All of lore.kernel.org
 help / color / mirror / Atom feed
From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Shuai Ruan <shuai.ruan@linux.intel.com>
Cc: kevin.tian@intel.com, wei.liu2@citrix.com,
	Ian.Campbell@citrix.com, stefano.stabellini@eu.citrix.com,
	jun.nakajima@intel.com, ian.jackson@eu.citrix.com,
	eddie.dong@intel.com, xen-devel@lists.xen.org, jbeulich@suse.com,
	keir@xen.org
Subject: Re: [PATCH V3 3/6] x86/xsaves: enable xsaves/xrstors for hvm guest
Date: Fri, 7 Aug 2015 14:04:51 +0100	[thread overview]
Message-ID: <55C4ACF3.1080509@citrix.com> (raw)
In-Reply-To: <20150807082244.GB2976@shuai.ruan@linux.intel.com>

On 07/08/15 09:22, Shuai Ruan wrote:
>
>>>  void hvm_cpuid(unsigned int input, unsigned int *eax, unsigned int *ebx,
>>>                                     unsigned int *ecx, unsigned int *edx)
>>>  {
>>> @@ -4456,6 +4460,34 @@ void hvm_cpuid(unsigned int input, unsigned int *eax, unsigned int *ebx,
>>>                      *ebx = _eax + _ebx;
>>>              }
>>>          }
>>> +        if ( count == 1 )
>>> +        {
>>> +            if ( cpu_has_xsaves )
>>> +            {
>>> +                *ebx = XSTATE_AREA_MIN_SIZE;
>>> +                if ( v->arch.xcr0 | v->arch.msr_ia32_xss )
>>> +                    for ( sub_leaf = 2; sub_leaf < 63; sub_leaf++ )
>>> +                    {
>>> +                        if ( !((v->arch.xcr0 | v->arch.msr_ia32_xss)
>>> +			   & (1ULL << sub_leaf)) )
>>> +                            continue;
>>> +                        domain_cpuid(d, input, sub_leaf, &_eax, &_ebx, &_ecx,
>>> +                                     &_edx);
>>> +                        *ebx =  *ebx + _eax;
>>> +                    }
>>> +            }
>>> +            else
>>> +            {
>>> +                *eax &= ~XSAVES;
>>> +                *ebx = *ecx = *edx = 0;
>>> +            }
>>> +            if ( !cpu_has_xgetbv1 )
>>> +                *eax &= ~XGETBV1;
>>> +            if ( !cpu_has_xsavec )
>>> +                *eax &= ~XSAVEC;
>>> +            if ( !cpu_has_xsaveopt )
>>> +                *eax &= ~XSAVEOPT;
>>> +        }
>> Urgh - I really need to get domain cpuid fixed in Xen.  This is
>> currently making a very bad situation a little worse.
>>
> In patch 4, I expose the xsaves/xsavec/xsaveopt and need to check
> whether the hardware supoort it. What's your suggestion about this?

Calling into domain_cpuid() in the loop is not useful as nothing will
set the subleaves up.  As a first pass, reading from
xstate_{offsets,sizes} will be better than nothing, as it will at least
match reality until the domain is migrated.

Longterm, I plan to overhaul the cpuid infrastructure to allow it to
properly represent per-core and per-package data, as well as move it
into the Xen architectural migration state, to avoid any host specific
values leaking into guest state.  This however is also a lot of work,
which you don't want to dependent on.

