All of lore.kernel.org
 help / color / mirror / Atom feed
* [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
@ 2018-07-04 13:21 Jingqi Liu
  2018-07-04 13:39 ` Paolo Bonzini
  2018-07-04 19:43 ` Eduardo Habkost
  0 siblings, 2 replies; 8+ messages in thread
From: Jingqi Liu @ 2018-07-04 13:21 UTC (permalink / raw)
  To: pbonzini; +Cc: rth, ehabkost, mtosatti, qemu-devel, wei.w.wang, Jingqi Liu

The MSR (33H) controls support for #AC exception
for split locked accesses. When bit 29 of the MSR (33H)
is set, the processor causes an #AC exception to
be issued instead of suppressing LOCK on bus
(during split lock access).

Signed-off-by: Jingqi Liu <jingqi.liu@intel.com>
---
 target/i386/cpu.h     |  2 ++
 target/i386/kvm.c     | 13 +++++++++++++
 target/i386/machine.c | 20 ++++++++++++++++++++
 3 files changed, 35 insertions(+)

diff --git a/target/i386/cpu.h b/target/i386/cpu.h
index 8eaefee..9728552 100644
--- a/target/i386/cpu.h
+++ b/target/i386/cpu.h
@@ -348,6 +348,7 @@ typedef enum X86Seg {
 #define MSR_IA32_APICBASE_ENABLE        (1<<11)
 #define MSR_IA32_APICBASE_EXTD          (1 << 10)
 #define MSR_IA32_APICBASE_BASE          (0xfffffU<<12)
+#define MSR_SPLIT_LOCK_CTRL             0x00000033
 #define MSR_IA32_FEATURE_CONTROL        0x0000003a
 #define MSR_TSC_ADJUST                  0x0000003b
 #define MSR_IA32_SPEC_CTRL              0x48
@@ -1209,6 +1210,7 @@ typedef struct CPUX86State {
     uint32_t pkru;
 
     uint64_t spec_ctrl;
+    uint64_t split_lock_ctrl;
     uint64_t virt_ssbd;
 
     /* End of state preserved by INIT (dummy marker).  */
diff --git a/target/i386/kvm.c b/target/i386/kvm.c
index 032f0ad..043ca9b 100644
--- a/target/i386/kvm.c
+++ b/target/i386/kvm.c
@@ -92,6 +92,7 @@ static bool has_msr_hv_frequencies;
 static bool has_msr_hv_reenlightenment;
 static bool has_msr_xss;
 static bool has_msr_spec_ctrl;
+static bool has_msr_split_lock_ctrl;
 static bool has_msr_virt_ssbd;
 static bool has_msr_smi_count;
 
@@ -1272,6 +1273,9 @@ static int kvm_get_supported_msrs(KVMState *s)
                 case MSR_IA32_SPEC_CTRL:
                     has_msr_spec_ctrl = true;
                     break;
+                case MSR_SPLIT_LOCK_CTRL:
+                    has_msr_split_lock_ctrl = true;
+                    break;
                 case MSR_VIRT_SSBD:
                     has_msr_virt_ssbd = true;
                     break;
@@ -1786,6 +1790,9 @@ static int kvm_put_msrs(X86CPU *cpu, int level)
     if (has_msr_spec_ctrl) {
         kvm_msr_entry_add(cpu, MSR_IA32_SPEC_CTRL, env->spec_ctrl);
     }
+    if (has_msr_split_lock_ctrl) {
+        kvm_msr_entry_add(cpu, MSR_SPLIT_LOCK_CTRL, env->split_lock_ctrl);
+    }
     if (has_msr_virt_ssbd) {
         kvm_msr_entry_add(cpu, MSR_VIRT_SSBD, env->virt_ssbd);
     }
@@ -2169,6 +2176,9 @@ static int kvm_get_msrs(X86CPU *cpu)
     if (has_msr_spec_ctrl) {
         kvm_msr_entry_add(cpu, MSR_IA32_SPEC_CTRL, 0);
     }
+    if (has_msr_split_lock_ctrl) {
+        kvm_msr_entry_add(cpu, MSR_SPLIT_LOCK_CTRL, 0);
+    }
     if (has_msr_virt_ssbd) {
         kvm_msr_entry_add(cpu, MSR_VIRT_SSBD, 0);
     }
@@ -2551,6 +2561,9 @@ static int kvm_get_msrs(X86CPU *cpu)
         case MSR_IA32_SPEC_CTRL:
             env->spec_ctrl = msrs[i].data;
             break;
+        case MSR_SPLIT_LOCK_CTRL:
+            env->split_lock_ctrl = msrs[i].data;
+            break;
         case MSR_VIRT_SSBD:
             env->virt_ssbd = msrs[i].data;
             break;
diff --git a/target/i386/machine.c b/target/i386/machine.c
index 4d98d36..c82dc0d 100644
--- a/target/i386/machine.c
+++ b/target/i386/machine.c
@@ -935,6 +935,25 @@ static const VMStateDescription vmstate_msr_virt_ssbd = {
     }
 };
 
