Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp2668320ybl; Mon, 20 Jan 2020 07:13:40 -0800 (PST) X-Google-Smtp-Source: APXvYqz7qP0yYVeUJIUU0OLzQnD50yS4LPd1rX2M+hK7LtBfo3xp3/zAykSiI1KXh2wGTkvEt1tX X-Received: by 2002:aca:a849:: with SMTP id r70mr13405179oie.28.1579533220049; Mon, 20 Jan 2020 07:13:40 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579533220; cv=none; d=google.com; s=arc-20160816; b=ENDreFILOVFre05J7fHbsO1DnyIE8Zrxt+Ij7oB78pu+4nzFvly9gAZDdCXWC7y4KU r/D2S0GggkimHzMCxGQ2VX0BsV3dBeysgzSezKmM0j1Pem/niyfkQLkrtBwrxgrhLBZT 0vhm1rJ3/HRzpdSvTph7Pm3a8zn28/mDDEkj+fJ7hXAtGFE78XcnAPTpSl7RVLW6zcrY uDUn1BwYWt7w9wx3EoGu5SlJv+xhlb+w0wFgxrqbsp8evwemRrFZo6LjFpOqt9wjJHkI IhHlZbZFqh63IDQJL7f48xKSJntQxZ/r6QzY3zlIOXMR1n1CV/ZEvuA+Ur/2QNhJFIZJ uX7g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=Jl75FyV2eKAuNVkPFCRLduCG2Tj/ztsoq3xLT8s1OKA=; b=0CZoZ3YyJcsNlNH4lU3eXT06XRVjfm0O7JSVeKnDZZyZ+iHLyz6+vyrW9QFqPKJJti xoYOnvdBG+Hty2z9xp/L7eMYNhbenLTT3E+P0x9V0HrFHKPx4PJCkTdqz2qltkB0fAaK YK4hQ4vIaRevB3frGPqiJvmB54HWnQoWWKltUzRNWC08DNlcn2pqVqzUDrYqFmbS4NLO DRBjuF+kixinA/5Rkf0bIxC1+mvg6HlOt/ojqQbRzqZik/Y+qe8pBSTvmvsbHxd667AP 18Hebbi2mYecsfBPklzBIqlJtUuGOdDGxW69cMM4B2/znsa9WtajjZNwNTZnymbzFEQ1 laLA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="adTr7fq/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id w19si13455613oih.201.2020.01.20.07.13.10; Mon, 20 Jan 2020 07:13:40 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b="adTr7fq/"; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729219AbgATPLv (ORCPT + 99 others); Mon, 20 Jan 2020 10:11:51 -0500 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:20339 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1729159AbgATPLr (ORCPT ); Mon, 20 Jan 2020 10:11:47 -0500 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1579533106; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=Jl75FyV2eKAuNVkPFCRLduCG2Tj/ztsoq3xLT8s1OKA=; b=adTr7fq/ZB9Dz3LrmAl+bzWj6GOKvI/uIGvBMLr2ZoSmaFW6nALcQDZrqa8vNR6PU2qG12 ssv6rf7PiUIPW4M6c+AuYV/VVqh778VTkpYpdm02HPoyK9x2E8c2+DQfiQL7WEajesIxFs JqWKDkbXToT83UFJ/JaexBsIJGQq5NA= Received: from mail-wr1-f69.google.com (mail-wr1-f69.google.com [209.85.221.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-202-dzzo49kQOry5Um8UtxP5Sg-1; Mon, 20 Jan 2020 10:11:45 -0500 X-MC-Unique: dzzo49kQOry5Um8UtxP5Sg-1 Received: by mail-wr1-f69.google.com with SMTP id y7so14298386wrm.3 for ; Mon, 20 Jan 2020 07:11:44 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=Jl75FyV2eKAuNVkPFCRLduCG2Tj/ztsoq3xLT8s1OKA=; b=hQCpQhFkGT6i7e8c7oyJ8YJm0oysKMWrtMCoQeGOXJ7PbxNTKat0Znixv0oZv6UsQ3 S0P3Oz0iU9ftPuiVAawsNAQNMcnFSyceC1/2Vdrfj/IZKmsYeDn/GZr8jeCt3YcraUah