[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 1/3] Revert "x86/msr: drop compatibility #GP handling in guest_{rd,wr}msr()"


  • To: Ian Jackson <iwj@xxxxxxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Wed, 17 Mar 2021 16:06:58 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hsOO55P4euXDpj9CtiLi0erl2aPxZQ6WCsK+nCPuPWw=; b=QAotuKIVKWz6DrbCrBBioi+pL+Ms6w38o2LhLOoIXsdFdMBtLEgCJrO5fLLkAPprHm1B+MiX+YXhYd6vJWUyw8EA4Jvf4mmJAiZ267vYmRr9A8YaOdgz5j/R1D5yQ5X4VZlyVLMRKgz+F0NWexBalboxeQz/WqEh5cQDRt2UAEyPlOSX31NlbBOeCczCK5MvBAuv1dXQ/2+WtM2Tp7JAuJD7NNfIk9oTS6hyloScyVHq4etQGrl8rxQOHBt66/0D+WGVP8WWfCNrNKwBRZJn/lG6KQeEavACTywgEsnJxZRog0Pn7vo9M/rLbdzJNBPtmBXrMhFSnJTSa4vkGbl/ig==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mlM2ym3KGO0CC3vngedBGvtkvUx9i8y46LYumqvkUH/XvAbSXJcmSgpXZ00Nfic38dgVZLdmvitzjICSUW9PQUl1oSSWCnzQTG/c1mwf6n74AqxGHiruk9H8WBAR3MRjaNwdagOZBXoA5TWsEJDePK7Eux/ynxXCq16v/VdI0fnbYMqjMWCx//JKEjrfbRggb5maS5CezNWpv0JznAkbL4DryqM076rIFR+hangAbIUKIq6neGQk85Rc8ptsv/4E0D5Pl5dU6OsDok+e3e8q7Jfx3VwAM2QdkHNLW0kpCJ36QVJhB2vguLUfIsD1knqlaMa0PfXXH5l24ove3ZESuw==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
  • Delivery-date: Wed, 17 Mar 2021 15:07:37 +0000
  • Ironport-hdrordr: A9a23:adv6WK8U8B2UnHEiE85uk+HWdb1zdoIgy1knxilNYDRIb8rdrd ykmPQHyBP44QxhP00Is9aGJaWGXDf4/Zl6/YEeMd6ZMjXOkm2uMY1k8M/e0yTtcheTysdx3b ptGpISNPTeFl5/5PyQ3CCZFJIazMCD4OSUg47lr0tFaSFPR+Ve4xxiCgCde3cfeCBjCYAiHJ SRouprzgDARV0tYs62BmYIUoH4zuHjr57obQULABQq8mC1/FCVwYTnGBuV1Ap2aUIq/Z4e8H PImwG8xqKvv+DT8G6460bv7o9bkNak991bBMbksLl2FhzQjG+TDrhJavmppzYuuti15FIrit XXghspMshp8VzQe3y4uhfh8Bnb3DEiwXnkzlOTnH35yPaJIg4SOo5kv8Z0YxHZ400vsJVZ3L hQ12yU87pMSTTMh03GiOTgZlVNjUS9pnowmfMSiXt/XYMSZKRKlJcS5k9PD5sMdRiKkbwaLA ==
  • Ironport-sdr: +Ih4W3uqsltdSwFX8LqTCdRL4YYtAUzOvPdTaNA2rHM4kE07YF7uOwOScB/gvGHBgF8RGP3Dj1 xsA8D8/1TtTnJV5pnnl0BaI02vvMNfl8tMAzjf+SfeEYED4nu4IOCk9IF4k9E2WN50yqQ9uS/I 7rzunycoJnClLkB1Hlt4eYIHNIF/ZWhRyKOX+NZck6DCYnT6s1bHFfvzos//VhufhcPpRYzwvl iOQ3IVCC7aCBTeR5ZKR/UWbBf1+19O4SUf9DNjqpST1+B5Fys+R4oF60IvGaJZ+W+Mni5Yg157 pZI=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed, Mar 17, 2021 at 02:46:20PM +0000, Ian Jackson wrote:
> Andrew Cooper writes ("Re: [PATCH 1/3] Revert "x86/msr: drop compatibility 
> #GP handling in guest_{rd,wr}msr()""):
> > On 17/03/2021 13:37, Ian Jackson wrote:
> > > AFAICT there is no explanation for why patches 1/ and 2/ deserve to go
> > > into 4.15.
> 
> I see now, rereading the thread, that there was a sentence about this
> in each patch betwen the commit message and the diff.  Sorry for
> missing that.  (Although TBH at least one of those messages could
> usefully have gone into the commit message, as useful motivational
> background.)
> 
> > >   We are late in the freeze now, so I would ideally be
> > > looking for a clear and compelling argument.  I'd also like to
> > > understand what the risks are of taking these.  Can someone please
> > > enlighten me ?
> > 
> > To make the code in 4.15 match 4.14, so patch 3 can be written in the
> > first place.
> > 
> > Also, as a side benefit, patches 1 and 2 reduce the quantity of logspew
> > from the impacted MSRs.
> > 
> > We cannot simply take patch 3 as-is, and say "4.14 and earlier" for
> > backport, because that still forces end users to specify msr_relaxed to
> > unbreak their Solaris guests, which is usability regression vs 4.14
> 
> This is plausible and going in the right direction but I still feel
> uncertain.
> 
> Jan, what is your summary opinion about patch 3 ?
> 
> Roger, can I get your opinion about the possible downside risks of
> this patch ?

For patches 1 and 2 the risk is low I think. This is already the same
handling that we do in pre-4.15, so it's unlikely to cause issues.
>From a guests PoV they don't change the result of trying to access any
of the modified MSRs, accessing them will still result in a #GP being
injected to the guest.

The main risk for patch 3 would be that reporting 0 for
MSR_RAPL_POWER_UNIT would result in some kind of issue on certain
guests, or that it triggers the poking of other MSRs in the
expectation that they would be available. I think those are quite
unlikely, and the patch fixes a real issue with Solaris guests.

Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.