From patchwork Mon Dec 21 18:58:44 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Peter Hornyack X-Patchwork-Id: 7897451 Return-Path: X-Original-To: patchwork-kvm@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork2.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork2.web.kernel.org (Postfix) with ESMTP id 4753EBEEE5 for ; Mon, 21 Dec 2015 18:59:14 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 9F774205D3 for ; Mon, 21 Dec 2015 18:59:11 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 71462205D1 for ; Mon, 21 Dec 2015 18:59:10 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751342AbbLUS7I (ORCPT ); Mon, 21 Dec 2015 13:59:08 -0500 Received: from mail-yk0-f169.google.com ([209.85.160.169]:35962 "EHLO mail-yk0-f169.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750870AbbLUS7F (ORCPT ); Mon, 21 Dec 2015 13:59:05 -0500 Received: by mail-yk0-f169.google.com with SMTP id x184so140405895yka.3 for ; Mon, 21 Dec 2015 10:59:04 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20120113; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc:content-type; bh=cEzJkObpXBB6gaYeBbMIIlF94qbbmrJxgTyhZALCeLo=; b=bkmrJpe4PCXANZOF6t9HcG8dtlL56mQfYVmC5UAQFvPJkcOo+r0LZ2+4x8MXOxjbFs vkqPbhJRwe/wjI9rcwqP6oTU3688zOK6l7/ZhUGP6lrkvVM7JMPCx3JkhYHGJebiVx2B pWItpx+689ztF8cnpo3AulKUq0c8/eEUriOLzSQuJJ48U6Ny0MCJTLbFM72EK59SHkWf fRSyEVLYtndcnpha2aEH6HcdcITX2B17Ji/w7RYhoboWHxHNlysmrcH/Q483/0GaVdZV sCjn5lKct2PfigyJ22Zd7oaRiQuvznzoZ+M8PqbSIpBhQhM3lGiybsBdWpMy77U81vqM Dveg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc:content-type; bh=cEzJkObpXBB6gaYeBbMIIlF94qbbmrJxgTyhZALCeLo=; b=LjaP75tnTfZizEW4FeR8OKQ7sd0p0x+ixtsZ1ltVMbSsEUQChRcosLy4ktxgH8BlF+ kg/WAiPnC8od1Era9GVuvBnPsP5bucKTCbRFXVuGLOH58ORye0qrZkbqgU6H5pGSq3pX Kj4Vwd/w5BelUZz1unQXMeUBNwr9LtFPzB/QeueEqkZ58jUbv89pcR7t57Cn9Nz6bwD5 vbMosoaXZCD4aSDeSfIR9DZo6GkWaWNKcirYO4z0tJPcBbpTdgffB9OtMQ0gMiy98yAJ 3PEyX8wk3ueZsZDYUhBjDM1K57UwgshWMe4UcuQojDsSiHmKw94ZvMQtVKYzIxdm/ZQa 0IHQ== X-Gm-Message-State: ALoCoQmpAfM4niRvy1bIC3v2+qkM0LpzWRRs5QbAFme+i4N79mavfakUAiG1hhiwXVj0wM6nbolp1E+3zyUdOruAYQIStEiccNA24LDtV30zWZ0tyJN+1ds= X-Received: by 10.13.204.86 with SMTP id o83mr7365488ywd.297.1450724344274; Mon, 21 Dec 2015 10:59:04 -0800 (PST) MIME-Version: 1.0 Received: by 10.37.37.23 with HTTP; Mon, 21 Dec 2015 10:58:44 -0800 (PST) In-Reply-To: <567479DE.6010805@redhat.com> References: <1439923615-10600-1-git-send-email-peterhornyack@google.com> <1439923615-10600-3-git-send-email-peterhornyack@google.com> <567479DE.6010805@redhat.com> From: Peter Hornyack Date: Mon, 21 Dec 2015 10:58:44 -0800 Message-ID: Subject: Re: [RFC PATCH 2/5] KVM: add KVM_EXIT_MSR exit reason and capability. To: Paolo Bonzini Cc: kvm list , Gleb Natapov , Joerg Roedel , Andrey Smetanin , Roman Kagan , "Denis V. Lunev" , Pavel Fedin Sender: kvm-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org X-Spam-Status: No, score=-6.8 required=5.0 tests=BAYES_00, DKIM_ADSP_CUSTOM_MED, DKIM_SIGNED, RCVD_IN_DNSWL_HI, RP_MATCHES_RCVD, T_DKIM_INVALID, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP On Fri, Dec 18, 2015 at 1:25 PM, Paolo Bonzini wrote: > > > On 18/08/2015 20:46, Peter Hornyack wrote: >> Define KVM_EXIT_MSR, a new exit reason for accesses to MSRs that kvm >> does not handle. Define KVM_CAP_UNHANDLED_MSR_EXITS, a vm-wide >> capability that guards the new exit reason and which can be enabled via >> the KVM_ENABLE_CAP ioctl. >> >> Signed-off-by: Peter Hornyack >> --- >> Documentation/virtual/kvm/api.txt | 48 +++++++++++++++++++++++++++++++++++++++ >> include/uapi/linux/kvm.h | 14 ++++++++++++ >> 2 files changed, 62 insertions(+) > > Let's instead add: > > - KVM_CAP_MSR_EXITS > > - KVM_CAP_ENABLE_MSR_EXIT > > - KVM_CAP_DISABLE_MSR_EXIT > > and 3 kinds of exits: KVM_EXIT_MSR_READ, KVM_EXIT_MSR_WRITE, > KVM_EXIT_MSR_AFTER_WRITE. The first two use four fields (type, msr, > data, handled) and #GP if handled=0 is zero on the next entry. The last > one uses the first three fields and can be used for HyperV. > > Paolo Paolo, I've included an updated version of this patch below. Does this match the API that you had in mind? If so, I'll continue adjusting the rest of the code and will send the entire new patchset. This updated version of the API seems more cumbersome to me (three new capabilities, three exit reasons when just one or two might suffice) than the original interface I used, but maybe you have a good reason for that. Also, will it be ok to have just one capability to enable all three kinds of exits, or will KVM_EXIT_MSR_AFTER_WRITE want a separate capability? commit a684d520ed62cf0db4495e5197d5bf722e4f8109 Author: Peter Hornyack Date: Fri Dec 18 14:44:04 2015 -0800 KVM: add capabilities and exit reasons for MSRs. Define KVM_EXIT_MSR_READ, KVM_EXIT_MSR_WRITE, and KVM_EXIT_MSR_AFTER_WRITE, new exit reasons for accesses to MSRs that kvm does not handle or that user space needs to be notified about. Define the KVM_CAP_MSR_EXITS, KVM_CAP_ENABLE_MSR_EXITS, and KVM_CAP_DISABLE_MSR_EXITS capabilities to control these new exits for a VM. the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html diff --git a/Documentation/virtual/kvm/api.txt b/Documentation/virtual/kvm/api.txt index 053f613fc9a9..3bba3248df3d 100644 --- a/Documentation/virtual/kvm/api.txt +++ b/Documentation/virtual/kvm/api.txt @@ -3359,6 +3359,43 @@ Hyper-V SynIC state change. Notification is used to remap SynIC event/message pages and to enable/disable SynIC messages/events processing in userspace. + /* + * KVM_EXIT_MSR_READ, KVM_EXIT_MSR_WRITE, + * KVM_EXIT_MSR_AFTER_WRITE + */ + struct { + __u32 index; /* i.e. ecx; out */ + __u64 data; /* out (wrmsr) / in (rdmsr) */ +#define KVM_EXIT_MSR_COMPLETION_FAILED 1 + __u64 type; /* out */ +#define KVM_EXIT_MSR_UNHANDLED 0 +#define KVM_EXIT_MSR_HANDLED 1 + __u8 handled; /* in */ + } msr; + +If exit_reason is KVM_EXIT_MSR_READ or KVM_EXIT_MSR_WRITE, then the vcpu has +executed a rdmsr or wrmsr instruction which could not be satisfied by kvm. The +msr struct is used for both output to and input from user space. index is the +target MSR number held in ecx; user space must not modify this field. data +holds the payload from a wrmsr or must be filled in with a payload on a rdmsr. +For a normal exit, type will be 0. + +On the return path into kvm, user space should set handled to +KVM_EXIT_MSR_HANDLED if it successfully handled the MSR access. Otherwise, +handled should be set to KVM_EXIT_MSR_UNHANDLED, which will cause a general +protection fault to be injected into the vcpu. If an error occurs during the +return into kvm, the vcpu will not be run and another exit will be generated +with type set to KVM_EXIT_MSR_COMPLETION_FAILED. + +If exit_reason is KVM_EXIT_MSR_AFTER_WRITE, then the vcpu has executed a wrmsr +instruction which is handled by kvm but which user space may need to be +notified about. index and data are set as described above; the value of type +depends on the MSR that was written. handled is ignored on reentry into kvm. + +KVM_EXIT_MSR_READ, KVM_EXIT_MSR_WRITE, and KVM_EXIT_MSR_AFTER_WRITE can only +occur when KVM_CAP_MSR_EXITS is present and KVM_CAP_ENABLE_MSR_EXITS has been +set. A detailed description of these capabilities is below. + /* Fix the size of the union. */ char padding[256]; }; @@ -3697,6 +3734,26 @@ a KVM_EXIT_IOAPIC_EOI vmexit will be reported to userspace. Fails if VCPU has already been created, or if the irqchip is already in the kernel (i.e. KVM_CREATE_IRQCHIP has already been called). +7.6 KVM_CAP_ENABLE_MSR_EXITS, KVM_CAP_DISABLE_MSR_EXITS + +Architectures: x86 (vmx-only) +Parameters: none +Returns: 0 on success, -1 on error + +These capabilities enable and disable exits to user space for certain guest MSR +accesses. These capabilities are only available if KVM_CHECK_EXTENSION +indicates that KVM_CAP_MSR_EXITS is present. + +When enabled, kvm will exit to user space when the guest reads +an MSR that kvm does not handle (KVM_EXIT_MSR_READ), writes an MSR that kvm +does not handle (KVM_EXIT_MSR_WRITE), or writes an MSR that kvm handles but for +which user space should be notified (KVM_EXIT_MSR_AFTER_WRITE). + +These exits are currently only implemented for vmx. Also, note that if the kvm +module's ignore_msrs flag is set then KVM_EXIT_MSR_READ and KVM_EXIT_MSR_WRITE +will not be generated, and unhandled MSR accesses will simply be ignored and +the guest re-entered immediately. + 8. Other capabilities. ---------------------- @@ -3726,3 +3783,11 @@ In order to use SynIC, it has to be activated by setting this capability via KVM_ENABLE_CAP ioctl on the vcpu fd. Note that this will disable the use of APIC hardware virtualization even if supported by the CPU, as it's incompatible with SynIC auto-EOI behavior. + +8.3 KVM_CAP_MSR_EXITS + +Architectures: x86 (vmx-only) + +This capability, if KVM_CHECK_EXTENSION indicates that it is available, means +that the kernel implements the KVM_CAP_ENABLE_MSR_EXITS and +KVM_CAP_DISABLE_MSR_EXITS capabilities for VMs. diff --git a/include/uapi/linux/kvm.h b/include/uapi/linux/kvm.h index 6e32f7599081..431fd1ec0d06 100644 --- a/include/uapi/linux/kvm.h +++ b/include/uapi/linux/kvm.h @@ -199,6 +199,9 @@ struct kvm_hyperv_exit { #define KVM_EXIT_S390_STSI 25 #define KVM_EXIT_IOAPIC_EOI 26 #define KVM_EXIT_HYPERV 27 +#define KVM_EXIT_MSR_READ 28 +#define KVM_EXIT_MSR_WRITE 29 +#define KVM_EXIT_MSR_AFTER_WRITE 30 /* For KVM_EXIT_INTERNAL_ERROR */ /* Emulate instruction failed. */ @@ -355,6 +358,18 @@ struct kvm_run { } eoi; /* KVM_EXIT_HYPERV */ struct kvm_hyperv_exit hyperv; + /* + * KVM_EXIT_MSR_READ, KVM_EXIT_MSR_WRITE, + * KVM_EXIT_MSR_AFTER_WRITE + */ + struct { + __u32 index; /* i.e. ecx; out */ + __u64 data; /* out (wrmsr) / in (rdmsr) */ + __u64 type; /* out */ +#define KVM_EXIT_MSR_UNHANDLED 0 +#define KVM_EXIT_MSR_HANDLED 1 + __u8 handled; /* in */ + } msr; /* Fix the size of the union. */ char padding[256]; }; @@ -849,6 +864,9 @@ struct kvm_ppc_smmu_info { #define KVM_CAP_SPLIT_IRQCHIP 121 #define KVM_CAP_IOEVENTFD_ANY_LENGTH 122 #define KVM_CAP_HYPERV_SYNIC 123 +#define KVM_CAP_MSR_EXITS 124 +#define KVM_CAP_DISABLE_MSR_EXITS 125 +#define KVM_CAP_ENABLE_MSR_EXITS 126 #ifdef KVM_CAP_IRQ_ROUTING -- To unsubscribe from this list: send the line "unsubscribe kvm" in