[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 for-4.15] x86/msr: introduce an option for HVM relaxed rdmsr behavior


  • To: Ian Jackson <iwj@xxxxxxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Thu, 4 Mar 2021 17:55:32 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/5SmDKXuVn7S3cH1SIFYf2ARGTPUYV/bVlvugpYHpXI=; b=bg8t7k6qHCVqF0RPiHrQUaaIX8Qzv04+a/3BZcpBioORG4ZbfhTxcXvAd9xQGIKumATnpfCdP85/mhzrU/7NB6dOzaMPlRfjHEcwbL+I6/t0sCUNU//dUk9zcg2ea95nM2ra3j2A6iFp2HSRatJXhWm1Jccts2aWsYmj1kM8MzofuK0oEHFkyrLBCC1UCTLFOiOaNNgYZeTNJTMHI1wv2/v/FrXk4MLIXw+tUWaKho3C4669feXtPrPC99CYLwwKqNN/FXtgcAuCwZa0OEdOqwCR2P3wl25MFjC7gWCHCO+BU32seXczYTT9vXGxUVR2PtW6gKqJAyJX7Y0wR9mvrQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kWfWaqOf/8BLfbDQPtkRd3dzh3I4Uav8u77BtLZ857mNqMtwHcSDuhlSTIgwFhGcjzEVdyYkH6ypMN0jBsoP7Y4NKY9Uipxt5MRzSfIka9+YEzOYoNjC2mH4f92q45+HtHIKDCfCp8GsfVGUnAwuAsgH15cT+/wSeKJ/1qRqVTcL+L8GjI9IMq5iUVlJFvXVfj0lj//quHTS6Hdvu5iofmWGKiZYYskKraq041dlHLebU3jeYQpht/pTmENGRyk3N9ZBXJQ53yoHi1A6e4UGMwEs86XG81SL9yVgQgiclewAenmucmpqTRtR5vnZMeCYha3qUt+T0yKUCikgioxc7A==
  • Authentication-results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, "Kevin Tian" <kevin.tian@xxxxxxxxx>, Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Delivery-date: Thu, 04 Mar 2021 16:56:15 +0000
  • Ironport-sdr: G3EsBo57MsW2HtMflzQ1AWWegbfShFRTctUHojlO49MqfQDwI+COPZqd29dyyYpO7LOChiRpIf 4dpVLaqbB5dGgJ/6qZ0ulckvLGI1o4EV2RQhfBonGIhYUNXQBi/kTa9IIVQEFuysCWxX1LZSB5 Atp0BFVkrVLF/+wco+CMyxzDAvlBRNNi3epB1Q6YECU0i9ioGpfrCVAG/ozZapyS+acN+GVLfa xjbRQ7mDT2Lz3+kWRs3IDsJMUAOFpdHebslKGJHhnd2mgMLLcsygnQmhNEoNtHYVMqIBgHkLc4 Wic=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Thu, Mar 04, 2021 at 03:20:34PM +0000, Ian Jackson wrote:
> Roger Pau Monné writes ("Re: [PATCH v2 for-4.15] x86/msr: introduce an option 
> for HVM relaxed rdmsr behavior"):
> > On Thu, Mar 04, 2021 at 02:59:38PM +0000, Ian Jackson wrote:
> > > I think it's almost as bad to have guests which can be migrated in,
> > > but which then cannot reboot.
> > 
> > Ups, yes, right.
> > 
> > > Historically we have taken the view that new Xen must support old
> > > guests, even if that means being bug-compatible.  So I am strongly in
> > > favour of avoiding such a usability regression.
> > 
> > I'm not a xl/libxl expert, but couldn't we set the option in a
> > persistent way for migrated-in guests?
> > 
> > IIRC at domain creation libxl knows whether it's a restore or a fresh
> > domain, and hence we could set the option there?
> > 
> > The part I'm not sure is about how to make it persistent.
> 
> The guest could be stopped with xl shutdown and then recrated with xl
> create, from the config file.  I don't think we want to break that use
> case here either.

So my original approach was to actually risk breaking creation from
config file and require the user to set the rdmsr_relaxed option, and
report the problem upstream. I think ideally we would like to get to a
point where we could drop the rdmsr_relaxed option, but maybe that's
too optimistic.

We have done quite a lot of testing of this new policy, but obviously
it's not possible to test all possible guest OSes. Forcing the new
policy by default might be too risky, so indeed falling back to
enabling this by default could be the only solution.

The main downside of enabling by default is that then we have to
resign to always having this kind of quirky behavior for MSR
accesses as the default.

Thanks, Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.