From patchwork Mon Feb 17 11:45:41 2020 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?q?Roger_Pau_Monn=C3=A9?= X-Patchwork-Id: 11386175 Return-Path: Received: from mail.kernel.org (pdx-korg-mail-1.web.codeaurora.org [172.30.200.123]) by pdx-korg-patchwork-2.web.codeaurora.org (Postfix) with ESMTP id E28A617E8 for ; Mon, 17 Feb 2020 11:47:14 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id BE102206F4 for ; Mon, 17 Feb 2020 11:47:14 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=citrix.com header.i=@citrix.com header.b="d45zA5e6" DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org BE102206F4 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=citrix.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1j3eqd-000166-PT; Mon, 17 Feb 2020 11:45:59 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1j3eqd-00015v-01 for xen-devel@lists.xenproject.org; Mon, 17 Feb 2020 11:45:59 +0000 X-Inumbo-ID: 0fd45e50-517b-11ea-ade5-bc764e2007e4 Received: from esa6.hc3370-68.iphmx.com (unknown [216.71.155.175]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 0fd45e50-517b-11ea-ade5-bc764e2007e4; Mon, 17 Feb 2020 11:45:58 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=citrix.com; s=securemail; t=1581939957; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=nlWUJ2XlHVHGrY+oNa1xbDb3L3l5DZf48ohjdwZyB9Q=; b=d45zA5e6P5LZrlq9q9st0NwwpBiH+DV7/eAbPzP2QmKvGLoxY/x8EKhj ZbfVIB86OAncD6gR+duDYvGWL/N7XKNhdPGM231dK1aoTDK34RPN/o/bK x9xFjDz6umrClv1M5vF+sOZSyuIdmK52OkM8unxEyBURyeCn+O0d5FjlU 0=; Authentication-Results: esa6.hc3370-68.iphmx.com; dkim=none (message not signed) header.i=none; spf=None smtp.pra=roger.pau@citrix.com; spf=Pass smtp.mailfrom=roger.pau@citrix.com; spf=None smtp.helo=postmaster@mail.citrix.com Received-SPF: None (esa6.hc3370-68.iphmx.com: no sender authenticity information available from domain of roger.pau@citrix.com) identity=pra; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible Received-SPF: Pass (esa6.hc3370-68.iphmx.com: domain of roger.pau@citrix.com designates 162.221.158.21 as permitted sender) identity=mailfrom; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="roger.pau@citrix.com"; x-conformance=sidf_compatible; x-record-type="v=spf1"; x-record-text="v=spf1 ip4:209.167.231.154 ip4:178.63.86.133 ip4:195.66.111.40/30 ip4:85.115.9.32/28 ip4:199.102.83.4 ip4:192.28.146.160 ip4:192.28.146.107 ip4:216.52.6.88 ip4:216.52.6.188 ip4:162.221.158.21 ip4:162.221.156.83 ip4:168.245.78.127 ~all" Received-SPF: None (esa6.hc3370-68.iphmx.com: no sender authenticity information available from domain of postmaster@mail.citrix.com) identity=helo; client-ip=162.221.158.21; receiver=esa6.hc3370-68.iphmx.com; envelope-from="roger.pau@citrix.com"; x-sender="postmaster@mail.citrix.com"; x-conformance=sidf_compatible IronPort-SDR: mtET3KXeSjA9jyycHHd/TkZVQnXTjmPEnPxd19/BN9MQixw9wIZh+jNOTydBusi3wcxTVW3KI5 uj26sIwBPVRAOJnDRMGBOO5arQE0knHIWB7RLp6lyOO+HZvhMcYsrEUDVMYGLygxG/9FNAB2TR pFw59RLkcmAk6xQiP9cbXLfaApUejWORhMFhLgMTIsfLf9hMbTj3hlGxtCt0bJaChKsQ8dafDl RrlBc8Sf6RAMNAv9OfgR6jd6OpAzwfQB3JJ8nNgUCiaGCXcK8yxgAP/7QspqbQUDdkMDFVoetJ hF4= X-SBRS: 2.7 X-MesageID: 12992150 X-Ironport-Server: esa6.hc3370-68.iphmx.com X-Remote-IP: 162.221.158.21 X-Policy: $RELAYED X-IronPort-AV: E=Sophos;i="5.70,452,1574139600"; d="scan'208";a="12992150" From: Roger Pau Monne To: Date: Mon, 17 Feb 2020 12:45:41 +0100 Message-ID: <20200217114545.71112-1-roger.pau@citrix.com> X-Mailer: git-send-email 2.25.0 MIME-Version: 1.0 Subject: [Xen-devel] [PATCH v5 0/4] nvmx: implement support for MSR bitmaps X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Kevin Tian , Stefano Stabellini , Julien Grall , Jun Nakajima , Wei Liu , Konrad Rzeszutek Wilk , George Dunlap , Andrew Cooper , Ian Jackson , Jan Beulich , Volodymyr Babchuk , Roger Pau Monne Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" Hello, Current nested VMX code advertises support for the MSR bitmap feature, yet the implementation isn't done. Previous to this series Xen just maps the nested guest MSR bitmap (as set by L1) and that's it, the L2 guest ends up using the L1 MSR bitmap. This series adds handling of the L2 MSR bitmap and merging with the L1 MSR bitmap and loading it into the nested guest VMCS. Patch #4 makes sure the x2APIC MSR range is always trapped, or else a guest with nested virtualization enabled could manage to access some of the x2APIC MSR registers from the host. Thanks, Roger.Roger Pau Monne (4): nvmx: implement support for MSR bitmaps arm: rename BIT_WORD to BITOP_WORD bitmap: import bitmap_{set/clear} from Linux 5.5 nvmx: always trap accesses to x2APIC MSRs xen/arch/arm/arm32/lib/bitops.c | 4 +- xen/arch/arm/arm64/lib/bitops.c | 4 +- xen/arch/arm/arm64/lib/find_next_bit.c | 10 ++-- xen/arch/x86/hvm/vmx/vvmx.c | 80 ++++++++++++++++++++++++-- xen/common/bitmap.c | 39 +++++++++++++ xen/include/asm-arm/bitops.h | 10 ++-- xen/include/asm-x86/hvm/vmx/vvmx.h | 3 +- xen/include/xen/bitmap.h | 40 +++++++++++++ xen/include/xen/bitops.h | 2 + 9 files changed, 172 insertions(+), 20 deletions(-)