[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN PATCH v4 10/14] x86/vmx: guard access to cpu_has_vmx_* in common code


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Sergiy Kibrik <sergiy_kibrik@xxxxxxxx>
  • Date: Wed, 24 Jul 2024 12:59:19 +0300
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=cOyDNu2XcsuudN+p+2nAkvBKhVQUirlp15vouzEOAaU=; b=RIm91mJ/fadPR6q8dT+k20ra5dWr4qRi2/OEfY6wRAXFc0izay3jqJbr1gsfGl+0EHrQZoBErd9yF5VoqmYDWZfTvE2aXJ6dNvDbrTe/gTWbihuoySzibg7qlilc4P8QFTr4Bbi+KFyGMcUSSly0fLJQADwghxJ6Z4aNx8zlVQpsR7o7Y/5yYtoyLvK3l51c+D44e9qZIemVinlvJMKl4X0VS+4CSfU6DIt6Jt8NaiM+tG/XSR/I5fX0GjgXF7nFcc2QdF+rJLJULvvWnc9XPpMczu3CNRTN/HXjD40e6cnExp/akCua85P5+rQ8ggms7gTiDMrMiek4xjj/7NEU+w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=wVLRpJyeyMgo7JeAJa+GxuVnnNEL08r3QIsMII9z4JzhV/iJS8YfKqn6kP+9oU8fCje7KGKXck09vvceYlRbji1A4ADJsgZRotkOfjTi47+NIWWwcsMUcSQqZnrK6+sKqbPuR5/NMFj0S7XmOJmaIfqqu5v3CV2KdLzbaT2gTJItkC80gnSGbFcBpr7B1hG1Ijg2ItjFEm4kLxwgLPXEyG8fzpVe8Otqso/GcG+WLtsNjrxn7puQpfcWZpwTDLs/f/EvXONh6bYe4Vptd3RaVYexWXWYqkZwd8Pl+SkZaJYZh5hUlbkY4EeyVfRUaXm53Gv6i5hin8ndGaR3YwYSpw==
  • Cc: Roger Pau Monné <roger.pau@xxxxxxxxxx>, Paul Durrant <paul@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Xenia Ragiadakou <xenia.ragiadakou@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx
  • Delivery-date: Wed, 24 Jul 2024 09:59:40 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

22.07.24 14:43, Jan Beulich:
On 09.07.2024 08:05, Sergiy Kibrik wrote:
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -5197,7 +5197,7 @@ int hvm_debug_op(struct vcpu *v, int32_t op)
      {
          case XEN_DOMCTL_DEBUG_OP_SINGLE_STEP_ON:
          case XEN_DOMCTL_DEBUG_OP_SINGLE_STEP_OFF:
-            if ( !cpu_has_monitor_trap_flag )
+            if ( !IS_ENABLED(CONFIG_VMX) || !cpu_has_monitor_trap_flag )
                  return -EOPNOTSUPP;
              break;

Why at the use site here and ...

--- a/xen/arch/x86/hvm/viridian/viridian.c
+++ b/xen/arch/x86/hvm/viridian/viridian.c
@@ -196,7 +196,7 @@ void cpuid_viridian_leaves(const struct vcpu *v, uint32_t 
leaf,
          res->a = CPUID4A_RELAX_TIMER_INT;
          if ( viridian_feature_mask(d) & HVMPV_hcall_remote_tlb_flush )
              res->a |= CPUID4A_HCALL_REMOTE_TLB_FLUSH;
-        if ( !cpu_has_vmx_apic_reg_virt )
+        if ( !IS_ENABLED(CONFIG_VMX) || !cpu_has_vmx_apic_reg_virt )
              res->a |= CPUID4A_MSR_BASED_APIC;
          if ( viridian_feature_mask(d) & HVMPV_hcall_ipi )
              res->a |= CPUID4A_SYNTHETIC_CLUSTER_IPI;
@@ -236,7 +236,7 @@ void cpuid_viridian_leaves(const struct vcpu *v, uint32_t 
leaf,
case 6:
          /* Detected and in use hardware features. */
-        if ( cpu_has_vmx_virtualize_apic_accesses )
+        if ( IS_ENABLED(CONFIG_VMX) && cpu_has_vmx_virtualize_apic_accesses )
              res->a |= CPUID6A_APIC_OVERLAY;
          if ( cpu_has_vmx_msr_bitmap || (read_efer() & EFER_SVME) )
              res->a |= CPUID6A_MSR_BITMAPS;

... here (and in yet a few more places), but ...

--- a/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
+++ b/xen/arch/x86/include/asm/hvm/vmx/vmcs.h
@@ -306,7 +306,8 @@ extern u64 vmx_ept_vpid_cap;
  #define cpu_has_vmx_vnmi \
      (vmx_pin_based_exec_control & PIN_BASED_VIRTUAL_NMIS)
  #define cpu_has_vmx_msr_bitmap \
-    (vmx_cpu_based_exec_control & CPU_BASED_ACTIVATE_MSR_BITMAP)
+    (IS_ENABLED(CONFIG_VMX) && \
+     vmx_cpu_based_exec_control & CPU_BASED_ACTIVATE_MSR_BITMAP)

... for others right in the definitions, as was suggested before? Yet then
not consistently for all of them? Looks like if you did this consistently
here, you'd have no need at all to fiddle with any .c file.


these modifications in .c files are made mainly to track places where build fails and to highlight where global variables are causing a trouble. cpu_has_monitor_trap_flag and fellow macros are used within VMX code mostly and don't need these checks inside of them most of the time -- at least so I felt.

As for those cpu_has_vmx_* macros that are modified in header -- these are being checked in a bit more tricky way, so instead of making complex conditionals even more complicated, I've integrated CONFIG_VMX condition check inside these macros instead.

Ofc we can proceed with only .h files modifications, if this is more consistent with what is planned for cpu_has_vmx_* checks in future.

  -Sergiy



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.