Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp4475869ybl; Tue, 21 Jan 2020 21:50:08 -0800 (PST) X-Google-Smtp-Source: APXvYqxr9dl0UOnnKhzXts8LLVpGWLwTlqJxHoWME9nBgFb2zuXLdZZjrKPtKGBBuZCHbEujpOEX X-Received: by 2002:a9d:6513:: with SMTP id i19mr6503496otl.103.1579672208577; Tue, 21 Jan 2020 21:50:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1579672208; cv=none; d=google.com; s=arc-20160816; b=aHMR8IAIjYasbmuCRkjS2zdc//EBQXdNS+DRcGWTmYs08BM30rlCMtDMJ/iDtuZ99K +YSq78zpb9kJbC3u8FwtWq8T8J2uESSEfVDy+a094iS29FIPZ+/wo43cschX++w2nzq8 VFhBHu3jJ7nMnd8mu/RdiQHNEwrtgMUuVgyyFPhPqwcTH4f4awh7sPG25LPXmbdL+QjJ VjOemtc4F4C0XO4MB5IHWwXEqOesSgpEbmG8/qEH1esSL75x/vRNovzhUOyLc6/N9if/ MbHEteBx2CPvFtr8Vk2aT+yfS1geLHtjLYljsiBAvmeYQOI6yyNF/otoxfyhnkE4kxSQ c0Gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=Nod/HI2zHxysuLnLJ0PcXia/vRebWnDXDHgcWN/Gk78=; b=pkMRrP8eLSREfY9oDeXy7jPYasOOpxDSQ0R33aHxmTZ+B4i3/cvGhiYdTe9cs9NabU O8vJ/C65Rh9sIvQDIPkneHfROHCtZSE9MsBfPNzFP+dRqO3zZdPmM6xPYS0TYxmnnIXZ BsuTiNhRxNE2D9iEbxCn9R2n54AoN4tsSopHasCx5MIRdMeFHjPJHv0P8QG7CI9K3A+s VT9ZLrCKjrnwtthrbQFyKyqRxbLQZecWJCQbcZKzbAjLjDAUaxcURbp39Ev/kJUZA7c3 XCzt3CP/AF+WXYK7039ndDG40t7eHTmPOK3BxjQL50FEQjCoGaB8zL6+shMiRFI/yOFR 4IfA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id i12si23805609otl.74.2020.01.21.21.49.56; Tue, 21 Jan 2020 21:50:08 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=intel.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726054AbgAVFrZ (ORCPT + 99 others); Wed, 22 Jan 2020 00:47:25 -0500 Received: from mga02.intel.com ([134.134.136.20]:27602 "EHLO mga02.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725796AbgAVFrZ (ORCPT ); Wed, 22 Jan 2020 00:47:25 -0500 X-Amp-Result: UNKNOWN X-Amp-Original-Verdict: FILE UNKNOWN X-Amp-File-Uploaded: False Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by orsmga101.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 21 Jan 2020 21:47:24 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,348,1574150400"; d="scan'208";a="221136424" Received: from sjchrist-coffee.jf.intel.com (HELO linux.intel.com) ([10.54.74.202]) by fmsmga007.fm.intel.com with ESMTP; 21 Jan 2020 21:47:24 -0800 Date: Tue, 21 Jan 2020 21:47:24 -0800 From: Sean Christopherson To: Paolo Bonzini Cc: Vitaly Kuznetsov , kvm@vger.kernel.org, Jim Mattson , linux-kernel@vger.kernel.org, Liran Alon , Roman Kagan Subject: Re: [PATCH RFC 2/3] x86/kvm/hyper-v: move VMX controls sanitization out of nested_enable_evmcs() Message-ID: <20200122054724.GD18513@linux.intel.com> References: <20200115171014.56405-1-vkuznets@redhat.com> <20200115171014.56405-3-vkuznets@redhat.com> <6c4bdb57-08fb-2c2d-9234-b7efffeb72ed@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <6c4bdb57-08fb-2c2d-9234-b7efffeb72ed@redhat.com> User-Agent: Mutt/1.5.24 (2015-08-30) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Jan 19, 2020 at 09:54:44AM +0100, Paolo Bonzini wrote: > On 15/01/20 18:10, Vitaly Kuznetsov wrote: > > With fine grained VMX feature enablement QEMU>=4.2 tries to do KVM_SET_MSRS > > with default (matching CPU model) values and in case eVMCS is also enabled, > > fails. > > > > It would be possible to drop VMX feature filtering completely and make > > this a guest's responsibility: if it decides to use eVMCS it should know > > which fields are available and which are not. Hyper-V mostly complies to > > this, however, there is at least one problematic control: > > SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES > > which Hyper-V enables. As there is no 'apic_addr_field' in eVMCS, we > > fail to handle this properly in KVM. It is unclear how this is supposed > > to work, genuine Hyper-V doesn't expose the control so it is possible that > > this is just a bug (in Hyper-V). > > Yes, it most likely is and it would be nice if Microsoft fixed it, but I > guess we're stuck with it for existing Windows versions. Well, for one > we found a bug in Hyper-V and not the converse. :) > > There is a problem with this approach, in that we're stuck with it > forever due to live migration. But I guess if in the future eVMCS v2 > adds an apic_address field we can limit the hack to eVMCS v1. Another > possibility is to use the quirks mechanism but it's overkill for now. > > Unless there are objections, I plan to apply these patches. Doesn't applying this patch contradict your earlier opinion? This patch would still hide the affected controls from the guest because the host controls enlightened_vmcs_enabled. On Sat, Jan 18, 2020 at 10:42:31PM +0100, Paolo Bonzini wrote: > IMHO the features should stay available in case the guest chooses not to > use eVMCS. A guest that uses eVMCS should know which features it cannot > use and not enable them. Makes sense, wasn't thinking about the scenario where the guest doesn't support eVMCS or doesn't want to use it for whatever reason. Rather than update vmx->nested.msrs or filter vmx_get_msr(), what about manually adding eVMCS consistency checks on the disallowed bits and handle SECONDARY_EXEC_VIRTUALIZE_APIC_ACCESSES as a one-off case by simply clearing it from the eVMCS? Or alternatively, squashing all the disallowed bits.