kvm.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: Sean Christopherson <seanjc@google.com>
To: Jim Mattson <jmattson@google.com>
Cc: Ravi Bangoria <ravi.bangoria@amd.com>,
	tglx@linutronix.de, mingo@redhat.com,  bp@alien8.de,
	dave.hansen@linux.intel.com, pbonzini@redhat.com,
	 thomas.lendacky@amd.com, hpa@zytor.com,
	rmk+kernel@armlinux.org.uk,  peterz@infradead.org,
	james.morse@arm.com, lukas.bulwahn@gmail.com,
	 arjan@linux.intel.com, j.granados@samsung.com,
	sibs@chinatelecom.cn,  nik.borisov@suse.com,
	michael.roth@amd.com, nikunj.dadhania@amd.com,
	 babu.moger@amd.com, x86@kernel.org, kvm@vger.kernel.org,
	 linux-kernel@vger.kernel.org, santosh.shukla@amd.com,
	ananth.narayan@amd.com,  sandipan.das@amd.com,
	manali.shukla@amd.com
Subject: Re: [PATCH 3/3] KVM SVM: Add Bus Lock Detect support
Date: Wed, 10 Jul 2024 06:52:18 -0700	[thread overview]
Message-ID: <Zo6RxnGJrxh9mi7g@google.com> (raw)
In-Reply-To: <CALMp9eRet6+v8Y1Q-i6mqPm4hUow_kJNhmVHfOV8tMfuSS=tVg@mail.gmail.com>

On Tue, Jul 09, 2024, Jim Mattson wrote:
> On Tue, Jul 9, 2024 at 7:25 PM Ravi Bangoria <ravi.bangoria@amd.com> wrote:
> >
> > Sean,
> >
> > Apologies for the delay. I was waiting for Bus Lock Threshold patches to be
> > posted upstream:
> >
> >   https://lore.kernel.org/r/20240709175145.9986-1-manali.shukla@amd.com
> >
> > On 12-Jun-24 7:12 AM, Sean Christopherson wrote:
> > > On Wed, Jun 05, 2024, Ravi Bangoria wrote:
> > >> On 6/5/2024 8:38 PM, Sean Christopherson wrote:
> > >>> Some of the problems on Intel were due to the awful FMS-based feature detection,
> > >>> but those weren't the only hiccups.  E.g. IIRC, we never sorted out what should
> > >>> happen if both the host and guest want bus-lock #DBs.
> > >>
> > >> I've to check about vcpu->guest_debug part, but keeping that aside, host and
> > >> guest can use Bus Lock Detect in parallel because, DEBUG_CTL MSR and DR6
> > >> register are save/restored in VMCB, hardware cause a VMEXIT_EXCEPTION_1 for
> > >> guest #DB(when intercepted) and hardware raises #DB on host when it's for the
> > >> host.
> > >
> > > I'm talking about the case where the host wants to do something in response to
> > > bus locks that occurred in the guest.  E.g. if the host is taking punitive action,
> > > say by stalling the vCPU, then the guest kernel could bypass that behavior by
> > > enabling bus lock detect itself.
> > >
> > > Maybe it's moot point in practice, since it sounds like Bus Lock Threshold will
> > > be available at the same time.
> > >
> > > Ugh, and if we wanted to let the host handle guest-induced #DBs, we'd need code
> > > to keep Bus Lock Detect enabled in the guest since it resides in DEBUG_CTL.  Bah.
> > >
> > > So I guess if the vcpu->guest_debug part is fairly straightforward, it probably
> > > makes to virtualize Bus Lock Detect because the only reason not to virtualize it
> > > would actually require more work/code in KVM.
> >
> > KVM forwards #DB to Qemu when vcpu->guest_debug is set and it's Qemu's
> > responsibility to re-inject exception when Bus Lock Trap is enabled
> > inside the guest. I realized that it is broken so I've prepared a
> > Qemu patch, embedding it at the end.
> >
> > > I'd still love to see Bus Lock Threshold support sooner than later though :-)
> >
> > With Bus Lock Threshold enabled, I assume the changes introduced by this
> > patch plus Qemu fix are sufficient to support Bus Lock Trap inside the
> > guest?
> 
> In any case, it seems that commit 76ea438b4afc ("KVM: X86: Expose bus
> lock debug exception to guest") prematurely advertised the presence of
> X86_FEATURE_BUS_LOCK to userspace on non-Intel platforms. We should
> probably either accept these changes or fix up that commit. Either
> way, something should be done for all active branches back to v5.15.

Drat.  Yeah, we need a patch to clear BUS_LOCK_DETECT in svm_set_cpu_caps(), marked
for stable@.  Then this series can remove that clearing.

At least I caught it for CET[*]!  It'd be nice to not have to rely on humans to
detect potential issues like this, but I can't think of a way to programmatically
handle this situation without incurring an annoying amount of overhead and/or
duplicate code between VMX and SVM.

[*] https://lore.kernel.org/all/ZjLRnisdUgeYgg8i@google.com


  reply	other threads:[~2024-07-10 13:52 UTC|newest]

Thread overview: 19+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-04-29  6:06 [PATCH 0/3] x86/cpu: Add Bus Lock Detect support for AMD Ravi Bangoria
2024-04-29  6:06 ` [PATCH 1/3] x86/split_lock: Move Split and Bus lock code to a dedicated file Ravi Bangoria
2024-05-06 12:58   ` Borislav Petkov
2024-05-07  4:07     ` Ravi Bangoria
2024-04-29  6:06 ` [PATCH 2/3] x86/bus_lock: Add support for AMD Ravi Bangoria
2024-05-06 16:05   ` Tom Lendacky
2024-05-07  4:08     ` Ravi Bangoria
2024-05-06 16:24   ` Jim Mattson
2024-05-07  3:57     ` Ravi Bangoria
2024-04-29  6:06 ` [PATCH 3/3] KVM SVM: Add Bus Lock Detect support Ravi Bangoria
2024-06-04  0:45   ` Sean Christopherson
2024-06-05 11:38     ` Ravi Bangoria
2024-06-05 15:08       ` Sean Christopherson
2024-06-05 16:14         ` Ravi Bangoria
2024-06-12  1:42           ` Sean Christopherson
2024-07-10  2:25             ` Ravi Bangoria
2024-07-10  4:15               ` Jim Mattson
2024-07-10 13:52                 ` Sean Christopherson [this message]
2024-07-11  8:51                   ` Ravi Bangoria

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=Zo6RxnGJrxh9mi7g@google.com \
    --to=seanjc@google.com \
    --cc=ananth.narayan@amd.com \
    --cc=arjan@linux.intel.com \
    --cc=babu.moger@amd.com \
    --cc=bp@alien8.de \
    --cc=dave.hansen@linux.intel.com \
    --cc=hpa@zytor.com \
    --cc=j.granados@samsung.com \
    --cc=james.morse@arm.com \
    --cc=jmattson@google.com \
    --cc=kvm@vger.kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=lukas.bulwahn@gmail.com \
    --cc=manali.shukla@amd.com \
    --cc=michael.roth@amd.com \
    --cc=mingo@redhat.com \
    --cc=nik.borisov@suse.com \
    --cc=nikunj.dadhania@amd.com \
    --cc=pbonzini@redhat.com \
    --cc=peterz@infradead.org \
    --cc=ravi.bangoria@amd.com \
    --cc=rmk+kernel@armlinux.org.uk \
    --cc=sandipan.das@amd.com \
    --cc=santosh.shukla@amd.com \
    --cc=sibs@chinatelecom.cn \
    --cc=tglx@linutronix.de \
    --cc=thomas.lendacky@amd.com \
    --cc=x86@kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).