[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 0/4] x86: Drop cross-vendor support


  • To: Teddy Astie <teddy.astie@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>
  • Date: Fri, 23 Jan 2026 13:10:13 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=vates.tech smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=rStHt3a2IjkI2MGQuSwJxr8R0DeCq4nsz0nSCRcDeA4=; b=pNW0A6Thb+h0oTiaSdJ0H8d8Yu0tuCd3xpQOWXfZLYlhEt/B90GTbgSD2JqgF+WwywR4GCsIK5sZ9tV3iXHfGaBme6ecU2q6TJ+devCyXhbpeE080UcCgkbDSnLHGu54DVzVxbNrEmFCHGrGYQo653e7R4AByKA29KPnTCfHMzyfKKpF7xGWNbfxQkRjoLGB7XVsN1eYdlNTKz9ezrSfyCbUSqBcN1MDa8yl9IwS5esn1iFAH6kq0wN0eshx6dvss6WUKjweHUVychgnJjpvjzSKiYpo2c1z1QHtFg3P/aaP+2ChXMmxby0ZM1XHC4vmTvn7SvRY8xs3npUOvioEWA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=mMA3LrMzGvjn+GLtm5OT7Iii/iJD5aIg063qDy7Fpb3JM+yfSWd7VLJKGLQf9mjrrY99ebnM5e2/A38XrTBnbVHrYCxWZLtvL03sZgX3bgLwWoU21gpRDcbDvnbDXPHAbRk3mPN7YY+KS7bpEOTJatHM2HqJDrgy6072FsJ6uC3vsp3MBSBLnKkmexTII4XfezB2jVShPob/pU474C8GkRZjxB1qw3ETKV5kcIWiMn/A2HkC996nv7y5GpI1LAXhsVHxdyTeMBJsQ2DtJ+kH5VBLnYKpm0UVKfPxQn/X9n43tJH8RmpE18xRUodsMAJJaiqIhsQVTl3ttV03fozZGw==
  • Cc: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx>, Community Manager <community.manager@xxxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Jason Andryuk <jason.andryuk@xxxxxxx>
  • Delivery-date: Fri, 23 Jan 2026 12:10:37 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Thu Jan 22, 2026 at 7:16 PM CET, Teddy Astie wrote:
> Le 22/01/2026 à 18:44, Alejandro Vallejo a écrit :
>> On Thu Jan 22, 2026 at 6:10 PM CET, Andrew Cooper wrote:
>>> On 22/01/2026 4:49 pm, Alejandro Vallejo wrote:
>>>> Open question unrelated to the series: Does it make sense to 
>>>> conditionalise the
>>>> MSR handlers for non intercepted MSRs on HVM_FEP?
>>>
>>> I'm not quite sure what you're asking here.
>>>
>>> ~Andrew
>> 
>> The handlers for LSTAR and the like are dead code with !CONFIG_HVM_FEP as far
>> as I can tell. The question I'm asking is whether there is another code path
>> that might invoke MSR handlers for non-intercepted MSRs. I can't see it, but
>> I'm not sure.
>> 
>> If there isn't I'm considering (conditionally) getting rid of them.
>> 
>
> I think you can enter this path by making the guest execute directly or 
> indirectly a rdmsr in a emulated path (there are some cases like certain 
> cases of real mode or maybe vm introspection). I don't think that FEP is 
> the only way to do that.

For the emulation path, I think HVM_FEP is the only means to trigger it, as
neither {rd,wr}msr access memory. VMI (as you mention) and nSVM (as Andrew did)
do make sense, but I don't see any others. I don't see how real mode could cause
anything (I'm fuzzy on VMX, but I _think_ instructions do execute, just in
a weird paging-on mode akin to v8086).

I'll munch on the idea I bit longer. If I can't come up with any other cases
I'll send something to remove that dead code for the cases in which it's truly
dead.

Cheers,
Alejandro



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.