[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 0/4] x86: Drop cross-vendor support
- To: Teddy Astie <teddy.astie@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>
- Date: Fri, 23 Jan 2026 13:10:13 +0100
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vates.tech smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rStHt3a2IjkI2MGQuSwJxr8R0DeCq4nsz0nSCRcDeA4=; b=pNW0A6Thb+h0oTiaSdJ0H8d8Yu0tuCd3xpQOWXfZLYlhEt/B90GTbgSD2JqgF+WwywR4GCsIK5sZ9tV3iXHfGaBme6ecU2q6TJ+devCyXhbpeE080UcCgkbDSnLHGu54DVzVxbNrEmFCHGrGYQo653e7R4AByKA29KPnTCfHMzyfKKpF7xGWNbfxQkRjoLGB7XVsN1eYdlNTKz9ezrSfyCbUSqBcN1MDa8yl9IwS5esn1iFAH6kq0wN0eshx6dvss6WUKjweHUVychgnJjpvjzSKiYpo2c1z1QHtFg3P/aaP+2ChXMmxby0ZM1XHC4vmTvn7SvRY8xs3npUOvioEWA==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=mMA3LrMzGvjn+GLtm5OT7Iii/iJD5aIg063qDy7Fpb3JM+yfSWd7VLJKGLQf9mjrrY99ebnM5e2/A38XrTBnbVHrYCxWZLtvL03sZgX3bgLwWoU21gpRDcbDvnbDXPHAbRk3mPN7YY+KS7bpEOTJatHM2HqJDrgy6072FsJ6uC3vsp3MBSBLnKkmexTII4XfezB2jVShPob/pU474C8GkRZjxB1qw3ETKV5kcIWiMn/A2HkC996nv7y5GpI1LAXhsVHxdyTeMBJsQ2DtJ+kH5VBLnYKpm0UVKfPxQn/X9n43tJH8RmpE18xRUodsMAJJaiqIhsQVTl3ttV03fozZGw==
- Cc: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx>, Community Manager <community.manager@xxxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Jason Andryuk <jason.andryuk@xxxxxxx>
- Delivery-date: Fri, 23 Jan 2026 12:10:37 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On Thu Jan 22, 2026 at 7:16 PM CET, Teddy Astie wrote:
> Le 22/01/2026 à 18:44, Alejandro Vallejo a écrit :
>> On Thu Jan 22, 2026 at 6:10 PM CET, Andrew Cooper wrote:
>>> On 22/01/2026 4:49 pm, Alejandro Vallejo wrote:
>>>> Open question unrelated to the series: Does it make sense to
>>>> conditionalise the
>>>> MSR handlers for non intercepted MSRs on HVM_FEP?
>>>
>>> I'm not quite sure what you're asking here.
>>>
>>> ~Andrew
>>
>> The handlers for LSTAR and the like are dead code with !CONFIG_HVM_FEP as far
>> as I can tell. The question I'm asking is whether there is another code path
>> that might invoke MSR handlers for non-intercepted MSRs. I can't see it, but
>> I'm not sure.
>>
>> If there isn't I'm considering (conditionally) getting rid of them.
>>
>
> I think you can enter this path by making the guest execute directly or
> indirectly a rdmsr in a emulated path (there are some cases like certain
> cases of real mode or maybe vm introspection). I don't think that FEP is
> the only way to do that.
For the emulation path, I think HVM_FEP is the only means to trigger it, as
neither {rd,wr}msr access memory. VMI (as you mention) and nSVM (as Andrew did)
do make sense, but I don't see any others. I don't see how real mode could cause
anything (I'm fuzzy on VMX, but I _think_ instructions do execute, just in
a weird paging-on mode akin to v8086).
I'll munch on the idea I bit longer. If I can't come up with any other cases
I'll send something to remove that dead code for the cases in which it's truly
dead.
Cheers,
Alejandro
|