Received: by 2002:a05:6902:102b:0:0:0:0 with SMTP id x11csp752292ybt; Fri, 26 Jun 2020 10:39:30 -0700 (PDT) X-Google-Smtp-Source: ABdhPJw8G6dlisJbE478pYTrRr8Y9YVjrHDwi+tsEeBToGCW89Wa5cf1FOvtResUlsWzpRRR/ZbD X-Received: by 2002:a50:fe94:: with SMTP id d20mr4363830edt.254.1593193170761; Fri, 26 Jun 2020 10:39:30 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1593193170; cv=none; d=google.com; s=arc-20160816; b=SRarqcj2fYANNVOKo/6QyTOp6F5Kh+93zVP4WKlrFH6c79b1F3ZjLiEoF2V/r+Wu3S X0FYIc2dURA6lY9joXyYi/DgRRz0bs25mxgF3+b8lIm5erfYYtIsX/juVqeFAmO99S4o C8mg9QgZgAQqDQKnxLWlnSORO3ST7DX/14q4f1zzpqRZrht4YWBJwyLTM+VEpzg3FjC/ Xy4uESkaP/sACALX0weWXHWITEPTm8FvJvKkcmYkLuGAJhy9rYvVArqFs2+rvLqhKCRP FehkuqyD8aQ7OqJKGhNk25LX9klXVpFEa/rMVEyaYRXP1XIpWnKdZK76ZEpTB4/LX9n1 Un9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date :dkim-signature; bh=Fyws02fLz3vFP4WruqNyiJlcETyOe6KDZOHSeNYTwDU=; b=nfSeYhwQ/L7JCzva1J8moPU/okSRkd3MTBcsXySOq/+rftRFq+y3tk7FD6RM6dTQBX TpkT4NS4l27p352qCL+dGzSC2rc1FdbICFBepT6rlWLRPGP8YZR1lBRGOS1tA62/z75f Cq61ctkcHbXmB1HR+mMjJflTfeE8XlPNl0Q1CFWfH/N8LEmqNpI2BLgz6VbE975tj1SO J9U0NQ/KSnQFSm8/2hKdjSi6+2P4mSG/VgAko0mzjBkF53TUwMGxBTtukEvnnNq7ReCX W93VbA83tscqUukTs5Z433yiC+7iCOMG94Ql8/7IXwtZTEfBEi3uKskX6HaIkalExNNf kfzA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dRs0GVOv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id yd6si9185401ejb.326.2020.06.26.10.39.07; Fri, 26 Jun 2020 10:39:30 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dRs0GVOv; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726032AbgFZRh5 (ORCPT + 99 others); Fri, 26 Jun 2020 13:37:57 -0400 Received: from us-smtp-1.mimecast.com ([205.139.110.61]:32102 "EHLO us-smtp-delivery-1.mimecast.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S1725890AbgFZRh4 (ORCPT ); Fri, 26 Jun 2020 13:37:56 -0400 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1593193075; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=Fyws02fLz3vFP4WruqNyiJlcETyOe6KDZOHSeNYTwDU=; b=dRs0GVOvM+xtVkiee/4vqA9Vwp4+q8K7HGFE7OZqHxvMekHOWKNCtNO2YaaJ84cx1hkrRW 2BHSGEwwblmopClcoLNpmZxMoBzKcvSBTotSC27IXdRv/iNL8r2b2EAgzSTocNSgozds5M xPuiTQ4W1BMVvPnZSKqBnkVAd+Zgo4c= Received: from mail-qv1-f69.google.com (mail-qv1-f69.google.com [209.85.219.69]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-158-PjnSO8k2MxCAmZdBA2AShw-1; Fri, 26 Jun 2020 13:37:53 -0400 X-MC-Unique: PjnSO8k2MxCAmZdBA2AShw-1 Received: by mail-qv1-f69.google.com with SMTP id da10so6911791qvb.2 for ; Fri, 26 Jun 2020 10:37:53 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=Fyws02fLz3vFP4WruqNyiJlcETyOe6KDZOHSeNYTwDU=; b=efBZ9mt5r1UhDAEN/5VbhEDjaUlm6lxBDc+tBt+rAhNjOZvmjg9UuPWaC7iU31i6TS aqXDUuBxWJeVF/JC4ClcWtvqahuAgNnfUMAo/JKjRVJ9ibhg1FvB508QMSTSIF/AlDdn FY/79itqlMSHiRxb1rMt82+T982cA3niq0JXLYHUECfk5QMb1iUlIHPiEI4ZtPqpC7Ty GDsLakhe6/N7dUCOdFPY89l29FNKobYAhxc9ejGW3UcrkvQSWFpsGf4U6DC+yQWGa2Ss eCxOFRDWz/BB/W5DQU7tdCuISIcVR6ljLp1RrUhizEDlLYpWYoFDChj67Sk9Q26BJerI lI7Q== X-Gm-Message-State: AOAM53017umGA/cWQjRkC6ilMdRj+if5ljnEocNdI0j2weOEQOfhhUN3 0RvBBdI3CCj2wPSBzSWttZo5eJjNZjGB3ZLD+STIi31mjOzAvStAmD6r8GtovjT3m2KXaqcCeZd 2xv5LMeV4eO3tQyZaal3nJNfT X-Received: by 2002:ac8:3528:: with SMTP id y37mr3932645qtb.308.1593193073395; Fri, 26 Jun 2020 10:37:53 -0700 (PDT) X-Received: by 2002:ac8:3528:: with SMTP id y37mr3932632qtb.308.1593193073163; Fri, 26 Jun 2020 10:37:53 -0700 (PDT) Received: from xz-x1 ([2607:9880:19c0:32::2]) by smtp.gmail.com with ESMTPSA id b22sm7937935qka.43.2020.06.26.10.37.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 26 Jun 2020 10:37:52 -0700 (PDT) Date: Fri, 26 Jun 2020 13:37:50 -0400 From: Peter Xu To: Sean Christopherson Cc: Paolo Bonzini , linux-kernel@vger.kernel.org, kvm@vger.kernel.org, Vitaly Kuznetsov Subject: Re: [PATCH 1/2] KVM: X86: Move ignore_msrs handling upper the stack Message-ID: <20200626173750.GA175520@xz-x1> References: <20200622220442.21998-1-peterx@redhat.com> <20200622220442.21998-2-peterx@redhat.com> <20200625061544.GC2141@linux.intel.com> <1cebc562-89e9-3806-bb3c-771946fc64f3@redhat.com> <20200625162540.GC3437@linux.intel.com> <20200626155657.GC6583@linux.intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: <20200626155657.GC6583@linux.intel.com> Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Jun 26, 2020 at 08:56:57AM -0700, Sean Christopherson wrote: > Not really? It's solving a problem that doesn't exist in the current code > base (assuming TSC_CTRL is fixed), and IMO solving it in an ugly fashion. > > I would much prefer that, _if_ we want to support blind KVM-internal MSR > accesses, we end up with code like: > > if (msr_info->kvm_internal) { > return 1; > } else if (!ignore_msrs) { > vcpu_debug_ratelimited(vcpu, "unhandled wrmsr: 0x%x data 0x%llx\n", > msr, data); > return 1; > } else { > if (report_ignored_msrs) > vcpu_unimpl(vcpu, > "ignored wrmsr: 0x%x data 0x%llx\n", > msr, data); > break; > } > > But I'm still not convinced that there is a legimiate scenario for setting > kvm_internal=true. Actually this really looks like my initial version when I was discussing this with Paolo before this version, but Paolo suggested what I implemented last. I think I agree with Paolo that it's an improvement to have a way to get/set real msr value so that we don't need to further think about effects being taken with the two tricky msr knobs (report_ignored_msrs, ignore_msrs). These knobs are even trickier to me when they're hidden deep, because they are not easily expected when seeing the name of the functions (e.g. __kvm_set_msr, rather than __kvm_set_msr_retval_fixed). Thanks, -- Peter Xu