[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

RE: [PATCH v3 1/3] x86/vmx: implement VMExit based guest Bus Lock detection


  • To: Pau Monné, Roger <roger.pau@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
  • Date: Tue, 19 Jul 2022 07:26:08 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=avsFE9lFn77Cqu+w62BqJM80TUs4u6jb51ngpyX/usQ=; b=hlaO9yNdXn3bWZZRE8eZw5Hct4mjwpIJEII2OuWM8XCqXyDc/xfu8TtDZUCVZk99AyrDTJC57iSMqZuuCYVDhyeOZCmCtzC3J5HhU6sUQb3w+sxIeYyfugrLgfKgpCS8rfYFK/yhBsTf0CmdE4+jotyc1CUu8TFGiOrr+hbn8Eub8XVhIXIdyOyXvdDzpq8DwZuGu9V7csOe4VcvBG8qHnJwwoC/yvfSp69Z9JSg6EF4n085fXex9qfXH/q9KH6gsigSbrXdX/lERjtPnUL9Dp8BP54UeYW3nhsYad7Ruw6GO/21N6KBQON539KtwloFUcCdZ6lTlFbne3U5alNYPA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XWdLm7ysOTWfb0BUPfG237GTjVguV+ScUhjuFwQZGO85fpF88BKo3rLAk5HIRYGd8W48StUyJshyShuYvpdUY0apzaXh03PLDjGKjipURUdUXSTRXcWAKMCchiDjCQpfD7GrxSFZH9OU93cng9c3aEXlDC/TBtlCirecU9n8fibQIf58OCtZEgmoCe+G0Ld+G5aZu1FGVBCATghaLdpHs5QZOhg1pxCDF+KFEREdzOifKmzfB1kNBxVOUO9iOoWswt8PwLSRPKf5p2XEpa7n02oka9cGnw9CzxeBfmTm2uMtSE9nTvBW5v6YOFF+kQsORZiVCpaQltSB40G0ENUmnA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
  • Cc: Pau Monné, Roger <roger.pau@xxxxxxxxxx>, "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>, "Beulich, Jan" <JBeulich@xxxxxxxx>, "Cooper, Andrew" <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>
  • Delivery-date: Tue, 19 Jul 2022 07:26:41 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHYjUzyisX0+ExRGkiFh4Bp+KXF1a2FZhTg
  • Thread-topic: [PATCH v3 1/3] x86/vmx: implement VMExit based guest Bus Lock detection

> From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
> Sent: Friday, July 1, 2022 9:17 PM
> 
> @@ -4065,6 +4065,11 @@ void vmx_vmexit_handler(struct cpu_user_regs
> *regs)
> 
>      if ( unlikely(exit_reason & VMX_EXIT_REASONS_FAILED_VMENTRY) )
>          return vmx_failed_vmentry(exit_reason, regs);

Add a blank line.

> +    if ( unlikely(exit_reason & VMX_EXIT_REASONS_BUS_LOCK) )
> +    {
> +        perfc_incr(buslock);
> +        exit_reason &= ~VMX_EXIT_REASONS_BUS_LOCK;
> +    }
> 
>      if ( v->arch.hvm.vmx.vmx_realmode )
>      {
> @@ -4561,6 +4566,15 @@ void vmx_vmexit_handler(struct cpu_user_regs
> *regs)
>          vmx_handle_descriptor_access(exit_reason);
>          break;
> 
> +    case EXIT_REASON_BUS_LOCK:
> +        /*
> +         * Nothing to do: just taking a vmexit should be enough of a pause to
> +         * prevent a VM from crippling the host with bus locks.  Note
> +         * EXIT_REASON_BUS_LOCK will always have bit 26 set in exit_reason,
> and
> +         * hence the perf counter is already increased.
> +         */
> +        break;
> +

Would it be helpful from diagnostic angle by throwing out a warning,
once per the culprit domain?

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.