|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2 2/4] x86: Introduce MSR_UNHANDLED
On 2/22/21 6:08 AM, Roger Pau Monné wrote:
> On Fri, Feb 19, 2021 at 09:56:32AM -0500, Boris Ostrovsky wrote:
>> On 2/18/21 5:51 AM, Roger Pau Monné wrote:
>>> On Wed, Jan 20, 2021 at 05:49:10PM -0500, Boris Ostrovsky wrote:
>>>> When toolstack updates MSR policy, this MSR offset (which is the last
>>>> index in the hypervisor MSR range) is used to indicate hypervisor
>>>> behavior when guest accesses an MSR which is not explicitly emulated.
>>> It's kind of weird to use an MSR to store this. I assume this is done
>>> for migration reasons?
>>
>> Not really. It just seemed to me that MSR policy is the logical place to do
>> that. Because it *is* a policy of how to deal with such accesses, isn't it?
> I agree that using the msr_policy seems like the most suitable place
> to convey this information between the toolstack and Xen. I wonder if
> it would be fine to have fields in msr_policy that don't directly
> translate into an MSR value?
We have xen_msr_entry_t.flags that we can use when passing policy array back
and forth. Then we can ignore xen_msr_entry_t.idx for that entry (although in
earlier version of this series Jan preferred to use idx and leave flags alone).
>
> But having such a list of ignored MSRs in msr_policy makes the whole
> get/set logic a bit weird, as the user would have to provide a buffer
> in order to get the list of ignored MSRs.
If we go with ranges/lists of ignored MSRs then we will need to have
ignore_msrs as a rangeset in msr_policy, not as (current) uint8. And
xen_msr_entry_t will need to have a range as opposed to single index. Or maybe
I don't understand what you are referring to as get/set logic.
But I would like to make sure we really want to support such ranges, I am a
little concerned about over-engineering this (especially wrt migration, I think
it will need marshalling/unmarshalling)
>>> Isn't is possible to convey this data in the xl migration stream
>>> instead of having to pack it with MSRs?
>>
>> I haven't looked at this but again --- the feature itself has nothing to do
>> with migration. The fact that folding it into policy makes migration of this
>> information "just work" is just a nice side benefit of this implementation.
> IMO it feels slightly weird that we have to use a MSR (MSR_UNHANDLED)
> to store this option, seems like wasting an MSR index when there's
> really no need for it to be stored in an MSR, as we don't expose it to
> guests.
>
> It would seem more natural for such option to live in arch_domain as a
> rangeset for example.
>
> Maybe introduce a new DOMCTL to set it?
>
> #define XEN_DOMCTL_msr_set_ignore ...
> struct xen_domctl_msr_set_ignore {
> uint32_t index;
> uint32_t size;
> };
That will work too but this is adding 2 new domctls (I think we will need a
"get" too) whereas with policy we use existing interface.
-boris
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |