This series makes it possible for userspace to manage MSRs by having KVM forward select MSRs to it when rdmsr and wrmsr are executed in the guest. Userspace can set this up by calling the ioctl KVM_SET_EXIT_MSRS with a list of MSRs it wants to manage. When KVM encounters any of these MSRs they are forwarded to userspace for processing. Userspace can then read from or write to the MSR, or it can also throw a #GP if needed. This series includes the kernel changes needed to implement this feature and a test that exercises this behavior. Also, included is an implementation of expection handling in selftests, which allows the test to excercise throwing a #GP. v1 -> v2: - Added support for generic instruction emulator bouncing to userspace when rdmsr or wrmsr are called, and userspace has asked to manage the MSR. These changes are committed in patch 3, and are based on changes made by Alexander Graf <graf@xxxxxxxxxx>. - Added tests to excercise the code paths for em_{rdmsr,wrmsr} and emulator_{get,set}_msr. These changes are committed in patch 8. v2 -> v3: - Added the series by Alexander Graf <graf@xxxxxxxxxx> to the beginning of This series (patches 1-3). The two have a lot of overlap, so it made sense to combine them to simplify merging them both upstream. Alex's changes account for the first 3 commits in this series. As a result of incorporating those changes, commit 05/12 required some refactoring. - Split exception handling in selftests into its own commit (patch 09/12). - Split the changes to ucall_get() into it's own commit based on Andrew Jones suggestion, and added support for aarch64 and s390x. Aaron Lewis (12): KVM: x86: Deflect unknown MSR accesses to user space KVM: x86: Introduce allow list for MSR emulation KVM: selftests: Add test for user space MSR handling KVM: x86: Add ioctl for accepting a userspace provided MSR list KVM: x86: Add support for exiting to userspace on rdmsr or wrmsr KVM: x86: Prepare MSR bitmaps for userspace tracked MSRs KVM: x86: Ensure the MSR bitmap never clears userspace tracked MSRs selftests: kvm: Fix the segment descriptor layout to match the actual layout selftests: kvm: Clear uc so UCALL_NONE is being properly reported selftests: kvm: Add exception handling to selftests selftests: kvm: Add a test to exercise the userspace MSR list selftests: kvm: Add emulated rdmsr, wrmsr tests Documentation/virt/kvm/api.rst | 181 +++++++- arch/x86/include/asm/kvm_host.h | 18 + arch/x86/include/uapi/asm/kvm.h | 15 + arch/x86/kvm/emulate.c | 18 +- arch/x86/kvm/svm/svm.c | 93 ++-- arch/x86/kvm/trace.h | 24 + arch/x86/kvm/vmx/nested.c | 2 +- arch/x86/kvm/vmx/vmx.c | 94 ++-- arch/x86/kvm/vmx/vmx.h | 2 +- arch/x86/kvm/x86.c | 379 +++++++++++++++- include/trace/events/kvm.h | 2 +- include/uapi/linux/kvm.h | 17 + tools/testing/selftests/kvm/.gitignore | 1 + tools/testing/selftests/kvm/Makefile | 21 +- .../selftests/kvm/include/x86_64/processor.h | 29 +- .../testing/selftests/kvm/lib/aarch64/ucall.c | 3 + tools/testing/selftests/kvm/lib/kvm_util.c | 17 + .../selftests/kvm/lib/kvm_util_internal.h | 2 + tools/testing/selftests/kvm/lib/s390x/ucall.c | 3 + .../selftests/kvm/lib/x86_64/handlers.S | 81 ++++ .../selftests/kvm/lib/x86_64/processor.c | 168 ++++++- .../testing/selftests/kvm/lib/x86_64/ucall.c | 3 + .../selftests/kvm/x86_64/user_msr_test.c | 221 +++++++++ .../selftests/kvm/x86_64/userspace_msr_exit.c | 421 ++++++++++++++++++ 24 files changed, 1719 insertions(+), 96 deletions(-) create mode 100644 tools/testing/selftests/kvm/lib/x86_64/handlers.S create mode 100644 tools/testing/selftests/kvm/x86_64/user_msr_test.c create mode 100644 tools/testing/selftests/kvm/x86_64/userspace_msr_exit.c -- 2.28.0.220.ged08abb693-goog