:arc-authentication-results; bh=QnFus8SpD/jTnWXE58kKnjXEK/iEKrwCtF+lxK6lfCg=; b=bwo/oD9Ce18e9h8t7FK4X6QQPYx5N0ap74uuFBAybBEUAusGkus8dj/uRn6WWkTw59 8m6RFI0/oicYdTiWHXxMt3XyXE/Gs9uieiC08pHqrjAAT0ZNUxNGdkeID6PuGiYLeRWm pX3ilv7FWZRHMjahM1rBhRki3dGmOxec2lDIhpi+uebhN0UFxPi4ocvhiH/gOD9d34nb 8W0S98aVnGXYglz7HxkpL3muNr4o1GYP+joWf4blH0NLKINpgHeySz510dKd/UC5Ox0k iSxQwUlaFA993+rULhbnv7laEJjIueWIHC4RtWd98vHrBWJoqOeM1y4+OzKs0H4RItJJ yyXA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id z188si3351235pfz.46.2018.02.21.10.53.24; Wed, 21 Feb 2018 10:53:38 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S937721AbeBUOch (ORCPT + 99 others); Wed, 21 Feb 2018 09:32:37 -0500 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:48780 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S934465AbeBUOce (ORCPT ); Wed, 21 Feb 2018 09:32:34 -0500 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id D309240201A1; Wed, 21 Feb 2018 14:32:33 +0000 (UTC) Received: from [10.36.118.60] (unknown [10.36.118.60]) by smtp.corp.redhat.com (Postfix) with ESMTPS id 47838AF035; Wed, 21 Feb 2018 14:32:32 +0000 (UTC) Subject: Re: [PATCH v2 1/2] KVM: x86: Add a framework for supporting MSR-based features To: Tom Lendacky , x86@kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org Cc: Joerg Roedel , Borislav Petkov , Thomas Gleixner , =?UTF-8?B?UmFkaW0gS3LEjW3DocWZ?= References: <20180215231156.31016.79657.stgit@tlendack-t1.amdoffice.net> <20180215231206.31016.78914.stgit@tlendack-t1.amdoffice.net> <00583b68-d599-b709-133a-3741c258df13@redhat.com> <7f6a78ae-abab-2a03-aebd-e43e6fe168b4@amd.com> From: Paolo Bonzini Message-ID: <94f6ed44-07ab-ff0f-2a6d-b3d8ff4ff4b1@redhat.com> Date: Wed, 21 Feb 2018 15:32:30 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <7f6a78ae-abab-2a03-aebd-e43e6fe168b4@amd.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.11.54.5 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 21 Feb 2018 14:32:33 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.6]); Wed, 21 Feb 2018 14:32:33 +0000 (UTC) for IP:'10.11.54.5' DOMAIN:'int-mx05.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'pbonzini@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 21/02/2018 15:15, Tom Lendacky wrote: > On 2/21/2018 5:41 AM, Paolo Bonzini wrote: >> On 16/02/2018 00:12, Tom Lendacky wrote: >>> +static u32 msr_based_features[] = { >>> +}; >>> + >>> +static unsigned int num_msr_based_features = ARRAY_SIZE(msr_based_features); >>> + >>> bool kvm_valid_efer(struct kvm_vcpu *vcpu, u64 efer) >>> { >>> if (efer & efer_reserved_bits) >>> @@ -2785,6 +2794,7 @@ int kvm_vm_ioctl_check_extension(struct kvm *kvm, long ext) >>> case KVM_CAP_SET_BOOT_CPU_ID: >>> case KVM_CAP_SPLIT_IRQCHIP: >>> case KVM_CAP_IMMEDIATE_EXIT: >>> + case KVM_CAP_GET_MSR_FEATURES: >>> r = 1; >>> break; >>> case KVM_CAP_ADJUST_CLOCK: >>> @@ -4410,6 +4420,47 @@ long kvm_arch_vm_ioctl(struct file *filp, >>> r = kvm_x86_ops->mem_enc_unreg_region(kvm, ®ion); >>> break; >>> } >>> + case KVM_GET_MSR_INDEX_LIST: { >>> + struct kvm_msr_list __user *user_msr_list = argp; >>> + struct kvm_msr_list msr_list; >>> + unsigned int n; >>> + >>> + r = -EFAULT; >>> + if (copy_from_user(&msr_list, user_msr_list, sizeof(msr_list))) >>> + goto out; >>> + n = msr_list.nmsrs; >>> + msr_list.nmsrs = num_msr_based_features; >>> + if (copy_to_user(user_msr_list, &msr_list, sizeof(msr_list))) >>> + goto out; >>> + r = -E2BIG; >>> + if (n < msr_list.nmsrs) >>> + goto out; >>> + r = -EFAULT; >>> + if (copy_to_user(user_msr_list->indices, &msr_based_features, >>> + num_msr_based_features * sizeof(u32))) >>> + goto out; >>> + r = 0; >>> + break; >> >> I think it's better to have some logic in kvm_init_msr_list, to filter >> the MSR list based on whatever MSRs the backend provides. > > Ok, that's what I had originally and then you said to just return the full > list and let KVM_GET_MSR return a 0 or 1 if it was supported. I can switch > it back. Hmm, I cannot find this remark (I would have been very confused, so I tried to look for it). I commented on removing kvm_valid_msr_feature, but not kvm_init_msr_list. >> >>> + } >>> + case KVM_GET_MSR: { >> >> It's not that the API isn't usable, KVM_GET_MSR is fine for what we need >> here (it's not a fast path), but it's a bit confusing to have >> KVM_GET_MSR and KVM_GET_MSRS. >> >> I see two possibilities: >> >> 1) reuse KVM_GET_MSRS as in the previous version. It's okay to >> cut-and-paste code from msr_io. > > If I go back to trimming the list based on support, then KVM_GET_MSRS can > be used. No problem, renaming is enough---I should have made a better suggestion in the previous review. Paolo