lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <52cb66cd-8a8f-461c-adc4-0026afb8c1fd@email.android.com>
Date:	Thu, 24 Jan 2013 13:10:15 -0600
From:	"H. Peter Anvin" <hpa@...or.com>
To:	KY Srinivasan <kys@...rosoft.com>, Jan Beulich <JBeulich@...e.com>
CC:	"olaf@...fle.de" <olaf@...fle.de>, "bp@...en8.de" <bp@...en8.de>,
	"apw@...onical.com" <apw@...onical.com>,
	"x86@...nel.org" <x86@...nel.org>,
	"tglx@...utronix.de" <tglx@...utronix.de>,
	"devel@...uxdriverproject.org" <devel@...uxdriverproject.org>,
	"gregkh@...uxfoundation.org" <gregkh@...uxfoundation.org>,
	"jasowang@...hat.com" <jasowang@...hat.com>,
	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>
Subject: RE: [PATCH RESEND 1/1] X86: Handle Hyper-V vmbus interrupts as special hypervisor interrupts

I also have to point out the obvious problem with Xen masquerading as HyperV without implementing the same feature set...

KY Srinivasan <kys@...rosoft.com> wrote:

>
>
>> -----Original Message-----
>> From: Jan Beulich [mailto:JBeulich@...e.com]
>> Sent: Thursday, January 24, 2013 11:16 AM
>> To: KY Srinivasan
>> Cc: olaf@...fle.de; bp@...en8.de; apw@...onical.com; x86@...nel.org;
>> tglx@...utronix.de; devel@...uxdriverproject.org;
>gregkh@...uxfoundation.org;
>> jasowang@...hat.com; linux-kernel@...r.kernel.org; hpa@...or.com
>> Subject: RE: [PATCH RESEND 1/1] X86: Handle Hyper-V vmbus interrupts
>as
>> special hypervisor interrupts
>> 
>> >>> On 24.01.13 at 17:07, KY Srinivasan <kys@...rosoft.com> wrote:
>> 
>> >
>> >> -----Original Message-----
>> >> From: Jan Beulich [mailto:JBeulich@...e.com]
>> >> Sent: Thursday, January 24, 2013 3:48 AM
>> >> To: KY Srinivasan
>> >> Cc: olaf@...fle.de; bp@...en8.de; apw@...onical.com;
>x86@...nel.org;
>> >> tglx@...utronix.de; devel@...uxdriverproject.org;
>> > gregkh@...uxfoundation.org;
>> >> jasowang@...hat.com; linux-kernel@...r.kernel.org; hpa@...or.com
>> >> Subject: Re: [PATCH RESEND 1/1] X86: Handle Hyper-V vmbus
>interrupts as
>> >> special hypervisor interrupts
>> >>
>> >> >>> On 24.01.13 at 02:17, "K. Y. Srinivasan" <kys@...rosoft.com>
>wrote:
>> >> > @@ -69,6 +74,11 @@ static void __init
>ms_hyperv_init_platform(void)
>> >> >  	       ms_hyperv.features, ms_hyperv.hints);
>> >> >
>> >> >  	clocksource_register_hz(&hyperv_cs, NSEC_PER_SEC/100);
>> >> > +
>> >> > +	/*
>> >> > +	 * Setup the IDT for hypervisor callback.
>> >> > +	 */
>> >> > +	alloc_intr_gate(HYPERVISOR_CALLBACK_VECTOR,
>> >> hyperv_callback_vector);
>> >>
>> >> Isn't doing this unconditionally here as problematic as the call
>to
>> >> clocksource_register_hz() turned out to be when Xen's Hyper-V
>> >> shim reacts to the CPUID inquiry above?
>> >
>> > I was not sure what to make this conditional on at run-time. To the
>extent
>> > that Xen emulation of Hyper-V is complete, this will be a problem.
>Does Xen
>> > return all the "feature bits" of Hyper-V. I could discriminate on a
>feature
>> > that
>> > Xen does not plan to emulate.
>> 
>> I've no idea what plans there might be, but that's the code
>> there is currently:
>> 
>> int cpuid_viridian_leaves(unsigned int leaf, unsigned int *eax,
>>                           unsigned int *ebx, unsigned int *ecx,
>>                           unsigned int *edx)
>> {
>>     struct domain *d = current->domain;
>> 
>>     if ( !is_viridian_domain(d) )
>>         return 0;
>> 
>>     leaf -= 0x40000000;
>>     if ( leaf > 6 )
>>         return 0;
>> 
>>     *eax = *ebx = *ecx = *edx = 0;
>>     switch ( leaf )
>>     {
>>     case 0:
>>         *eax = 0x40000006; /* Maximum leaf */
>>         *ebx = 0x7263694d; /* Magic numbers  */
>>         *ecx = 0x666F736F;
>>         *edx = 0x76482074;
>>         break;
>>     case 1:
>>         *eax = 0x31237648; /* Version number */
>>         break;
>>     case 2:
>>         /* Hypervisor information, but only if the guest has set its
>>            own version number. */
>>         if ( d->arch.hvm_domain.viridian.guest_os_id.raw == 0 )
>>             break;
>>         *eax = 1; /* Build number */
>>         *ebx = (xen_major_version() << 16) | xen_minor_version();
>>         *ecx = 0; /* SP */
>>         *edx = 0; /* Service branch and number */
>>         break;
>>     case 3:
>>         /* Which hypervisor MSRs are available to the guest */
>>         *eax = (CPUID3A_MSR_APIC_ACCESS |
>>                 CPUID3A_MSR_HYPERCALL   |
>>                 CPUID3A_MSR_VP_INDEX);
>>         break;
>>     case 4:
>>         /* Recommended hypercall usage. */
>>         if ( (d->arch.hvm_domain.viridian.guest_os_id.raw == 0) ||
>>              (d->arch.hvm_domain.viridian.guest_os_id.fields.os < 4)
>)
>>             break;
>>         *eax = (CPUID4A_MSR_BASED_APIC |
>>                 CPUID4A_RELAX_TIMER_INT);
>>         *ebx = 2047; /* long spin count */
>>         break;
>>     }
>> 
>>     return 1;
>> }
>> 
>> Question is - considering you stated that this is supported
>> starting in Win8, doesn't Hyper-V itself announce that
>> capability in some explicit way?
>
>Thanks Jan. Unfortunately I don't think tis interrupt delivery model is
>specified via a "feature" bit (I will check with the Windows guys).
>Perhaps, we
>can have a Hyper-V specific compilation switch to address the Xen
>emulation issue.
>
>Regards,
>
>K. Y  
>> 
>> Jan
>> 
>> 

-- 
Sent from my mobile phone. Please excuse brevity and lack of formatting.
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