On Fri, Sep 27, 2019 at 06:32:27PM +0200, Paolo Bonzini wrote: > On 27/09/19 18:10, Jim Mattson wrote: > > On Fri, Sep 27, 2019 at 9:06 AM Paolo Bonzini <pbonzini@xxxxxxxxxx> wrote: > >> > >> On 27/09/19 17:58, Xiaoyao Li wrote: > >>> Indeed, "KVM_GET_MSR_INDEX_LIST" returns the guest msrs that KVM supports and > >>> they are free from different guest configuration since they're initialized when > >>> kvm module is loaded. > >>> > >>> Even though some MSRs are not exposed to guest by clear their related cpuid > >>> bits, they are still saved/restored by QEMU in the same fashion. > >>> > >>> I wonder should we change "KVM_GET_MSR_INDEX_LIST" per VM? > >> > >> We can add a per-VM version too, yes. > > There is one problem with that: KVM_SET_CPUID2 is a vCPU ioctl, not a VM > ioctl. > > > Should the system-wide version continue to list *some* supported MSRs > > and *some* unsupported MSRs, with no rhyme or reason? Or should we > > codify what that list contains? > > The optimal thing would be for it to list only MSRs that are > unconditionally supported by all VMs and are part of the runtime state. > MSRs that are not part of the runtime state, such as the VMX > capabilities, should be returned by KVM_GET_MSR_FEATURE_INDEX_LIST. > > This also means that my own commit 95c5c7c77c06 ("KVM: nVMX: list VMX > MSRs in KVM_GET_MSR_INDEX_LIST", 2019-07-02) was incorrect. > Unfortunately, that commit was done because userspace (QEMU) has a > genuine need to detect whether KVM is new enough to support the > IA32_VMX_VMFUNC MSR. > > Perhaps we can make all MSRs supported unconditionally if > host_initiated. For unsupported performance counters it's easy to make > them return 0, and allow setting them to 0, if host_initiated I don't think we need to go that far. Allowing any ol' MSR access seems like it would cause more problems than it would solve, e.g. userspace could completely botch something and never know. For the perf MSRs, could we enumerate all arch perf MSRs that are supported by hardware? That would also be the list of MSRs that host_initiated MSR accesses can touch regardless of guest support. Something like: case MSR_ARCH_PERFMON_PERFCTR0 ... MSR_ARCH_PERFMON_PERFCTR0+INTEL_PMC_MAX_GENERIC: case MSR_ARCH_PERFMON_EVENTSEL0 ... MSR_ARCH_PERFMON_EVENTSEL0+INTEL_PMC_MAX_GENERIC: if (kvm_pmu_is_valid_msr(vcpu, msr)) return kvm_pmu_set_msr(vcpu, msr_info); else if (msr <= num_hw_counters) break; return 1; > (BTW, how did you pick 32? is there any risk of conflicts with other MSRs?). Presumably because INTEL_PMC_MAX_GENERIC is 32. > I'm not sure of the best set of values to allow for VMX caps, especially > with the default0/default1 stuff going on for execution controls. But > perhaps that would be the simplest thing to do. > > One possibility would be to make a KVM_GET_MSR_INDEX_LIST variant that > is a system ioctl and takes a CPUID vector. I'm worried that it would > be tedious to get right and hardish to keep correct---so I'm not sure > it's a good idea. > > Paolo