[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [RFC PATCH 03/22] x86/msr: always allow a pinned Dom0 to read any unknown MSR


  • To: Edwin Török <edwin.torok@xxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Mon, 30 Oct 2023 17:29:09 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=PMeZPXrw5XYyfODhFdDzOiAAkUt9zFAYFaSApJILQS8=; b=ld094hssTALy45E/mut/d4VY8JA37jMYl0wsCQ/XsMC8lWnRJVxCxkhlHRbnDp6RNznf71UEN+88kRF7B2Y+HvIJuFknGHYXjxb11zDU9+6JHffX0niT0FYi6pGW7/6zwA0mAmhYhnUP7y0Sl6JyZt5+y3PYTHkv22mHDfH2XZWmpV3bSLRdvcCkMPUnRteiF1kbEekfkGK5yHtiKDvyLyCWQtMw7+in7F8kDOhwhhbNHymat8OyH63B692lBN5uewedEcFYq2iid6C40hpPhHZ83e+o3LKY5evv+OhNiIPUDFpZtE5ItmmrGt6HvwLO1kFSFEmvj9WAwMslgxvn5Q==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nxb0wiVBpH3WpYSp1zj6e3WxCDWF4N5+lofQYKALx+Gp4kI1v3fcUGC6RsAmzLE7tKWIiC6VnQ1A1ZtfyWjuMdPTJbZkzG+PpIywtj0R7auObJWGWXMvEY7KmduuRNVfs9eP3KZwDJYmZAjC1QfptE4SueVtXl4ne7fB9JBiwFMtpMw00KXg+Dq4fq0gjMudt828He5fcZXo73xGibDWlAijGIUm0WeKCqNQndz4wP7a6mvQcPxuQr5/SndhDaYfEeo6uzDfemUu8y6MP7rmlZg3WAG1bRrkfBUFKH86T1VbT5dto8idj/0UBgKuzQMtWNifaRzRiPJo57R+FrWxCA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Edwin Török <edvin.torok@xxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Mon, 30 Oct 2023 16:29:24 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 25.10.2023 21:29, Edwin Török wrote:
> This can be useful if you realize you have to inspect the value of an
> MSR in production, without having to change into a new Xen first that
> handles the MSR.

Yet on a non-pinned Dom0 you'd still be lost. Since iirc we generally
advise against pinning, I wonder of how much use such a change would be,
when it effectively undoes what we deliberately did a while ago.

> --- a/xen/arch/x86/hvm/svm/svm.c
> +++ b/xen/arch/x86/hvm/svm/svm.c
> @@ -1933,6 +1933,9 @@ static int cf_check svm_msr_read_intercept(
>          break;
>  
>      default:
> +        if ( is_hwdom_pinned_vcpu(v) && !rdmsr_safe(msr, *msr_content) )
> +            break;
> +
>          if ( d->arch.msr_relaxed && !rdmsr_safe(msr, tmp) )
>          {
>              *msr_content = 0;

If we went as far as undoing some of what was done, I'd then wonder
whether instead we should mandate relaxed mode to be enabled on such a
Dom0. Then, instead of returning fake 0 here, the actual value could
be returned in the specific case of (pinned?) Dom0.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.