Received: by 2002:ac0:950c:0:0:0:0:0 with SMTP id f12csp3799185imc; Thu, 14 Mar 2019 05:41:36 -0700 (PDT) X-Google-Smtp-Source: APXvYqyeuq9eIawBR4+gHgpODbvD9OFVkAOTkXycWXd0O6kULYrieDw/n70B7pENyPzRtob234Jw X-Received: by 2002:a17:902:8e82:: with SMTP id bg2mr51201598plb.217.1552567296272; Thu, 14 Mar 2019 05:41:36 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1552567296; cv=none; d=google.com; s=arc-20160816; b=wsgPKR6SsZDVmkvOYzinOsCbHtoHiNToosqInEQO+IDq0co+Pz3k7MJfSahau33Vyq hBciN+CpkJn9b4BumtGhzI9aSfmKr724kgIBU50pZdah4wcQT2W/8vmHNflcFx7IYd9G XweGUgKugannyXNLo95M4gavCfAdfZ54Y1vLwQjMrH+2s8U1eQGRwGtQ/jZKXXhJjHNh mO2Xtaj7CVidNbt5+WldlasOLPKykvxnxKlzB0dFAOTZnndnMx9V86JKW4Gv2rC83Z36 +XqK3FrKgy8PTarIzeDY6oa7u9neHG8D8xdkSY2dLF0M65/NFS/3Sh5pSbq+iVh2Mb7g QdLA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:date:cc:to:from:subject:message-id; bh=m/y38JjEZJXwC5oyBMPRnb6aFscPX7P+1khnlJ2iUFk=; b=fCHTQu4M6tzXNq4/O9n7eJ74s60QQfy8TlrZCINGotXE0LSExjLYM5WyNybdMEkCMI NR1FPYfu0w3OkiAuQz7r89QSg1HC1pzV0BaIqIDT6OZlZAIKKBxqp3jaB2vJyU0vUOaK zAh+BEk4vNmY15LV04S7ontu8sG6sZQEd5fJZYDD0d6QFCARlyyNcU7nkubTtpq+lVRA 1mGEITIGrja7MnuDQ3tJRwmATbD4I/nJKoCngTnbIylPOYbIpfUuox/ZeR8DVobXndcy c9fjPx4Cq10e9+GT49FQf/hjW2dSpP09s9zZeVRNB4mOuyrFr44MsvOd0lNaVt+uDoeA 4LkQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id r11si13247629plo.400.2019.03.14.05.41.20; Thu, 14 Mar 2019 05:41:36 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727406AbfCNMkk (ORCPT + 99 others); Thu, 14 Mar 2019 08:40:40 -0400 Received: from mga07.intel.com ([134.134.136.100]:47934 "EHLO mga07.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727056AbfCNMkk (ORCPT ); Thu, 14 Mar 2019 08:40:40 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga105.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Mar 2019 05:40:38 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.58,478,1544515200"; d="scan'208";a="134023264" Received: from lxy-dell.sh.intel.com ([10.239.159.145]) by orsmga003.jf.intel.com with ESMTP; 14 Mar 2019 05:40:36 -0700 Message-ID: Subject: Re: [PATCH] kvm/x86/vmx: switch MSR_MISC_FEATURES_ENABLES between host and guest From: Xiaoyao Li To: Paolo Bonzini Cc: Kyle Huey , Chao Gao , Radim =?UTF-8?Q?Kr=C4=8Dm=C3=A1=C5=99?= , Thomas Gleixner , Ingo Molnar , Borislav Petkov , "H. Peter Anvin" , x86@kernel.org, kvm@vger.kernel.org, linux-kernel@vger.kernel.org Date: Thu, 14 Mar 2019 20:37:13 +0800 In-Reply-To: References: <20190314063858.18292-1-xiaoyao.li@linux.intel.com> Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.28.5 (3.28.5-2.el7) Mime-Version: 1.0 Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 2019-03-14 at 12:28 +0100, Paolo Bonzini wrote: > On 14/03/19 07:38, Xiaoyao Li wrote: > > CPUID Faulting is a feature about CPUID instruction. When CPUID Faulting is > > enabled, all execution of the CPUID instruction outside system-management > > mode (SMM) cause a general-protection (#GP) if the CPL > 0. > > > > About this feature, detailed information can be found at > > https://www.intel.com/content/dam/www/public/us/en/documents/application-notes/virtualization-technology-flexmigration-application-note.pdf > > > > There is an issue that current kvm doesn't switch the value of > > MSR_MISC_FEATURES_ENABLES between host and guest. If > > MSR_MISC_FEATURES_ENABLES > > exists on the hardware cpu, and host enables CPUID faulting (setting the bit > > 0 > > of MSR_MISC_FEATURES_ENABLES), it will impact the guest's behavior because > > cpuid faulting is enabled by host and passed to guest. > > > > From my tests, when host enables cpuid faulting, it causes guest boot > > failure > > when guest uses *modprobe* to load modules. Below is the error log: > > > > [ 1.233556] traps: modprobe[71] general protection fault ip:7f0077f6495c > > sp:7ffda148d808 error:0 in ld-2.17.so[7f0077f4d000+22000] > > [ 1.237780] traps: modprobe[73] general protection fault