|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2 of 2] vpmu: Add the BTS extension
Am Dienstag 14 Februar 2012, 13:27:08 schrieb Jan Beulich:
> >>> On 14.02.12 at 13:59, Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx> wrote:
> > Am Dienstag 14 Februar 2012, 11:51:39 schrieb Jan Beulich:
> >> >>> On 13.02.12 at 14:01, Dietmar Hahn <dietmar.hahn@xxxxxxxxxxxxxx> wrote:
> >> > @@ -401,7 +401,31 @@ static int core2_vpmu_do_wrmsr(unsigned
> >> > struct core2_vpmu_context *core2_vpmu_cxt = NULL;
> >> >
> >> > if ( !core2_vpmu_msr_common_check(msr, &type, &index) )
> >> > + {
> >> > + /* Special handling for BTS */
> >> > + if ( msr == MSR_IA32_DEBUGCTLMSR )
> >> > + {
> >> > + uint64_t supported = IA32_DEBUGCTLMSR_TR |
> > IA32_DEBUGCTLMSR_BTS |
> >> > + IA32_DEBUGCTLMSR_BTINT;
> >>
> >> Was the code to make BTINT work magically in place already? I can't
> >> spot anything to the effect in the patch...
> >
> > No, BTINT wasn't handled before.
> > The writing of the MSR's is done in the calling function
> > vmx_msr_write_intercept() in xen/arch/x86/hvm/vmx/vmx.c.
> > There I added the call of vpmu_do_wrmsr() in the case of
> > MSR_IA32_DEBUGCTLMSR.
> > If vpmu_do_wrmsr() returns 1 the MSR gets written in the line
> > __vmwrite(GUEST_IA32_DEBUGCTL, msr_content);
>
> The question was more towards what happens if a guest enables this
> bit without first setting up the corresponding LVT.
The apic is checked and set, see apic_write_around() in vpmu_core2.c.
>
> Plus enforcing the buffer requirements to avoid CPU deadlock
> (contiguous present pages, alignment). Failure to do so can hang the
> CPU, and hence would represent a DoS vulnerability.
I'm not sure what you mean here. Are you speaking about the DS buffer?
If yes, this is no problem, because the DS buffer addressm must be a domU
virtual address. The processor only writes data into the buffer, if the
domU is running so in the worst case the domU gets triggered a page fault
or what I testet a triple fault occurs and the domU gets rebootet.
>
> > Maybe I can change this and write the MSR here in this function.
>
> That might still be good to do, so checks and actual writing are in one
> place.
After thinking about this. The writing should better be in
vmx_msr_write_intercept() because vpmu_do_wrmsr() in this case does only a
check of illegal set bits in the vpmu environment. In such a case a
TRAP_gp_fault is initiated otherwise nothing is done.
>
> >>
> >> > +
> >> > + if ( cpu_has(¤t_cpu_data, X86_FEATURE_DSCPL) )
> >> > + {
> >> > + supported |= IA32_DEBUGCTLMSR_BTS_OFF_OS |
> >> > + IA32_DEBUGCTLMSR_BTS_OFF_USR;
> >> > + }
> >> > + if ( msr_content & supported )
> >> > + {
> >> > + if ( !vpmu_is_set(vpmu, VPMU_CPU_HAS_BTS) )
> >> > + {
> >> > + gdprintk(XENLOG_WARNING, "Debug Store is not
> >> > supported
> > on this cpu\n");
> >> > + vmx_inject_hw_exception(TRAP_gp_fault, 0);
> >> > + return 0;
> >> > + }
> >> > + return 1;
> >> > + }
> >> > + }
> >> > return 0;
> >> > + }
> >> >
> >> > core2_vpmu_cxt = vpmu->context;
> >> > switch ( msr )
> >> > @@ -420,8 +444,26 @@ static int core2_vpmu_do_wrmsr(unsigned
> >> > "which is not supported.\n");
> >> > return 1;
> >> > case MSR_IA32_DS_AREA:
> >> > - gdprintk(XENLOG_WARNING, "Guest setting of DTS is ignored.\n");
> >> > - return 1;
> >> > + if ( vpmu_is_set(vpmu, VPMU_CPU_HAS_DS) )
> >> > + {
> >> > + if (!msr_content || !is_canonical_address(msr_content))
> >> > + {
> >> > + gdprintk(XENLOG_WARNING, "Illegal address for
> > IA32_DS_AREA: 0x%lx\n",
> >> > +
> >> > msr_content);
> >> > + vmx_inject_hw_exception(TRAP_gp_fault, 0);
> >> > + return 1;
> >> > + }
> >> > + else
> >> > + {
> >> > + core2_vpmu_cxt->pmu_enable->ds_area_enable =
> >> > msr_content ? 1 :
> > 0;
> >> > + break;
> >>
> >> How do you manage to get away without storing the value the guest
> >> attempted to write?
> >
> > In the case of MSR_IA32_DS_AREA the value is stored some lines later
> > core2_vpmu_save_msr_context(v, type, index, msr_content);
> > in an internal data structure.
> > The values of this structure are loaded - core2_vpmu_load() - and stored
> > - core2_vpmu_save() - on context switch.
>
> Okay, I must have missed that part then.
>
> However, in the context of the above the simple is_canonical_address()
> check here clearly isn't enough.
As described above, the access to this buffer is only done while running the
domU.
Dietmar.
>
> Jan
>
>
--
Company details: http://ts.fujitsu.com/imprint.html
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |