migration: bugfix, multifd send pages next channel and Make sure that we do not call write in case Signed-off-by: imxcc <xingchaochao@huawei.com>
103 lines
4.5 KiB
Diff
103 lines
4.5 KiB
Diff
From 472ccc3e48cab962ec9acf3f31e4467544b51705 Mon Sep 17 00:00:00 2001
|
|
From: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
Date: Tue, 31 Mar 2020 18:27:52 +0200
|
|
Subject: [PATCH] target/i386: do not set unsupported VMX secondary execution
|
|
controls
|
|
|
|
Commit 048c95163b4 ("target/i386: work around KVM_GET_MSRS bug for
|
|
secondary execution controls") added a workaround for KVM pre-dating
|
|
commit 6defc591846d ("KVM: nVMX: include conditional controls in /dev/kvm
|
|
KVM_GET_MSRS") which wasn't setting certain available controls. The
|
|
workaround uses generic CPUID feature bits to set missing VMX controls.
|
|
|
|
It was found that in some cases it is possible to observe hosts which
|
|
have certain CPUID features but lack the corresponding VMX control.
|
|
|
|
In particular, it was reported that Azure VMs have RDSEED but lack
|
|
VMX_SECONDARY_EXEC_RDSEED_EXITING; attempts to enable this feature
|
|
bit result in QEMU abort.
|
|
|
|
Resolve the issue but not applying the workaround when we don't have
|
|
to. As there is no good way to find out if KVM has the fix itself, use
|
|
95c5c7c77c ("KVM: nVMX: list VMX MSRs in KVM_GET_MSR_INDEX_LIST") instead
|
|
as these [are supposed to] come together.
|
|
|
|
Fixes: 048c95163b4 ("target/i386: work around KVM_GET_MSRS bug for secondary execution controls")
|
|
Suggested-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
Signed-off-by: Vitaly Kuznetsov <vkuznets@redhat.com>
|
|
Message-Id: <20200331162752.1209928-1-vkuznets@redhat.com>
|
|
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
|
|
---
|
|
target/i386/kvm.c | 41 ++++++++++++++++++++++++++---------------
|
|
1 file changed, 26 insertions(+), 15 deletions(-)
|
|
|
|
diff --git a/target/i386/kvm.c b/target/i386/kvm.c
|
|
index 5ee0c50d7c..7328746d92 100644
|
|
--- a/target/i386/kvm.c
|
|
+++ b/target/i386/kvm.c
|
|
@@ -97,6 +97,7 @@ static bool has_msr_smi_count;
|
|
static bool has_msr_arch_capabs;
|
|
static bool has_msr_core_capabs;
|
|
static bool has_msr_vmx_vmfunc;
|
|
+static bool has_msr_vmx_procbased_ctls2;
|
|
|
|
static uint32_t has_architectural_pmu_version;
|
|
static uint32_t num_architectural_pmu_gp_counters;
|
|
@@ -474,21 +475,28 @@ uint64_t kvm_arch_get_supported_msr_feature(KVMState *s, uint32_t index)
|
|
value = msr_data.entries[0].data;
|
|
switch (index) {
|
|
case MSR_IA32_VMX_PROCBASED_CTLS2:
|
|
- /* KVM forgot to add these bits for some time, do this ourselves. */
|
|
- if (kvm_arch_get_supported_cpuid(s, 0xD, 1, R_ECX) & CPUID_XSAVE_XSAVES) {
|
|
- value |= (uint64_t)VMX_SECONDARY_EXEC_XSAVES << 32;
|
|
- }
|
|
- if (kvm_arch_get_supported_cpuid(s, 1, 0, R_ECX) & CPUID_EXT_RDRAND) {
|
|
- value |= (uint64_t)VMX_SECONDARY_EXEC_RDRAND_EXITING << 32;
|
|
- }
|
|
- if (kvm_arch_get_supported_cpuid(s, 7, 0, R_EBX) & CPUID_7_0_EBX_INVPCID) {
|
|
- value |= (uint64_t)VMX_SECONDARY_EXEC_ENABLE_INVPCID << 32;
|
|
- }
|
|
- if (kvm_arch_get_supported_cpuid(s, 7, 0, R_EBX) & CPUID_7_0_EBX_RDSEED) {
|
|
- value |= (uint64_t)VMX_SECONDARY_EXEC_RDSEED_EXITING << 32;
|
|
- }
|
|
- if (kvm_arch_get_supported_cpuid(s, 0x80000001, 0, R_EDX) & CPUID_EXT2_RDTSCP) {
|
|
- value |= (uint64_t)VMX_SECONDARY_EXEC_RDTSCP << 32;
|
|
+ if (!has_msr_vmx_procbased_ctls2) {
|
|
+ /* KVM forgot to add these bits for some time, do this ourselves. */
|
|
+ if (kvm_arch_get_supported_cpuid(s, 0xD, 1, R_ECX) &
|
|
+ CPUID_XSAVE_XSAVES) {
|
|
+ value |= (uint64_t)VMX_SECONDARY_EXEC_XSAVES << 32;
|
|
+ }
|
|
+ if (kvm_arch_get_supported_cpuid(s, 1, 0, R_ECX) &
|
|
+ CPUID_EXT_RDRAND) {
|
|
+ value |= (uint64_t)VMX_SECONDARY_EXEC_RDRAND_EXITING << 32;
|
|
+ }
|
|
+ if (kvm_arch_get_supported_cpuid(s, 7, 0, R_EBX) &
|
|
+ CPUID_7_0_EBX_INVPCID) {
|
|
+ value |= (uint64_t)VMX_SECONDARY_EXEC_ENABLE_INVPCID << 32;
|
|
+ }
|
|
+ if (kvm_arch_get_supported_cpuid(s, 7, 0, R_EBX) &
|
|
+ CPUID_7_0_EBX_RDSEED) {
|
|
+ value |= (uint64_t)VMX_SECONDARY_EXEC_RDSEED_EXITING << 32;
|
|
+ }
|
|
+ if (kvm_arch_get_supported_cpuid(s, 0x80000001, 0, R_EDX) &
|
|
+ CPUID_EXT2_RDTSCP) {
|
|
+ value |= (uint64_t)VMX_SECONDARY_EXEC_RDTSCP << 32;
|
|
+ }
|
|
}
|
|
/* fall through */
|
|
case MSR_IA32_VMX_TRUE_PINBASED_CTLS:
|
|
@@ -1973,6 +1981,9 @@ static int kvm_get_supported_msrs(KVMState *s)
|
|
case MSR_IA32_VMX_VMFUNC:
|
|
has_msr_vmx_vmfunc = true;
|
|
break;
|
|
+ case MSR_IA32_VMX_PROCBASED_CTLS2:
|
|
+ has_msr_vmx_procbased_ctls2 = true;
|
|
+ break;
|
|
}
|
|
}
|
|
}
|
|
--
|
|
2.27.0
|
|
|