>
>>>  static int construct_vmcs(struct vcpu *v)
>>>  {
>>>      struct domain *d = v->domain;
>>> @@ -1204,6 +1206,9 @@ static int construct_vmcs(struct vcpu *v)
>>>          __vmwrite(GUEST_PAT, guest_pat);
>>>      }
>>>  
>>> +    if ( cpu_has_vmx_xsaves )
>>> +        __vmwrite(XSS_EXIT_BITMAP, VMX_XSS_EXIT_BITMAP);
>>> +
>>>      vmx_vmcs_exit(v);
>>>  
>>>      /* PVH: paging mode is updated by arch_set_info_guest(). */
>>> diff --git a/xen/arch/x86/hvm/vmx/vmx.c b/xen/arch/x86/hvm/vmx/vmx.c
>>> index d3183a8..64ff63b 100644
>>> --- a/xen/arch/x86/hvm/vmx/vmx.c
>>> +++ b/xen/arch/x86/hvm/vmx/vmx.c
>>> @@ -2708,6 +2708,16 @@ static int vmx_handle_apic_write(void)
>>>      return vlapic_apicv_write(current, exit_qualification & 0xfff);
>>>  }
>>>  
>>> +static void vmx_handle_xsaves(void)
>>> +{
>>> +    WARN();
>>> +}
>>> +
>>> +static void vmx_handle_xrstors(void)
>>> +{
>>> +    WARN();
>>> +}
>>> +
>> What is these supposed to do?  They are not an appropriate handlers.
>>
> These two handlers do nothing here. Perform xsaves in HVM guest will 
> not trap in hypersior in this patch (by setting XSS_EXIT_BITMAP zero). 
> However it may trap in the future. See SDM Volume 3 Section 25.1.3 
> for detail information.

in which case use domain_crash().  WARN() here will allow a guest to DoS
Xen.

~Andrew

  parent reply	other threads:[~2015-08-07 13:04 UTC|newest]

Thread overview: 27+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-08-05  1:57 [PATCH V3 0/6] add xsaves/xrstors support Shuai Ruan
2015-08-05  1:57 ` [PATCH V3 1/6] x86/xsaves: enable xsaves/xrstors for pv guest Shuai Ruan
2015-08-05 17:51   ` Andrew Cooper
2015-08-07  8:00     ` Shuai Ruan
     [not found]     ` <20150807080008.GA2976@shuai.ruan@linux.intel.com>
2015-08-07 12:44       ` Andrew Cooper
2015-08-11  7:50         ` Shuai Ruan
     [not found]         ` <20150811075039.GA14406@shuai.ruan@linux.intel.com>
2015-08-11 10:24           ` Andrew Cooper
2015-08-12  3:01             ` Shuai Ruan
2015-08-05  1:57 ` [PATCH V3 2/6] x86/xsaves: enable xsaves/xrstors in xen Shuai Ruan
2015-08-05 17:57   ` Andrew Cooper
2015-08-05  1:57 ` [PATCH V3 3/6] x86/xsaves: enable xsaves/xrstors for hvm guest Shuai Ruan
2015-08-05 18:17   ` Andrew Cooper
2015-08-07  8:22     ` Shuai Ruan
     [not found]     ` <20150807082244.GB2976@shuai.ruan@linux.intel.com>
2015-08-07 13:04       ` Andrew Cooper [this message]
2015-08-11  7:59         ` Shuai Ruan
     [not found]         ` <20150811075909.GB14406@shuai.ruan@linux.intel.com>
2015-08-11  9:37           ` Andrew Cooper
2015-08-12 11:17             ` Shuai Ruan
2015-08-05  1:57 ` [PATCH V3 4/6] libxc: expose xsaves/xgetbv1/xsavec to " Shuai Ruan
2015-08-05  8:37   ` Ian Campbell
2015-08-07  8:23     ` Shuai Ruan
2015-08-05  1:57 ` [PATCH V3 5/6] x86/xsaves: support compact format for hvm save/restore Shuai Ruan
2015-08-05 18:45   ` Andrew Cooper
     [not found]     ` <20150811080143.GC14406@shuai.ruan@linux.intel.com>
2015-08-11  9:27       ` Andrew Cooper
2015-08-12 11:23         ` Shuai Ruan
2015-08-05  1:57 ` [PATCH V3 6/6] x86/xsaves: detect xsaves/xgetbv1 in xen Shuai Ruan
2015-08-05 16:38 ` [PATCH V3 0/6] add xsaves/xrstors support Andrew Cooper
2015-08-07  8:25   ` Shuai Ruan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55C4ACF3.1080509@citrix.com \
    --to=andrew.cooper3@citrix.com \
    --cc=Ian.Campbell@citrix.com \
    --cc=eddie.dong@intel.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=jbeulich@suse.com \
    --cc=jun.nakajima@intel.com \
    --cc=keir@xen.org \
    --cc=kevin.tian@intel.com \
    --cc=shuai.ruan@linux.intel.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.