[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 0/4] x86: Drop cross-vendor support


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>
  • Date: Wed, 11 Mar 2026 10:46:40 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=suse.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ghnJIzHCBfPPb7PJGOHx3Jgoqqxk8PgvNWQy+vwhnPM=; b=R8YJ9cyZ5DdklpVUy3Y+g2Ke7+hZDgCkh6i6uQJtKsFTWCXKdUCoQj87D0oap4g9fHX9lBx6ikEwQrPMKreSUc3LCZcwcsQ0uDiQDy7i2VNKshXbDpf+rnADFvTf6M2w0+oemSNS5dhUWMfIBQk5hvvKGA8ntOwvTePDrSjwxWfAojsukvo2gBIoqdusCaosMo+Sa29aah8hARouCtPoy12BZGjBQpCZhXH+L/6OTidA3+M2aRZs9MahP+gZHRNAgK1mkj1dHLDcdkE9TsbgrhBsn0dHyyXOSxxJyDNd9kgb2Mjz9P6WmgTK45UrSQt/YG5iIStowpJ2w8gvEvVcOw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=h/+Vh5vxcPm3l8Yi9/0YorOu59+YBnYLadj3O5OnrML1pCTeiZjT2IcT2S5hTLEwgvolc96cbwe/oKrX5ImjG670aMEv20ogHXmnSw+ZADUaZzixmQg48w5/CcnrVTj/NcsZlVRMTBe2ZrcAKYROvVjVQkTxW3jLOqtdphKSWrR+9Sn7C7krI05cuXI/4oz/c3//HcfLmy7Py/RAfHCkIOtUTFjds9D4YpwvpAy7wH4XQS74073ZvG7LOYmNPhlfzDdFvPKAB72Yd+MUz5mAzY5PiIkCMWguQm6TnNPqMPO6V5eFaJ3AeRLychvdYGjdHvPMKnBY3uXTKGyC/nBK+A==
  • Cc: Oleksii Kurochko <oleksii.kurochko@xxxxxxxxx>, Community Manager <community.manager@xxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "Jason Andryuk" <jason.andryuk@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 11 Mar 2026 09:47:09 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed Mar 11, 2026 at 9:54 AM CET, Jan Beulich wrote:
> On 13.02.2026 12:42, Alejandro Vallejo wrote:
>> Alejandro Vallejo (4):
>>   x86: Reject CPU policies with vendors other than the host's
>>   x86/hvm: Disable cross-vendor handling in #UD handler
>>   x86/hvm: Remove cross-vendor checks from MSR handlers.
>>   x86/svm: Drop emulation of Intel's SYSENTER behaviour on AMD systems
>
> With this, do we actually want to keep emulation of SYS{ENTER,EXIT,CALL,RET}
> in the insn emulator? Or at least gate that on e.g. VM_EVENT, to still allow
> its use by introspection? Whether to then also permit those with HVM_FEP=y
> (but VM_EVENT=n) would be a follow-on question.
>
> Jan

I can force emulation of anything by writing an instruction to an xAPIC register
followed by RET and then CALL-ing it that address. If we want a hypervisor
capable of running such ridiculous cases the emulator must be complete. If not,
the question is what to do otherwise. Inject #UD? Crash the domain?

Cheers,
Alejandro



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.