ip:7fad5aba095c > > sp:7ffd36067378 error:0 in ld-2.17.so[7fad5ab89000+22000] > > [ 1.241930] traps: modprobe[75] general protection fault ip:7f3edb89495c > > sp:7fffa1a81308 error:0 in ld-2.17.so[7f3edb87d000+22000] > > [ 1.245998] traps: modprobe[77] general protection fault ip:7f91d670895c > > sp:7ffc25fa7f38 error:0 in ld-2.17.so[7f91d66f1000+22000] > > [ 1.250016] traps: modprobe[79] general protection fault ip:7f0ddbbdc95c > > sp:7ffe9c34f8d8 error:0 in ld-2.17.so[7f0ddbbc5000+22000] > > > > *modprobe* calls CPUID instruction thus causing cpuid faulting in guest. > > At the end, because guest cannot *modprobe* modules, it boots failure. > > > > This patch switches MSR_MISC_FEATURES_ENABLES between host and guest when > > hardware has this MSR. > > > > This patch doesn't confict with the commit db2336a80489 ("KVM: x86: > > virtualize > > cpuid faulting"), which provides a software emulation of cpuid faulting for > > x86 arch. Below analysing how cpuid faulting will work after applying this > > patch: > > > > 1. If host cpu is AMD. It doesn't have MSR_MISC_FEATURES_ENABLES, so we can > > just > > use the software emulation of cpuid faulting. > > > > 2. If host cpu is Intel and it doesn't have MSR_MISC_FEATURES_ENABLES. The > > same > > as case 1, we can just use the software emulation of cpuid faulting. > > > > 3. If host cpu is Intel and it has MSR_MISC_FEATURES_ENABLES. With this > > patch, > > it will write guest's value into MSR_MISC_FEATURES_ENABLES when vm entry. > > If guest enables cpuid faulting and when guest calls CPUID instruction with > > CPL > 0, it will cause #GP exception in guest instead of VM exit because of > > CPUID, thus it doesn't go to the kvm emualtion path but ues the hardware > > feature. Also it's a benefit that we needn't use VM exit to inject #GP to > > emulate cpuid faulting feature. > > > > Intel SDM vol3.25.1.1 specifies the priority between cpuid faulting > > and CPUID instruction. > > > > Signed-off-by: Xiaoyao Li > > --- > > arch/x86/kvm/vmx/vmx.c | 19 +++++++++++++++++++ > > 1 file changed, 19 insertions(+) > > > > diff --git a/arch/x86/kvm/vmx/vmx.c b/arch/x86/kvm/vmx/vmx.c > > index 30a6bcd735ec..90707fae688e 100644 > > --- a/arch/x86/kvm/vmx/vmx.c > > +++ b/arch/x86/kvm/vmx/vmx.c > > @@ -6321,6 +6321,23 @@ static void atomic_switch_perf_msrs(struct vcpu_vmx > > *vmx) > > msrs[i].host, false); > > } > > > > +static void atomic_switch_msr_misc_features_enables(struct kvm_vcpu *vcpu) > > +{ > > + u64 host_msr; > > + struct vcpu_vmx *vmx = to_vmx(vcpu); > > + > > + /* if MSR MISC_FEATURES_ENABLES doesn't exist on the hardware, do > > nothing*/ > > + if (rdmsrl_safe(MSR_MISC_FEATURES_ENABLES, &host_msr)) > > + return; > > + > > + if (host_msr == vcpu->arch.msr_misc_features_enables) > > + clear_atomic_switch_msr(vmx, MSR_MISC_FEATURES_ENABLES); > > + else > > + add_atomic_switch_msr(vmx, MSR_MISC_FEATURES_ENABLES, > > + vcpu->arch.msr_misc_features_enables, > > + host_msr, false); > > +} > > + > > static void vmx_arm_hv_timer(struct vcpu_vmx *vmx, u32 val) > > { > > vmcs_write32(VMX_PREEMPTION_TIMER_VALUE, val); > > @@ -6562,6 +6579,8 @@ static void vmx_vcpu_run(struct kvm_vcpu *vcpu) > > > > atomic_switch_perf_msrs(vmx); > > > > + atomic_switch_msr_misc_features_enables(vcpu); > > + > > vmx_update_hv_timer(vcpu); > > > > /* > > > > Adding a RDMSR for this to each vmentry is too heavy. Since we emulate > MSR_MISC_FEATURES_ENABLES, you can just clear the MSR on vcpu_load and > restore it on vcpu_put. One question here. Just clear the MSR on vcpu_load instead of writing the emulated value to MSR? I think writing the emulated value to MSR is better. As I mentioned in case 3, if hardware has cpuid faulting feature. Using hardware capability is more efficient than emulation that the emulation solution needs VM exit to inject #GP. > Also, this needs a test in tools/testing/selftests/kvm. > > Paolo