HSUqLvn9JvIcqs9nRnabfzOEZbnAENq8cHDJ7IR1TSzN7hMLl2wwJf0caLLFZCBOkegk N4Z9WBY78LhixCh2efy9w5cJrEqwSkdEq9LVu/XPAfoo3LCqlU2Yyd9AlmaX1W1Nw9oo t/MWa5VcKnXv12Ho1fk61KWSZ6phwqsHiVF67fUhf2I0dio7Sx7NzKXhoI4ge1TOO7PA rc0Q== X-Gm-Message-State: APjAAAU+VptJs3RnLcA1+pBn4ybyhul6BCtkxCOBvYXdMA52hkhUT475 RLCVlOU6ClJ5FwymbhuexTU65qEOYJk7/sQkfXdc/aKWB5FoisAnfRdSa7OaiJa0wVKaTFsVss+ u3EKvnH9BOibZPaeiMnXlmDPe X-Received: by 2002:a5d:6144:: with SMTP id y4mr18472332wrt.15.1579533103594; Mon, 20 Jan 2020 07:11:43 -0800 (PST) X-Received: by 2002:a5d:6144:: with SMTP id y4mr18472310wrt.15.1579533103369; Mon, 20 Jan 2020 07:11:43 -0800 (PST) Received: from vitty.brq.redhat.com (nat-pool-brq-t.redhat.com. [213.175.37.10]) by smtp.gmail.com with ESMTPSA id y20sm833707wmi.25.2020.01.20.07.11.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 20 Jan 2020 07:11:42 -0800 (PST) From: Vitaly Kuznetsov To: Paolo Bonzini , Jim Mattson Cc: Sean Christopherson , kvm@vger.kernel.org, linux-kernel@vger.kernel.org, Liran Alon Subject: [RFC] Revert "kvm: nVMX: Restrict VMX capability MSR changes" Date: Mon, 20 Jan 2020 16:11:41 +0100 Message-Id: <20200120151141.227254-1-vkuznets@redhat.com> X-Mailer: git-send-email 2.24.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This reverts commit a943ac50d10aac96dca63d0460365a699d41fdd0. Fine-grained VMX feature enablement in QEMU broke live migration with nested guest: (qemu) qemu-kvm: error: failed to set MSR 0x48e to 0xfff9fffe04006172 The problem is that QEMU does KVM_SET_NESTED_STATE before KVM_SET_MSRS, although it can probably be changed. RFC. I think the check for vmx->nested.vmxon is legitimate for everything but restore so removing it (what I do with the revert) is likely a no-go. I'd like to gather opinions on the proper fix: should we somehow check that the vCPU is in 'restore' start (has never being run) and make KVM_SET_MSRS pass or should we actually mandate that KVM_SET_NESTED_STATE is run after KVM_SET_MSRS by userspace? Signed-off-by: Vitaly Kuznetsov --- arch/x86/kvm/vmx/nested.c | 7 ------- 1 file changed, 7 deletions(-) diff --git a/arch/x86/kvm/vmx/nested.c b/arch/x86/kvm/vmx/nested.c index 4aea7d304beb..bb8afe0c5e7f 100644 --- a/arch/x86/kvm/vmx/nested.c +++ b/arch/x86/kvm/vmx/nested.c @@ -1321,13 +1321,6 @@ int vmx_set_vmx_msr(struct kvm_vcpu *vcpu, u32 msr_index, u64 data) { struct vcpu_vmx *vmx = to_vmx(vcpu); - /* - * Don't allow changes to the VMX capability MSRs while the vCPU - * is in VMX operation. - */ - if (vmx->nested.vmxon) - return -EBUSY; - switch (msr_index) { case MSR_IA32_VMX_BASIC: return vmx_restore_vmx_basic(vmx, data); -- 2.24.1