[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2] x86/amd: do not expose HWCR.TscFreqSel to guests


  • To: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Thu, 14 Sep 2023 15:16:40 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=P0p/Dk2DcL9FWyyySG3xslDv5FAY0u93sukfF6dDUBY=; b=Iu/D+mNQ+eG8jtRniAbPKsyb+zPkYs6jqfuKAUHFKn7t2h1MA84G9w3l77LvBz1LTqulva6UX4SMXyF2y/3jrfJUNf5zjq3eZLXkQngueAhcJkpgx2a1caYDljqiRE83y0ki3WVfQpXeHfv2mQPn7kWj56ZO2Iqv9Ay9dgJRZZmRjkCjN/bpJNmwH03mY4VT7YLvLHuJvBzbF0sRc5iYHSxTsOoFEWvD6IyddB56ZfwvbgTHvvYtmOW7oBqGBn+VOqiATxy/Seua3ed60NhPKbNvFItuO1j4KiruGnTcIqGuDevipJvRfZrbdLzZt6agCkWtJrWTK+mx2xuaUqssEg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m6KayIP37OtNpUOq6NVdew0silm5dPN0mpOsEbLw/iFt0ygXv6xzm8DPnOABIPgg47vgu4eB4VQA/MjiiyZ0JLSwy/inE0GYBV1eUuhCWeFegWLmZs+ElcrOi86qSHah713jWDzAVzXgMfHMIhZrfNHVv9y9huJ3RUuzg0hZEqw84Otpa/WjtfeP0Y962aGf24/4hoZ/lqmE+Cbc9Td7TTkH3aOHpgbAtKGw4aO9z6C4o32R4xtLzVJZp5V+azQbyNAsaHSdu+P5xrAQYGDVzSqhn3zp/Nj1R5oU03t7I3/mUmqcAQo0N3FWKyamAxiRoMXvzqN6S/lF/L/ZuieJBw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Solène Rapenne <solene@xxxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Thu, 14 Sep 2023 13:16:49 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 14.09.2023 14:57, Roger Pau Monné wrote:
> On Thu, Sep 14, 2023 at 02:49:45PM +0200, Jan Beulich wrote:
>> On 14.09.2023 14:37, Roger Pau Monné wrote:
>>> On Thu, Sep 14, 2023 at 07:52:33AM +0200, Jan Beulich wrote:
>>>> On 13.09.2023 16:52, Roger Pau Monne wrote:
>>>>> OpenBSD 7.3 will unconditionally access HWCR if the TSC is reported as
>>>>> Invariant, and it will then attempt to also unconditionally access 
>>>>> PSTATE0 if
>>>>> HWCR.TscFreqSel is set (currently the case on Xen).
>>>>>
>>>>> The relation between HWCR.TscFreqSel and PSTATE0 is not clearly written 
>>>>> down in
>>>>> the PPR, but it's natural for OSes to attempt to fetch the P0 frequency 
>>>>> if the
>>>>> TSC increments at the P0 frequency.
>>>>>
>>>>> Exposing PSTATEn (PSTATE0 at least) with all zeroes is not a suitable 
>>>>> solution
>>>>> because the PstateEn bit is read-write, and OSes could legitimately 
>>>>> attempt to
>>>>> set PstateEn=1 which Xen couldn't handle.
>>>>>
>>>>> In order to fix expose an empty HWCR, which is an architectural MSR and 
>>>>> so must
>>>>> be accessible.
>>>>>
>>>>> Note it was not safe to expose the TscFreqSel bit because it is not
>>>>> architectural, and could change meaning between models.
>>>>
>>>> This imo wants (or even needs) extending to address the aspect of then
>>>> exposing, on newer families, a r/o bit with the wrong value.
>>>
>>> We could always be exposing bits with the wrong values on newer
>>> (unreleased?) families, I'm not sure why it needs explicit mentioning
>>> here.
>>
>> Hmm, yes, that's one way to look at things. Yet exposing plain zero is
>> pretty clearly not within spec here,
> 
> As I understand it, the fact that HWCR.TscFreqSel is read-only doesn't
> exclude the possibility of it changing using other means (iow: we
> should consider that a write to a different register could have the
> side effect of toggling the bit).
> 
> The PPR I'm reading doesn't mention that the bit must be 1, just that
> it's 1 on reset and read-only.

Sure; the PPR being incomplete doesn't help here. My interpretation, based
on the bit having been r/w in earlier families, is that AMD wanted to retain
its meaning without allowing it to be configurable anymore. Possibly a sign
of it remaining so going forward.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.