+static bool split_lock_ctrl_needed(void *opaque)
+{
+    X86CPU *cpu = opaque;
+    CPUX86State *env = &cpu->env;
+
+    return env->split_lock_ctrl != 0;
+}
+
+static const VMStateDescription vmstate_split_lock_ctrl = {
+    .name = "cpu/split_lock_ctrl",
+    .version_id = 1,
+    .minimum_version_id = 1,
+    .needed = split_lock_ctrl_needed,
+    .fields = (VMStateField[]){
+        VMSTATE_UINT64(env.split_lock_ctrl, X86CPU),
+        VMSTATE_END_OF_LIST()
+    }
+};
+
 VMStateDescription vmstate_x86_cpu = {
     .name = "cpu",
     .version_id = 12,
@@ -1059,6 +1078,7 @@ VMStateDescription vmstate_x86_cpu = {
         &vmstate_mcg_ext_ctl,
         &vmstate_msr_intel_pt,
         &vmstate_msr_virt_ssbd,
+        &vmstate_split_lock_ctrl,
         NULL
     }
 };
-- 
1.8.3.1

^ permalink raw reply related	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-04 13:21 [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H) Jingqi Liu
@ 2018-07-04 13:39 ` Paolo Bonzini
  2018-07-06  8:32   ` Liu, Jingqi
  2018-07-04 19:43 ` Eduardo Habkost
  1 sibling, 1 reply; 8+ messages in thread
From: Paolo Bonzini @ 2018-07-04 13:39 UTC (permalink / raw)
  To: Jingqi Liu; +Cc: rth, ehabkost, mtosatti, qemu-devel, wei.w.wang

On 04/07/2018 15:21, Jingqi Liu wrote:
> The MSR (33H) controls support for #AC exception
> for split locked accesses. When bit 29 of the MSR (33H)
> is set, the processor causes an #AC exception to
> be issued instead of suppressing LOCK on bus
> (during split lock access).
> 
> Signed-off-by: Jingqi Liu <jingqi.liu@intel.com>
> ---
>  target/i386/cpu.h     |  2 ++
>  target/i386/kvm.c     | 13 +++++++++++++
>  target/i386/machine.c | 20 ++++++++++++++++++++
>  3 files changed, 35 insertions(+)
> 
> diff --git a/target/i386/cpu.h b/target/i386/cpu.h
> index 8eaefee..9728552 100644
> --- a/target/i386/cpu.h
> +++ b/target/i386/cpu.h
> @@ -348,6 +348,7 @@ typedef enum X86Seg {
>  #define MSR_IA32_APICBASE_ENABLE        (1<<11)
>  #define MSR_IA32_APICBASE_EXTD          (1 << 10)
>  #define MSR_IA32_APICBASE_BASE          (0xfffffU<<12)
> +#define MSR_SPLIT_LOCK_CTRL             0x00000033
>  #define MSR_IA32_FEATURE_CONTROL        0x0000003a
>  #define MSR_TSC_ADJUST                  0x0000003b
>  #define MSR_IA32_SPEC_CTRL              0x48
> @@ -1209,6 +1210,7 @@ typedef struct CPUX86State {
>      uint32_t pkru;
>  
>      uint64_t spec_ctrl;
> +    uint64_t split_lock_ctrl;

Please call everything MSR_TEST_CTL or test_ctl.  Yes, it's a horrible
name, but if that's what the manual calls it, we should do the same.

