[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [PATCH v3 1/3] x86/vmx: implement VMExit based guest Bus Lock detection
- To: Pau Monné, Roger <roger.pau@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- From: "Tian, Kevin" <kevin.tian@xxxxxxxxx>
- Date: Tue, 19 Jul 2022 07:26:08 +0000
- Accept-language: en-US
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=avsFE9lFn77Cqu+w62BqJM80TUs4u6jb51ngpyX/usQ=; b=hlaO9yNdXn3bWZZRE8eZw5Hct4mjwpIJEII2OuWM8XCqXyDc/xfu8TtDZUCVZk99AyrDTJC57iSMqZuuCYVDhyeOZCmCtzC3J5HhU6sUQb3w+sxIeYyfugrLgfKgpCS8rfYFK/yhBsTf0CmdE4+jotyc1CUu8TFGiOrr+hbn8Eub8XVhIXIdyOyXvdDzpq8DwZuGu9V7csOe4VcvBG8qHnJwwoC/yvfSp69Z9JSg6EF4n085fXex9qfXH/q9KH6gsigSbrXdX/lERjtPnUL9Dp8BP54UeYW3nhsYad7Ruw6GO/21N6KBQON539KtwloFUcCdZ6lTlFbne3U5alNYPA==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XWdLm7ysOTWfb0BUPfG237GTjVguV+ScUhjuFwQZGO85fpF88BKo3rLAk5HIRYGd8W48StUyJshyShuYvpdUY0apzaXh03PLDjGKjipURUdUXSTRXcWAKMCchiDjCQpfD7GrxSFZH9OU93cng9c3aEXlDC/TBtlCirecU9n8fibQIf58OCtZEgmoCe+G0Ld+G5aZu1FGVBCATghaLdpHs5QZOhg1pxCDF+KFEREdzOifKmzfB1kNBxVOUO9iOoWswt8PwLSRPKf5p2XEpa7n02oka9cGnw9CzxeBfmTm2uMtSE9nTvBW5v6YOFF+kQsORZiVCpaQltSB40G0ENUmnA==
- Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com;
- Cc: Pau Monné, Roger <roger.pau@xxxxxxxxxx>, "Nakajima, Jun" <jun.nakajima@xxxxxxxxx>, "Beulich, Jan" <JBeulich@xxxxxxxx>, "Cooper, Andrew" <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>
- Delivery-date: Tue, 19 Jul 2022 07:26:41 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
- Thread-index: AQHYjUzyisX0+ExRGkiFh4Bp+KXF1a2FZhTg
- Thread-topic: [PATCH v3 1/3] x86/vmx: implement VMExit based guest Bus Lock detection
> From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
> Sent: Friday, July 1, 2022 9:17 PM
>
> @@ -4065,6 +4065,11 @@ void vmx_vmexit_handler(struct cpu_user_regs
> *regs)
>
> if ( unlikely(exit_reason & VMX_EXIT_REASONS_FAILED_VMENTRY) )
> return vmx_failed_vmentry(exit_reason, regs);
Add a blank line.
> + if ( unlikely(exit_reason & VMX_EXIT_REASONS_BUS_LOCK) )
> + {
> + perfc_incr(buslock);
> + exit_reason &= ~VMX_EXIT_REASONS_BUS_LOCK;
> + }
>
> if ( v->arch.hvm.vmx.vmx_realmode )
> {
> @@ -4561,6 +4566,15 @@ void vmx_vmexit_handler(struct cpu_user_regs
> *regs)
> vmx_handle_descriptor_access(exit_reason);
> break;
>
> + case EXIT_REASON_BUS_LOCK:
> + /*
> + * Nothing to do: just taking a vmexit should be enough of a pause to
> + * prevent a VM from crippling the host with bus locks. Note
> + * EXIT_REASON_BUS_LOCK will always have bit 26 set in exit_reason,
> and
> + * hence the perf counter is already increased.
> + */
> + break;
> +
Would it be helpful from diagnostic angle by throwing out a warning,
once per the culprit domain?
|