[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 3/3] x86: Use CpuidUserDis if an AMD HVM guest toggles CPUID faulting


  • To: Jan Beulich <jbeulich@xxxxxxxx>, Alejandro Vallejo <alejandro.vallejo@xxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Tue, 9 May 2023 11:05:33 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=NbnVfteE5M1tOHc/qDAEDGwPiaan2F6G/eKjEWPY47Y=; b=li/eccHX51rNtCJoAzt3EIy5oYcpeEacA4YiQ0Aq49wLB1F4lT39NpBd9xTg5vBzWAs3nfoLmuNKSQkYZd/lHKA5lEIou9FcpIMaamwMmuibGMXbjKcetdULNLiSA/OMTJ5LW7CtlJxcavoKZk9kR1efaVPE2JJxZl04InLj1ID6vE25p+nc75KEbzF7cRlMKMwAWK/LcqXRUWFpDVVrxEoI0IKCBlxcsoXptDkKD5oRA9a3XSHZFvebOdhbrhNVChl7xrr1awf5l2nwRNDQRF88BxKFG1aeaZf8woMS/DQGe/ia14Hh6Gx5xfROS8v0TAtt5KrPA0Eqk4DaHVzZfQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hJm5WPOVZ/co4GakWWtgHILjhIA3dZZqqfQu5GJkJHRNV8AjOERFjL2eapsODmRjWrG6oo6GwWvtCiLsZot389iSFc8uSgodycF9U+nqhXXo0GYOcsyHtxQq9ktT2q6/K6d3LWKbVolJK1gfH0J5a7NonnDhGcbp8R+2Pr0xxvhQqkGkYYNHs/Fd3wHhffwIFeB8sFwZXhnIq0qSzjvQb53CvUXVgjc5LAYg3sXt8hBKfiBg5XKFxKXK4b6b4qtQdP8mV/egdJCzkiXM+uBq495OoKH3zf6CZOMIL+weapwyvNo2Mfyj/NEwstPrlvqvYz2zzxXDWIS8nNynbEp7tg==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 09 May 2023 10:06:01 +0000
  • Ironport-data: A9a23:vUG01aBzWTIHORVW/+niw5YqxClBgxIJ4kV8jS/XYbTApGsk0jMDz DBOWDyDMqqKYGfwL9h0YI+08UgE7MLQx4VlQQY4rX1jcSlH+JHPbTi7wuUcHAvJd5GeExg3h yk6QoOdRCzhZiaE/n9BCpC48T8nk/nOHuGmYAL9EngZbRd+Tys8gg5Ulec8g4p56fC0GArIs t7pyyHlEAbNNwVcbyRFuspvlDs15K6p4G5A7wRnDRx2lAS2e0c9Xcp3yZ6ZdxMUcqEMdsamS uDKyq2O/2+x13/B3fv8z94X2mVTKlLjFVDmZkh+AsBOsTAbzsAG6Y4pNeJ0VKtio27hc+ada jl6ncfYpQ8BZsUgkQmGOvVSO3kW0aZuoNcrLZUj2CA6IoKvn3bEmp1T4E8K0YIw48EmAGNUr PskOG4dMC6P2POQ/Y/mVbw57igjBJGD0II3nFhFlGucJ9B2BJfJTuPN+MNS2yo2ioZWB/HCa sEFaD1pKhPdfxlIPVRRA5U79AuqriCnL3sE9xTI+OxuvDK7IA9ZidABNPL8fNCQSNoTtUGfv m/cpEzyAw0ANczZwj2Amp6prraXzXirBd5LTtVU8NYpi16R/TcLNycXdkCCu8e0gVSdS+1mf hl8Fi0G6PJaGFaQZtv3UgC8oXWElgUBQNcWGOo/gCmEzqfW6gCVHG9CUDdFbNEks+c9QTs32 hmCmNaBLSNrmK2YTzSa7Lj8hSO/P20ZIHEPYQcATBAZ+J/zrYcrlBXNQ91/VqmvgbXI9SrYx jmLqG00geUVhMtSjaGjpwmY2XSru4TDSRMz6kPPRGW54whlZYmjIYu19Vzc6vUGJ4GcJrWcg EU5dwGlxLhmJfmweOalGo3hwJnBCy65DQDh
  • Ironport-hdrordr: A9a23:3+HpcqyLPGCGSgX3dZLSKrPwT71zdoMgy1knxilNoH1uEvBw8v rEoB1173LJYVoqMk3I+urgBED/exzhHPdOiOEs1NyZMDUO1lHHEL1f
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 08/05/2023 2:18 pm, Jan Beulich wrote:
> On 05.05.2023 19:57, Alejandro Vallejo wrote:
>> This is in order to aid guests of AMD hardware that we have exposed
>> CPUID faulting to. If they try to modify the Intel MSR that enables
>> the feature, trigger levelling so AMD's version of it (CpuidUserDis)
>> is used instead.
>>
>> Signed-off-by: Alejandro Vallejo <alejandro.vallejo@xxxxxxxxx>
>> ---
>>  xen/arch/x86/msr.c | 9 ++++++++-
>>  1 file changed, 8 insertions(+), 1 deletion(-)
> Don't you also need to update cpu-policy.c:calculate_host_policy()
> for the guest to actually know it can use the functionality? Which
> in turn would appear to require some form of adjustment to
> lib/x86/policy.c:x86_cpu_policies_are_compatible().

I asked Alejandro to do it like this.

Advertising this to guests requires plumbing another MSR into the
infrastructure which isn't quite set up properly let, and is in flux
from my work.

For now, this just lets Xen enforce the policy over PV guests, which is
an improvement in and of itself.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.