[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 for-4.15] x86/msr: introduce an option for HVM relaxed rdmsr behavior


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • From: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Date: Thu, 4 Mar 2021 18:09:58 -0500
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=QaOVRjFYaGpbRWFnsRMzYv4gz95CwMM4bXbjeMzAa+I=; b=eOgK2l/tL2no2FnGYEsB9GAfk/sB755urORafWpgh3Hc7IucEyF2OxLGKM+jtSReTKBrr7hWVJr27oFo5iYyMZQJMPwFhCU7mgW2fQi86m0QFsTlpPsBOGOWZXkqNj2OBAVH4Vq5h+cj5dCo9DExMmcSFVP+ae7Xr8G8NiikZiNAeSI10GOAgkqxGMiYgt/l+iiFNjYo+12c/S5n8nIPtFvINeRNOhNiL4c+GILVy54DmfJJtWgT74dMJh7RMy/o1OYK5uWRg8J1xmSdNcxC2Vf/eqRF7Lo/9Y9xTt6mdzkZUBBJ2W9OVM1sVZCJa5qG4twTP8vv91r5RJ83oyUMMg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=CZYjvyjhOPiNgZuN5ZXn4WX6tqBkyZJ9OFhCL+TNDvXVMyk4UUV2NxlpWNYJ0szQgfkLtxTulTfl4JOK6g8L8iE/020+7GZEWtXR5A5tBlpHUP9kDocAq2IGs2yQHMRHcx69CeqwBNeRONtk+GuZ6W57em7H/jbJUVVEew/31BQYmWyV7ESwzsrv0exVbwQ5Q64v65SWh4jIzr9n0iIBWa2PO5Bgrcd/hQlXf4T7YAwDlogdIEzutZsGa12YWcfjo2bCf3NuMzuv3rhFVTw3Qtc5Zw4eqtMT/xcU1Ly2Q5y2T66FU0vLcQ9MMF6CUTlapb5T1ulaqCYae0BK4o7EBQ==
  • Authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=oracle.com;
  • Cc: Ian Jackson <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>
  • Delivery-date: Thu, 04 Mar 2021 23:10:24 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 3/4/21 9:47 AM, Roger Pau Monne wrote:
> Introduce an option to allow selecting a less strict behaviour for
> rdmsr accesses targeting a MSR not explicitly handled by Xen. Since
> commit 84e848fd7a162f669 accesses to MSRs not explicitly handled by
> Xen result in the injection of a #GP to the guest. This is a behavior
> change since previously a #GP was only injected if accessing the MSR
> on the real hardware will also trigger a #GP.
>
> This commit attempts to offer a fallback option similar to the
> previous behavior. Note however that the value of the underlying MSR
> is never leaked to the guest, as the newly introduced option only
> changes whether a #GP is injected or not.
>
> Long term the plan is to properly handle all the MSRs, so the option
> introduced here should be considered a temporary resort for OSes that
> don't work properly with the new MSR policy. Any OS that requires this
> option to be enabled should be reported to
> xen-devel@xxxxxxxxxxxxxxxxxxxx.
>
> Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
> ---
> Changes since v1:
>  - Only apply the option to HVM guests.
>  - Only apply the special handling to MSR reads.
>  - Sanitize the newly introduced flags field.
>  - Print a warning message when the option is used.
> ---
> Cc: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
> ---
> Boris, could you please test with Solaris to see if this fixes the
> issue?


Yes, still works. (It worked especially well after I noticed new option name 
;-))


-boris





 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.