|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 1/2] x86/entry/32: Introduce and use X86_BUG_ESPFIX instead of paravirt_enabled
On Wed, Mar 02, 2016 at 04:33:06PM -0800, Andy Lutomirski wrote:
> On Tue, Mar 1, 2016 at 4:15 PM, Luis R. Rodriguez <mcgrof@xxxxxxxxxx> wrote:
> > Ingo, your feedback appreciated at the end here, regarding quirks.
> >
> > On Tue, Mar 01, 2016 at 09:00:53AM -0500, Boris Ostrovsky wrote:
> >> On 02/29/2016 06:50 PM, Andy Lutomirski wrote:
> >> >diff --git a/arch/x86/kernel/cpu/common.c b/arch/x86/kernel/cpu/common.c
> >> >index 91ddae732a36..c6ef4da8e4f4 100644
> >> >--- a/arch/x86/kernel/cpu/common.c
> >> >+++ b/arch/x86/kernel/cpu/common.c
> >> >@@ -979,6 +979,31 @@ static void identify_cpu(struct cpuinfo_x86 *c)
> >
> > Note: Andy's change is on identify_cpu() modification here at the end.
> >
> >> > #ifdef CONFIG_NUMA
> >> > numa_add_cpu(smp_processor_id());
> >> > #endif
> >> >+
> >> >+ /*
> >> >+ * ESPFIX is a strange bug. All real CPUs have it. Paravirt
> >> >+ * systems that run Linux at CPL > 0 may or may not have the
> >> >+ * issue, but, even if they have the issue, there's absolutely
> >> >+ * nothing we can do about it because we can't use the real IRET
> >> >+ * instruction.
> >> >+ *
> >> >+ * NB: For the time being, only 32-bit kernels support
> >> >+ * X86_BUG_ESPFIX as such. 64-bit kernels directly choose
> >> >+ * whether to apply espfix using paravirt hooks. If any
> >> >+ * non-paravirt system ever shows up that does *not* have the
> >> >+ * ESPFIX issue, we can change this.
> >> >+ */
> >> >+#ifdef CONFIG_X86_32
> >> >+#ifdef CONFIG_PARAVIRT
> >> >+ do {
> >> >+ extern void native_iret(void);
> >> >+ if (pv_cpu_ops.iret == native_iret)
> >> >+ set_cpu_bug(c, X86_BUG_ESPFIX);
> >> >+ } while (0);
> >> >+#else
> >> >+ set_cpu_bug(c, X86_BUG_ESPFIX);
> >> >+#endif
> >> >+#endif
> >> > }
> >> > /*
> >>
> >> Alternatively, PV guests can clear X86_BUG_ESPFIX in their init
> >> code. E.g in .set_cpu_features op, just like we do for
> >> X86_BUG_SYSRET_SS_ATTRS
> >
> > Andy's proposal works out of identify_cpu() and that covers both boot
> > processor and secondary CPUs. The summary is as follows, tracing back in
> > time from left to right.
> >
> > --- identify_boot_cpu() --- check_bugs() --- start_kernel()
> > /
> > identify_cpu()<
> > \
> > --- identify_secondary_cpu() --- cpu_up() --- smp_init()
> > --- kernel_init_freeable() --- kernel_init()
> > --- rest_init() --- start_kernel()
> >
> >
> > set_cpu_features() is called from both: init_hypervisor_platform()
> > during setup_arch() and identify_cpu(). Since it'll be called on
> > check_bugs() already on identify_boot_cpu() though I think the
> > call from init_hypervisor_platform() seems redundant ?
> >
> > We assume we just call:
> >
> > setup_arch() --> init_hypervisor_platform() -->
> > init_hypervisor(&boot_cpu_data)
> >
> > But the above map on identify_cpu() also shows we call:
> >
> > start_kernel --> check_bugs() --> identify_boot_cpu() -->
> > identify_cpu() --> init_hypervisor() --> set_cpu_features()
> >
> >
> > void init_hypervisor(struct cpuinfo_x86 *c)
> > {
> > if (x86_hyper && x86_hyper->set_cpu_features)
> > x86_hyper->set_cpu_features(c);
> > }
> >
> > Anyway, since we're consolidating quirks, and since it turns out the other
> > quirks are being shifted away from paravirt_enabled() out into another
> > struct
> > x86_platform_ops CPU specific quirk, I wonder why not just also replace this
> > set_cpu_features() thing as a struct x86_platform_ops quirk CPU callback.
> >
> >> (although this may require adding struct
> >> hypervisor_x86 for lguests. Which I think they should have anyway).
> >
> > lguest already uses x86_platform, and setting up a per CPU quirk would
> > be rather trivial.
> >
> > CPU feature / CPU quirk...
> >
> > I've stashed the other quirks into a x86_early_init_platform_quirks(),
> > this was to have all quirks handled in one place. We handle differences
> > with subarch there. vmware has no subarch though, and it uses its own
> > set_cpu_features(). We have a few options I can think of:
> >
> > 1) keep this on set_cpu_features() and modify lguest to add a struct
> > hypervisor_x86
> > as boris suggests
> >
> > 2) move set_cpu_features() as a platform feature / quirk callback and
> > call it on identify_cpu()
> >
> > 3) Just identify each quirk on struct x86_platform, with a set of defaults
> > set. Then identify_cpu() enables a platform callback to override
> > defaults, and finally then a shared quirk call is issued to
> > set the different set_cpu_features() or clear them.
> >
>
> I think this is severely overcomplicating the issue.
>
> The issue is that IRET is a pile of shit. It may be quirky, but it
> affects *everything*.
>
> On x86_64, the kernel assumes that the "iret" implementation works
> around the quirk. xen_iret doesn't, and that's Xen's problem.
>
> On x86_32, it's inconvenient for native_iret to directly work around
> the quirk. Instead, some other asm code in the exit path sets up the
> workaround under the assumption that native_iret is just plain IRET.
> It's the responsibility of other IRET implementations to have their
> own implementations of the workaround and, again, they don't in
> practice and this is Xen and lguest's problem.
>
> So I think the condition we want really is (iret == native_iret), and
> that's what my patch does. So I think we should leave it at that.
OK great, I'd much prefer that, in particular as I could not find any
other obvious CPU "quirk" to really fold this as a platform quirk and
I really did not think this was enough to justify having lguest have
get a new hypervisor struct added. That just seemed overkill.
Luis
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |