qemu-e2k/target
Liran Alon 79a197ab18 target/i386: kvm: Demand nested migration kernel capabilities only when vCPU may have enabled VMX
Previous to this change, a vCPU exposed with VMX running on a kernel
without KVM_CAP_NESTED_STATE or KVM_CAP_EXCEPTION_PAYLOAD resulted in
adding a migration blocker. This was because when the code was written
it was thought there is no way to reliably know if a vCPU is utilising
VMX or not at runtime. However, it turns out that this can be known to
some extent:

In order for a vCPU to enter VMX operation it must have CR4.VMXE set.
Since it was set, CR4.VMXE must remain set as long as the vCPU is in
VMX operation. This is because CR4.VMXE is one of the bits set
in MSR_IA32_VMX_CR4_FIXED1.
There is one exception to the above statement when vCPU enters SMM mode.
When a vCPU enters SMM mode, it temporarily exits VMX operation and
may also reset CR4.VMXE during execution in SMM mode.
When the vCPU exits SMM mode, vCPU state is restored to be in VMX operation
and CR4.VMXE is restored to its original state of being set.
Therefore, when the vCPU is not in SMM mode, we can infer whether
VMX is being used by examining CR4.VMXE. Otherwise, we cannot
know for certain but assume the worse that vCPU may utilise VMX.

Summaring all the above, a vCPU may have enabled VMX in case
CR4.VMXE is set or vCPU is in SMM mode.

Therefore, remove migration blocker and check before migration
(cpu_pre_save()) if the vCPU may have enabled VMX. If true, only then
require relevant kernel capabilities.

While at it, demand KVM_CAP_EXCEPTION_PAYLOAD only when the vCPU is in
guest-mode and there is a pending/injected exception. Otherwise, this
kernel capability is not required for proper migration.

Reviewed-by: Joao Martins <joao.m.martins@oracle.com>
Signed-off-by: Liran Alon <liran.alon@oracle.com>
Reviewed-by: Maran Wilson <maran.wilson@oracle.com>
Tested-by: Maran Wilson <maran.wilson@oracle.com>
Signed-off-by: Paolo Bonzini <pbonzini@redhat.com>
2019-07-19 18:01:47 +02:00
..
alpha Include qemu-common.h exactly where needed 2019-06-12 13:20:20 +02:00
arm target/arm: NS BusFault on vector table fetch escalates to NS HardFault 2019-07-15 14:17:04 +01:00
cris Supply missing header guards 2019-06-12 13:20:21 +02:00
hppa hppa: Delete unused hppa_cpu_list() function 2019-07-05 17:08:03 -03:00
i386 target/i386: kvm: Demand nested migration kernel capabilities only when vCPU may have enabled VMX 2019-07-19 18:01:47 +02:00
lm32 Include qemu-common.h exactly where needed 2019-06-12 13:20:20 +02:00
m68k m68k comments break patch submission due to being incorrectly formatted 2019-06-26 17:14:39 +02:00
microblaze Supply missing header guards 2019-06-12 13:20:21 +02:00
mips target/mips: Add missing 'break' for certain cases of MTTR handling 2019-07-15 22:22:05 +02:00
moxie Supply missing header guards 2019-06-12 13:20:21 +02:00
nios2 hmp: Move hmp.h to include/monitor/ 2019-07-02 07:19:45 +02:00
openrisc general: Replace global smp variables with smp machine properties 2019-07-05 17:07:36 -03:00
ppc Monitor patches for 2019-07-02 2019-07-03 00:16:43 +01:00
riscv RISC-V: Clear load reservations on context switch and SC 2019-06-25 22:37:04 -07:00
s390x s390x/cpumodel: change internal name of vxpdeh to match description 2019-07-16 11:29:38 +02:00
sh4 hmp: Move hmp.h to include/monitor/ 2019-07-02 07:19:45 +02:00
sparc hmp: Move hmp.h to include/monitor/ 2019-07-02 07:19:45 +02:00
tilegx Normalize position of header guard 2019-06-12 13:20:20 +02:00
tricore tricore: add QSEED instruction 2019-06-25 15:02:07 +02:00
unicore32 Include qemu-common.h exactly where needed 2019-06-12 13:20:20 +02:00
xtensa hmp: Move hmp.h to include/monitor/ 2019-07-02 07:19:45 +02:00