[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 5/9] x86/vmx: Improvements to LBR MSR handling
>>> On 12.06.18 at 10:51, <andrew.cooper3@xxxxxxxxxx> wrote: > On 12/06/2018 09:15, Jan Beulich wrote: >>>>> On 08.06.18 at 20:48, <andrew.cooper3@xxxxxxxxxx> wrote: >>> @@ -3106,14 +3104,13 @@ static int vmx_msr_write_intercept(unsigned int >>> msr, > uint64_t msr_content) >>> for ( ; (rc == 0) && lbr->count; lbr++ ) >>> for ( i = 0; (rc == 0) && (i < lbr->count); i++ ) >>> if ( (rc = vmx_add_guest_msr(v, lbr->base + i)) == 0 ) >>> - { >>> vmx_clear_msr_intercept(v, lbr->base + i, > VMX_MSR_RW); >>> - if ( lbr_tsx_fixup_needed ) >>> - v->arch.hvm_vmx.lbr_fixup_enabled |= > FIXUP_LBR_TSX; >>> - if ( bdw_erratum_bdf14_fixup_needed ) >>> - v->arch.hvm_vmx.lbr_fixup_enabled |= >>> - FIXUP_BDW_ERRATUM_BDF14; >>> - } >>> + >>> + v->arch.hvm_vmx.lbr_flags |= LBR_MSRS_INSERTED; >>> + if ( lbr_tsx_fixup_needed ) >>> + v->arch.hvm_vmx.lbr_flags |= LBR_FIXUP_TSX; >>> + if ( bdw_erratum_bdf14_fixup_needed ) >>> + v->arch.hvm_vmx.lbr_flags |= LBR_FIXUP_BDF14; >> Note how the setting of the flags previously depended on >> vmx_add_guest_msr() having returned success at least once. > > And? > > Unless this sequence returns fully successfully, we throw #MC into the > guest without setting any kind of vMCE state. It might be the least bad > option we have available, but its also not reasonable to expect the > guest to survive. > > The two ways to fail are ENOMEM which E2BIG. The former is going to be > causing other forms of chaos, and the latter isn't going to occur in > practice because current codepaths in Xen use a maximum of ~40 or the > 256 available slots. If in the unlikely case that we fail with ENOMEM > on the first entry, all the fixup logic gets short circuited due to the > missing memory allocation (so practically 0 extra overhead), and the > guest will still malfunction. > > The error handling here is sufficiently poor that I'm not worried about > changing one minor corner case. I'm actually debating whether it would > be better to make the allocation at vmcs construction time, to avoid > runtime out-of-memory issues. With further improved MSR handling down the road, I assume we'll have some entries in the list in almost all cases, so yes, I think that would be desirable. >>> --- a/xen/include/asm-x86/hvm/vmx/vmcs.h >>> +++ b/xen/include/asm-x86/hvm/vmx/vmcs.h >>> @@ -156,7 +156,12 @@ struct arch_vmx_struct { >>> /* Are we emulating rather than VMENTERing? */ >>> uint8_t vmx_emulate; >>> >>> - uint8_t lbr_fixup_enabled; >>> + /* Flags for LBR MSRs in the load/save lists. */ >>> +#define LBR_MSRS_INSERTED (1u << 0) >>> +#define LBR_FIXUP_TSX (1u << 1) >>> +#define LBR_FIXUP_BDF14 (1u << 2) >>> +#define LBR_FIXUP_MASK (LBR_FIXUP_TSX | LBR_FIXUP_BDF14) >>> + uint8_t lbr_flags; >> I'm not overly happy with these getting moved to a non-private header, >> but I assume you need to use the new flag in vmcs.c in a later patch. >> Let's hope no other LBR_-prefixed names appear elsewhere in the code. > > No - no use in a later patch. They are moved here so they are next to > the data field they are used for. The previous code having random > defines remote from, and not obviously linked with, this data field is > detrimental to code quality and clarity. A comment at both sites providing the link would already help. Just like I would always advocate for struct-s to be fully declared locally only when they're used in just a single source file, I'd also prefer #define-s to have as little visibility as possible. Anyway - that's something to be decided by the VMX maintainers in this specific case. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |