[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v1 7/7] x86/vmx: switch IPT MSRs on vmentry/vmexit
----- 17 cze 2020 o 11:09, Roger Pau Monné roger.pau@xxxxxxxxxx napisał(a): > On Tue, Jun 16, 2020 at 07:47:07PM +0200, Michał Leszczyński wrote: >> ----- 16 cze 2020 o 19:38, Roger Pau Monné roger.pau@xxxxxxxxxx napisał(a): >> >> > On Tue, Jun 16, 2020 at 05:24:11PM +0200, Michał Leszczyński wrote: >> >> Enable IPT when entering the VM and disable it on vmexit. >> >> Register state is persisted using vCPU ipt_state structure. >> > >> > Shouldn't this be better done using Intel MSR load lists? >> > >> > That seems to be what the SDM recommends for tracing VM events. >> > >> > Thanks, Roger. >> >> >> This is intentional, additionally described by the comment: >> >> // MSR_IA32_RTIT_CTL is context-switched manually instead of being >> // stored inside VMCS, as of Q2'20 only the most recent processors >> // support such field in VMCS >> >> >> There is a special feature flag which indicates whether MSR_IA32_RTIT_CTL >> can be >> loaded using MR load lists. > > I've been looking at the Intel SDM and I'm not able to find which bit > signals whether MSR_IA32_RTIT_CTL can be loaded using MSR load lists. > Sorry to ask, but can you elaborate on where is this signaled? > > Thanks, Roger. According to SDM: > 24 Virtual Machine Control Structures -> 24.4 Guest-state Area -> 24.4.1 > Guest Register State > IA32_RTIT_CTL (64 bits). This field is supported only on processors that > support either the 1-setting of the "load IA32_RTIT_CTL" VM-entry control or > that of the "clear IA32_RTIT_CTL" VM-exit control. > 24 Virtual Machine Control Structures -> 24.8 VM-entry Control Fields -> > 24.8.1 VM-Entry Controls > Software should consult the VMX capability MSRs IA32_VMX_ENTRY_CTLS to > determine how it should set the reserved bits. Please look at bit position 18 "Load IA32_RTIT_CTL". Best regards, Michał Leszczyński CERT Polska
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |