|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [PATCH v2 15/21] libs/guest: obtain a compatible cpu policy from two input ones
Introduce a helper to obtain a compatible cpu policy based on two
input cpu policies. Currently this is done by and'ing all CPUID leaves
and MSR entries, except for MSR_ARCH_CAPABILITIES which has the RSBA
bit or'ed.
The _AC macro is pulled from libxl_internal.h into xen-tools/libs.h
since it's required in order to use the msr-index.h header.
Note there's no need to place this helper in libx86, since the
calculation of a compatible policy shouldn't be done from the
hypervisor.
No callers of the interface introduced.
Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
---
Changes since v1:
- Only AND the feature parts of cpuid.
- Use a binary search to find the matching leaves and msr entries.
- Remove default case from MSR level function.
---
tools/include/xen-tools/libs.h | 5 ++
tools/include/xenctrl.h | 4 +
tools/libs/guest/xg_cpuid_x86.c | 128 ++++++++++++++++++++++++++++++
tools/libs/light/libxl_internal.h | 2 -
4 files changed, 137 insertions(+), 2 deletions(-)
diff --git a/tools/include/xen-tools/libs.h b/tools/include/xen-tools/libs.h
index a16e0c38070..b9e89f9a711 100644
--- a/tools/include/xen-tools/libs.h
+++ b/tools/include/xen-tools/libs.h
@@ -63,4 +63,9 @@
#define ROUNDUP(_x,_w) (((unsigned long)(_x)+(1UL<<(_w))-1) & ~((1UL<<(_w))-1))
#endif
+#ifndef _AC
+#define __AC(X,Y) (X##Y)
+#define _AC(X,Y) __AC(X,Y)
+#endif
+
#endif /* __XEN_TOOLS_LIBS__ */
diff --git a/tools/include/xenctrl.h b/tools/include/xenctrl.h
index 5f699c09509..c41d794683c 100644
--- a/tools/include/xenctrl.h
+++ b/tools/include/xenctrl.h
@@ -2622,6 +2622,10 @@ int xc_cpu_policy_update_msrs(xc_interface *xch,
xc_cpu_policy_t policy,
/* Compatibility calculations. */
bool xc_cpu_policy_is_compatible(xc_interface *xch, const xc_cpu_policy_t host,
const xc_cpu_policy_t guest);
+int xc_cpu_policy_calc_compatible(xc_interface *xch,
+ const xc_cpu_policy_t p1,
+ const xc_cpu_policy_t p2,
+ xc_cpu_policy_t out);
int xc_get_cpu_levelling_caps(xc_interface *xch, uint32_t *caps);
int xc_get_cpu_featureset(xc_interface *xch, uint32_t index,
diff --git a/tools/libs/guest/xg_cpuid_x86.c b/tools/libs/guest/xg_cpuid_x86.c
index bd2f31dd87f..6cfa4cb39d1 100644
--- a/tools/libs/guest/xg_cpuid_x86.c
+++ b/tools/libs/guest/xg_cpuid_x86.c
@@ -32,6 +32,7 @@ enum {
#include <xen/arch-x86/cpufeatureset.h>
};
+#include <xen/asm/msr-index.h>
#include <xen/asm/x86-vendors.h>
#include <xen/lib/x86/cpu-policy.h>
@@ -944,3 +945,130 @@ bool xc_cpu_policy_is_compatible(xc_interface *xch, const
xc_cpu_policy_t host,
return false;
}
+
+static uint64_t level_msr(unsigned int index, uint64_t val1, uint64_t val2)
+{
+ uint64_t val = val1 & val2;;
+
+ switch ( index )
+ {
+ case MSR_ARCH_CAPABILITIES:
+ /*
+ * Set RSBA if present on any of the input values to notice the guest
+ * might run on vulnerable hardware at some point.
+ */
+ val |= (val1 | val2) & ARCH_CAPS_RSBA;
+ break;
+ }
+
+ return val;
+}
+
+static bool level_leaf(xen_cpuid_leaf_t *l1, xen_cpuid_leaf_t *l2,
+ xen_cpuid_leaf_t *out)
+{
+ *out = (xen_cpuid_leaf_t){ };
+
+ switch ( l1->leaf )
+ {
+ case 0x1:
+ case 0x80000001:
+ out->c = l1->c & l2->c;
+ out->d = l1->d & l2->d;
+ return true;
+
+ case 0xd:
+ if ( l1->subleaf != 1 )
+ break;
+ out->a = l1->a & l2->a;
+ return true;
+
+ case 0x7:
+ switch ( l1->subleaf )
+ {
+ case 0:
+ out->b = l1->b & l2->b;
+ out->c = l1->c & l2->c;
+ out->d = l1->d & l2->d;
+ return true;
+
+ case 1:
+ out->a = l1->a & l2->a;
+ return true;
+ }
+ break;
+
+ case 0x80000007:
+ out->d = l1->d & l2->d;
+ return true;
+
+ case 0x80000008:
+ out->b = l1->b & l2->b;
+ return true;
+ }
+
+ return false;
+}
+
+int xc_cpu_policy_calc_compatible(xc_interface *xch,
+ const xc_cpu_policy_t p1,
+ const xc_cpu_policy_t p2,
+ xc_cpu_policy_t out)
+{
+ unsigned int nr_leaves, nr_msrs, i, index;
+ unsigned int p1_nr_leaves, p2_nr_leaves;
+ unsigned int p1_nr_entries, p2_nr_entries;
+ int rc;
+
+ p1_nr_leaves = p2_nr_leaves = ARRAY_SIZE(p1->leaves);
+ p1_nr_entries = p2_nr_entries = ARRAY_SIZE(p1->entries);
+
+ rc = xc_cpu_policy_serialise(xch, p1, p1->leaves, &p1_nr_leaves,
+ p1->entries, &p1_nr_entries);
+ if ( rc )
+ return rc;
+ rc = xc_cpu_policy_serialise(xch, p2, p2->leaves, &p2_nr_leaves,
+ p2->entries, &p2_nr_entries);
+ if ( rc )
+ return rc;
+
+ index = 0;
+ for ( i = 0; i < p1_nr_leaves; i++ )
+ {
+ xen_cpuid_leaf_t *l1 = &p1->leaves[i];
+ xen_cpuid_leaf_t *l2 = find_leaf(p2->leaves, p2_nr_leaves,
+ l1->leaf, l1->subleaf);
+
+ if ( l2 && level_leaf(&out->leaves[index], l1, l2) )
+ {
+ out->leaves[index].leaf = l1->leaf;
+ out->leaves[index].subleaf = l1->subleaf;
+ index++;
+ }
+ }
+ nr_leaves = index;
+
+ index = 0;
+ for ( i = 0; i < p1_nr_entries; i++ )
+ {
+ xen_msr_entry_t *l1 = &p1->entries[i];
+ xen_msr_entry_t *l2 = find_entry(p2->entries, p2_nr_entries, l1->idx);
+
+ if ( !l2 )
+ continue;
+
+ out->entries[index].idx = l1->idx;
+ out->entries[index].val = level_msr(l1->idx, l1->val, l2->val);
+ index++;
+ }
+ nr_msrs = index;
+
+ rc = deserialize_policy(xch, out, nr_leaves, nr_msrs);
+ if ( rc )
+ {
+ errno = -rc;
+ rc = -1;
+ }
+
+ return rc;
+}
diff --git a/tools/libs/light/libxl_internal.h
b/tools/libs/light/libxl_internal.h
index 44a2f3c8fe3..5709bcb93fa 100644
--- a/tools/libs/light/libxl_internal.h
+++ b/tools/libs/light/libxl_internal.h
@@ -126,8 +126,6 @@
#define PVSHIM_CMDLINE "pv-shim console=xen,pv"
/* Size macros. */
-#define __AC(X,Y) (X##Y)
-#define _AC(X,Y) __AC(X,Y)
#define MB(_mb) (_AC(_mb, ULL) << 20)
#define GB(_gb) (_AC(_gb, ULL) << 30)
--
2.30.1
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |