[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH RFC for-4.15] x86/msr: introduce an option for legacy MSR behavior selection


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Date: Mon, 1 Mar 2021 14:33:25 -0500
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lym6hu6XGzAXanq41vcm2QQ2W5A+OouXzdcmIBXCN6A=; b=doXHNNd5rtAAjGEMl1Ul9T96edfd7vn+imFvki/JwqyBAThvxV0hpk1RkOfSNgZ4tvNXUjHqc7/UIzwe9m2RKgC7pqrhzBVXD79Uxo9yvqu80q5/zTDtoLd8iIEkYAuNVfqZt7GWCZ9RyOCZYDmwGy1bCR5tS+xcE+Lj7FYfHX3dZ5s7RtGU+NLsAzeo+f/F4q05nlWOR+WKFRggu7gTMRNm7axYkIdYWVuCQ9BfpPD+0jJs6Jy1jJKKcBWHkiwatI65EbXQ8PX8zOa6NnLXsjGsLQGt0flFbxtzVlCS4+gFuEdD0kzW9kB4ca19EpdmxeVHollxeXDTlyDTiVv55Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=eLYos+IB58vDZ5z/sU9H8bcmgQdIyLFMB8w/pvdkJBfsiz/94pGPrhH41z4CCL2Vj65TbOpfMZtlrQGimzLqGaSOJVY5fsrfTqC0Ln9YnePrhVNnCrRqSc3COhlhbipk7VzmlT6IWkZekdmd/ZOuzwaAquAYKGD/CJGgo7xjc/2uL1Xa0D9SxeyupKW+lCwKB9XqHt1u+sq8yrF0AbM+JnoHfZBk3qiDxY5k6D8abdQiMLm+ud+En/wsJGB+IRJz17gB4SouE0KtDjH3I5vSm/6HSCZW8sFO3D+IXaSIiA/NA4q9aQvEkNHBUFiaPre+w8nTX2e/k0GPaFsfEF1rww==
  • Authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=oracle.com;
  • Cc: Ian Jackson <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>
  • Delivery-date: Mon, 01 Mar 2021 19:33:45 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 3/1/21 11:23 AM, Roger Pau Monne wrote:
> Introduce an option to allow selecting the legacy behavior for
> accesses to MSRs not explicitly handled. Since commit
> 84e848fd7a162f669 and 322ec7c89f6640e accesses to MSRs not explicitly
> handled by Xen result in the injection of a #GP to the guest. This is
> a behavior change since previously a #GP was only injected if
> accessing the MSR on the real hardware will also trigger a #GP.
>
> This seems to be problematic for some guests, so introduce an option
> to fallback to this legacy behavior. The main difference between what
> was previously done is that the hardware MSR value is not leaked to
> the guests on reads.
>
> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> ---
> Cc: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
> ---
> Note that this option is not made available to dom0. I'm not sure
> whether it makes sense to do so, since anyone updating Xen to such
> newer version will also likely pair it with a newish kernel that
> doesn't require such workarounds.
>
> RFC because there's still some debate as to how we should solve the
> MSR issue, this is one possible way, but IMO we need to make a
> decision soon-ish because of the release timeline.
>
> Boris, could you please test with Solaris to see if this fixes the
> issue?


Yes, it does. Thanks.


-boris






 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.