Thanks,

Paolo

>      uint64_t virt_ssbd;
>  
>      /* End of state preserved by INIT (dummy marker).  */
> diff --git a/target/i386/kvm.c b/target/i386/kvm.c
> index 032f0ad..043ca9b 100644
> --- a/target/i386/kvm.c
> +++ b/target/i386/kvm.c
> @@ -92,6 +92,7 @@ static bool has_msr_hv_frequencies;
>  static bool has_msr_hv_reenlightenment;
>  static bool has_msr_xss;
>  static bool has_msr_spec_ctrl;
> +static bool has_msr_split_lock_ctrl;
>  static bool has_msr_virt_ssbd;
>  static bool has_msr_smi_count;
>  
> @@ -1272,6 +1273,9 @@ static int kvm_get_supported_msrs(KVMState *s)
>                  case MSR_IA32_SPEC_CTRL:
>                      has_msr_spec_ctrl = true;
>                      break;
> +                case MSR_SPLIT_LOCK_CTRL:
> +                    has_msr_split_lock_ctrl = true;
> +                    break;
>                  case MSR_VIRT_SSBD:
>                      has_msr_virt_ssbd = true;
>                      break;
> @@ -1786,6 +1790,9 @@ static int kvm_put_msrs(X86CPU *cpu, int level)
>      if (has_msr_spec_ctrl) {
>          kvm_msr_entry_add(cpu, MSR_IA32_SPEC_CTRL, env->spec_ctrl);
>      }
> +    if (has_msr_split_lock_ctrl) {
> +        kvm_msr_entry_add(cpu, MSR_SPLIT_LOCK_CTRL, env->split_lock_ctrl);
> +    }
>      if (has_msr_virt_ssbd) {
>          kvm_msr_entry_add(cpu, MSR_VIRT_SSBD, env->virt_ssbd);
>      }
> @@ -2169,6 +2176,9 @@ static int kvm_get_msrs(X86CPU *cpu)
>      if (has_msr_spec_ctrl) {
>          kvm_msr_entry_add(cpu, MSR_IA32_SPEC_CTRL, 0);
>      }
> +    if (has_msr_split_lock_ctrl) {
> +        kvm_msr_entry_add(cpu, MSR_SPLIT_LOCK_CTRL, 0);
> +    }
>      if (has_msr_virt_ssbd) {
>          kvm_msr_entry_add(cpu, MSR_VIRT_SSBD, 0);
>      }
> @@ -2551,6 +2561,9 @@ static int kvm_get_msrs(X86CPU *cpu)
>          case MSR_IA32_SPEC_CTRL:
>              env->spec_ctrl = msrs[i].data;
>              break;
> +        case MSR_SPLIT_LOCK_CTRL:
> +            env->split_lock_ctrl = msrs[i].data;
> +            break;
>          case MSR_VIRT_SSBD:
>              env->virt_ssbd = msrs[i].data;
>              break;
> diff --git a/target/i386/machine.c b/target/i386/machine.c
> index 4d98d36..c82dc0d 100644
> --- a/target/i386/machine.c
> +++ b/target/i386/machine.c
> @@ -935,6 +935,25 @@ static const VMStateDescription vmstate_msr_virt_ssbd = {
>      }
>  };
>  
> +static bool split_lock_ctrl_needed(void *opaque)
> +{
> +    X86CPU *cpu = opaque;
> +    CPUX86State *env = &cpu->env;
> +
> +    return env->split_lock_ctrl != 0;
> +}
> +
> +static const VMStateDescription vmstate_split_lock_ctrl = {
> +    .name = "cpu/split_lock_ctrl",
> +    .version_id = 1,
> +    .minimum_version_id = 1,
> +    .needed = split_lock_ctrl_needed,
> +    .fields = (VMStateField[]){
> +        VMSTATE_UINT64(env.split_lock_ctrl, X86CPU),
> +        VMSTATE_END_OF_LIST()
> +    }
> +};
> +
>  VMStateDescription vmstate_x86_cpu = {
>      .name = "cpu",
>      .version_id = 12,
> @@ -1059,6 +1078,7 @@ VMStateDescription vmstate_x86_cpu = {
>          &vmstate_mcg_ext_ctl,
>          &vmstate_msr_intel_pt,
>          &vmstate_msr_virt_ssbd,
> +        &vmstate_split_lock_ctrl,
>          NULL
>      }
>  };
> 

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-04 13:21 [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H) Jingqi Liu
  2018-07-04 13:39 ` Paolo Bonzini
@ 2018-07-04 19:43 ` Eduardo Habkost
  2018-07-06  8:38   ` Liu, Jingqi
  2018-07-06  8:43   ` Daniel P. Berrangé
  1 sibling, 2 replies; 8+ messages in thread
From: Eduardo Habkost @ 2018-07-04 19:43 UTC (permalink / raw)
  To: Jingqi Liu; +Cc: pbonzini, mtosatti, qemu-devel, wei.w.wang, rth

On Wed, Jul 04, 2018 at 09:21:06PM +0800, Jingqi Liu wrote:
> The MSR (33H) controls support for #AC exception
> for split locked accesses. When bit 29 of the MSR (33H)
> is set, the processor causes an #AC exception to
> be issued instead of suppressing LOCK on bus
> (during split lock access).
> 
> Signed-off-by: Jingqi Liu <jingqi.liu@intel.com>
[...]
> diff --git a/target/i386/machine.c b/target/i386/machine.c
> index 4d98d36..c82dc0d 100644
> --- a/target/i386/machine.c
> +++ b/target/i386/machine.c
> @@ -935,6 +935,25 @@ static const VMStateDescription vmstate_msr_virt_ssbd = {
>      }
>  };
>  
> +static bool split_lock_ctrl_needed(void *opaque)
> +{
> +    X86CPU *cpu = opaque;
> +    CPUX86State *env = &cpu->env;
> +
> +    return env->split_lock_ctrl != 0;
> +}

Based on the Linux patch at [1], guests may try to detect the
feature by writing to the MSR unconditionally.

If this happens, KVM needs to provide a mechanism to
enable/disable the MSR emulation.  Otherwise users will end up
with VMs that can't be migrated to older hosts even if they are
using older machine-types.

[1] https://lkml.org/lkml/2018/6/29/408

-- 
Eduardo

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-04 13:39 ` Paolo Bonzini
@ 2018-07-06  8:32   ` Liu, Jingqi
  0 siblings, 0 replies; 8+ messages in thread
From: Liu, Jingqi @ 2018-07-06  8:32 UTC (permalink / raw)
  To: Paolo Bonzini; +Cc: rth, ehabkost, mtosatti, qemu-devel, Wang, Wei W

On 04/07/2018 21:37, Paolo Bonzini wrote:
 
> On 04/07/2018 15:21, Jingqi Liu wrote:
> > The MSR (33H) controls support for #AC exception for split locked
> > accesses. When bit 29 of the MSR (33H) is set, the processor causes an
> > #AC exception to be issued instead of suppressing LOCK on bus (during
> > split lock access).
> >
> > Signed-off-by: Jingqi Liu <jingqi.liu@intel.com>
> > ---
> >  target/i386/cpu.h     |  2 ++
> >  target/i386/kvm.c     | 13 +++++++++++++
> >  target/i386/machine.c | 20 ++++++++++++++++++++
> >  3 files changed, 35 insertions(+)
> >
> > diff --git a/target/i386/cpu.h b/target/i386/cpu.h index
> > 8eaefee..9728552 100644
> > --- a/target/i386/cpu.h
> > +++ b/target/i386/cpu.h
> > @@ -348,6 +348,7 @@ typedef enum X86Seg {
> >  #define MSR_IA32_APICBASE_ENABLE        (1<<11)
> >  #define MSR_IA32_APICBASE_EXTD          (1 << 10)
> >  #define MSR_IA32_APICBASE_BASE          (0xfffffU<<12)
> > +#define MSR_SPLIT_LOCK_CTRL             0x00000033
> >  #define MSR_IA32_FEATURE_CONTROL        0x0000003a
> >  #define MSR_TSC_ADJUST                  0x0000003b
> >  #define MSR_IA32_SPEC_CTRL              0x48
> > @@ -1209,6 +1210,7 @@ typedef struct CPUX86State {
> >      uint32_t pkru;
> >
> >      uint64_t spec_ctrl;
> > +    uint64_t split_lock_ctrl;
> 
> Please call everything MSR_TEST_CTL or test_ctl.  Yes, it's a horrible name, but if
> that's what the manual calls it, we should do the same.
> 
Hi Paolo, 
Sure. I will unify the name in next version.
Thanks,
Jingqi

> Thanks,
> 
> Paolo
> 


^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-04 19:43 ` Eduardo Habkost
@ 2018-07-06  8:38   ` Liu, Jingqi
  2018-07-06  8:43   ` Daniel P. Berrangé
  1 sibling, 0 replies; 8+ messages in thread
From: Liu, Jingqi @ 2018-07-06  8:38 UTC (permalink / raw)
  To: Eduardo Habkost; +Cc: pbonzini, mtosatti, qemu-devel, Wang, Wei W, rth


On 05/07/2018 03:43, Eduardo Habkost wrote:
> On Wed, Jul 04, 2018 at 09:21:06PM +0800, Jingqi Liu wrote:
> > The MSR (33H) controls support for #AC exception for split locked
> > accesses. When bit 29 of the MSR (33H) is set, the processor causes an
> > #AC exception to be issued instead of suppressing LOCK on bus (during
> > split lock access).
> >
> > Signed-off-by: Jingqi Liu <jingqi.liu@intel.com>
> [...]
> > diff --git a/target/i386/machine.c b/target/i386/machine.c index
> > 4d98d36..c82dc0d 100644
> > --- a/target/i386/machine.c
> > +++ b/target/i386/machine.c
> > @@ -935,6 +935,25 @@ static const VMStateDescription
> vmstate_msr_virt_ssbd = {
> >      }
> >  };
> >
> > +static bool split_lock_ctrl_needed(void *opaque) {
> > +    X86CPU *cpu = opaque;
> > +    CPUX86State *env = &cpu->env;
> > +
> > +    return env->split_lock_ctrl != 0; }
> 
> Based on the Linux patch at [1], guests may try to detect the feature by writing
> to the MSR unconditionally.
> 
> If this happens, KVM needs to provide a mechanism to enable/disable the MSR
> emulation.  Otherwise users will end up with VMs that can't be migrated to older
> hosts even if they are using older machine-types.
> 
Hi Eduardo,
Thanks for your review, will provide the mechanism in next version.
Jingqi

> [1] https://lkml.org/lkml/2018/6/29/408
> 
> --
> Eduardo

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-04 19:43 ` Eduardo Habkost
  2018-07-06  8:38   ` Liu, Jingqi
@ 2018-07-06  8:43   ` Daniel P. Berrangé
  2018-07-06  9:31     ` Paolo Bonzini
  1 sibling, 1 reply; 8+ messages in thread
From: Daniel P. Berrangé @ 2018-07-06  8:43 UTC (permalink / raw)
  To: Eduardo Habkost
  Cc: Jingqi Liu, pbonzini, wei.w.wang, mtosatti, qemu-devel, rth

On Wed, Jul 04, 2018 at 04:43:27PM -0300, Eduardo Habkost wrote:
> On Wed, Jul 04, 2018 at 09:21:06PM +0800, Jingqi Liu wrote:
> > The MSR (33H) controls support for #AC exception
> > for split locked accesses. When bit 29 of the MSR (33H)
> > is set, the processor causes an #AC exception to
> > be issued instead of suppressing LOCK on bus
> > (during split lock access).
> > 
> > Signed-off-by: Jingqi Liu <jingqi.liu@intel.com>
> [...]
> > diff --git a/target/i386/machine.c b/target/i386/machine.c
> > index 4d98d36..c82dc0d 100644
> > --- a/target/i386/machine.c
> > +++ b/target/i386/machine.c
> > @@ -935,6 +935,25 @@ static const VMStateDescription vmstate_msr_virt_ssbd = {
> >      }
> >  };
> >  
> > +static bool split_lock_ctrl_needed(void *opaque)
> > +{
> > +    X86CPU *cpu = opaque;
> > +    CPUX86State *env = &cpu->env;
> > +
> > +    return env->split_lock_ctrl != 0;
> > +}
> 
> Based on the Linux patch at [1], guests may try to detect the
> feature by writing to the MSR unconditionally.
> 
> If this happens, KVM needs to provide a mechanism to
> enable/disable the MSR emulation.  Otherwise users will end up
> with VMs that can't be migrated to older hosts even if they are
> using older machine-types.

