[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v2 1/3] xen/pv: allow pmu msr accesses to cause GP


  • To: Juergen Gross <jgross@xxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 4 Oct 2022 17:50:44 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=hcaHuErX/8Kpvan/3rJElGiQjGhjgRW18NtgU3kxAdU=; b=ActI+yBDM5aSyVz/y7tINBafs/TxEwEedImjje/OvSNZmSYeStzyXwDkg7M8+yLDPB6p/ugsWHNw5RzOFKpBDwZmZNzl+STh+5yGGpfHoxWMXNr2LjGv21HOIkKLCr80NEwPWVRUUazQU547HCdD3S9yz+O4bpbjQoFMeA2EoUUfsTF3j8ivsIbuoJZr9GoPX2J0zheU24dh7Pzp/62uShArwXblZTusUJmpThHxNHDWX0epCVVbelenn0YZ3JSgTYeNOtNXajp11CtwgSOtdHfqRu7pugJH7lj6DDYqaYqMxB2c23VsPk7YTkPbBg+5mq5PE2nm7p0t3cs/L5MsBA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=RVSYCirkyubzwkrXD56H8Knlr3ivNVnGmXnnOgvaPXKxEOL/cCDRXdIlN8pTMdoI7orfvAvg59Jvhf6reiYwypGW+FstJ2VsKBn9LyEUr7ThuaWr+NPoScibdBVJVZEztrPoBcaid8D9o2aTvnKgbs+9cHAnm2MztXoNCG///818dk6XMegL090e2uINhCOHx60TEiKHDqhmQ4d6rnwmAQh5tYGmW2STMiJKaCqUXphvW8KW+cIv5aDQ2+Cy3DfJiCYpp/45rIVljWKhokHRv4lMWu5zk6z/4qwmo5ub20JCFkdJu48Hf6tKhAl7WAtLAM3aiyHpmL24NUsJilZQ+A==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>, Thomas Gleixner <tglx@xxxxxxxxxxxxx>, Ingo Molnar <mingo@xxxxxxxxxx>, Borislav Petkov <bp@xxxxxxxxx>, Dave Hansen <dave.hansen@xxxxxxxxxxxxxxx>, "H. Peter Anvin" <hpa@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, x86@xxxxxxxxxx
  • Delivery-date: Tue, 04 Oct 2022 15:50:54 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 04.10.2022 17:22, Juergen Gross wrote:
> On 04.10.22 12:58, Jan Beulich wrote:
>> On 04.10.2022 10:43, Juergen Gross wrote:
>>> Today pmu_msr_read() and pmu_msr_write() fall back to the safe variants
>>> of read/write MSR in case the MSR access isn't emulated via Xen. Allow
>>> the caller to select the potentially faulting variant by passing NULL
>>> for the error pointer.
>>>
>>> Restructure the code to make it more readable.
>>>
>>> Signed-off-by: Juergen Gross <jgross@xxxxxxxx>
>>
>> I think the title (and to some degree also the description) is misleading:
>> The property we care about here isn't whether an MSR access would raise
>> #GP (we can't control that), but whether that #GP would be recovered from.
> 
> Would you be fine with adding "fatal" or "visible"?

That would help, but "allow" also is a little odd when it comes to
(likely) crashing the system.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.