Is there really no CPUID flag that can be used to detect the feature ?
Unconditionally probing for existance of arbitrary MSRs seems to be
just re-inventing CPUID feature detection, but worse because as you
say we need to now invent a way to control existance of individual
MSRs too :-(

Regards,
Daniel
-- 
|: https://berrange.com      -o-    https://www.flickr.com/photos/dberrange :|
|: https://libvirt.org         -o-            https://fstop138.berrange.com :|
|: https://entangle-photo.org    -o-    https://www.instagram.com/dberrange :|

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-06  8:43   ` Daniel P. Berrangé
@ 2018-07-06  9:31     ` Paolo Bonzini
  2018-07-06 11:42       ` Eduardo Habkost
  0 siblings, 1 reply; 8+ messages in thread
From: Paolo Bonzini @ 2018-07-06  9:31 UTC (permalink / raw)
  To: Daniel P. Berrangé, Eduardo Habkost
  Cc: Jingqi Liu, wei.w.wang, mtosatti, qemu-devel, rth

On 06/07/2018 10:43, Daniel P. Berrangé wrote:
>> Based on the Linux patch at [1], guests may try to detect the
>> feature by writing to the MSR unconditionally.
>>
>> If this happens, KVM needs to provide a mechanism to
>> enable/disable the MSR emulation.  Otherwise users will end up
>> with VMs that can't be migrated to older hosts even if they are
>> using older machine-types.
> Is there really no CPUID flag that can be used to detect the feature ?
> Unconditionally probing for existance of arbitrary MSRs seems to be
> just re-inventing CPUID feature detection, but worse because as you
> say we need to now invent a way to control existance of individual
> MSRs too :-(

Now that I know that no silicon exists for this feature, the solution is
simple.  The feature will be rejected until a CPUID bit exists.

Paolo

^ permalink raw reply	[flat|nested] 8+ messages in thread

* Re: [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H)
  2018-07-06  9:31     ` Paolo Bonzini
@ 2018-07-06 11:42       ` Eduardo Habkost
  0 siblings, 0 replies; 8+ messages in thread
From: Eduardo Habkost @ 2018-07-06 11:42 UTC (permalink / raw)
  To: Paolo Bonzini
  Cc: Daniel P. Berrangé,
	Jingqi Liu, wei.w.wang, mtosatti, qemu-devel, rth

On Fri, Jul 06, 2018 at 11:31:38AM +0200, Paolo Bonzini wrote:
> On 06/07/2018 10:43, Daniel P. Berrangé wrote:
> >> Based on the Linux patch at [1], guests may try to detect the
> >> feature by writing to the MSR unconditionally.
> >>
> >> If this happens, KVM needs to provide a mechanism to
> >> enable/disable the MSR emulation.  Otherwise users will end up
> >> with VMs that can't be migrated to older hosts even if they are
> >> using older machine-types.
> > Is there really no CPUID flag that can be used to detect the feature ?
> > Unconditionally probing for existance of arbitrary MSRs seems to be
> > just re-inventing CPUID feature detection, but worse because as you
> > say we need to now invent a way to control existance of individual
> > MSRs too :-(
> 
> Now that I know that no silicon exists for this feature, the solution is
> simple.  The feature will be rejected until a CPUID bit exists.

This sounds even better than requiring a new mechanism to
enable/disable MSRs in KVM.

-- 
Eduardo

^ permalink raw reply	[flat|nested] 8+ messages in thread

end of thread, other threads:[~2018-07-06 12:20 UTC | newest]

Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-07-04 13:21 [Qemu-devel] [PATCH] i386: Add support to get/set/migrate MSR (33H) Jingqi Liu
2018-07-04 13:39 ` Paolo Bonzini
2018-07-06  8:32   ` Liu, Jingqi
2018-07-04 19:43 ` Eduardo Habkost
2018-07-06  8:38   ` Liu, Jingqi
2018-07-06  8:43   ` Daniel P. Berrangé
2018-07-06  9:31     ` Paolo Bonzini
2018-07-06 11:42       ` Eduardo Habkost

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.