diff mbox series

target/i386: Clear xsave pkru bit when KVM XCR0 not support

Message ID 914d4bfc6901485c9f029ce26ceb7d10@h3c.com (mailing list archive)
State New, archived
Headers show
Series target/i386: Clear xsave pkru bit when KVM XCR0 not support | expand

Commit Message

Yuchen May 17, 2023, 10:55 a.m. UTC
Migrating guest from Intel new CPU (as Gold 6230) to old CPU (as
E5-2650 v4) will pause on the destination host. Because old CPU
not support xsave pkru feature, and KVM KVM_SET_XSAVE ioctl
return EINVAL.

This kernel commit introduces the problem:
ea4d6938d4c0 x86/fpu: Replace KVMs home brewed FPU copy from user

Signed-off-by: YuChen <yu.chen@h3c.com>
---
target/i386/xsave_helper.c | 8 ++++++++
1 file changed, 8 insertions(+)

     }
+    if (!has_xsave_pkru) {
+        env->xstate_bv &= ~XSTATE_PKRU_MASK;
+    }
     header->xstate_bv = env->xstate_bv;
     e = &x86_ext_save_areas[XSTATE_YMM_BIT];
@@ -181,6 +186,9 @@ void x86_cpu_xrstor_all_areas(X86CPU *cpu, const void *buf, uint32_t buflen)
         env->xmm_regs[i].ZMM_Q(1) = ldq_p(xmm + 8);
     }
+    if (xsave->header.xstate_bv & XSTATE_PKRU_MASK) {
+        has_xsave_pkru = true;
+    }
     env->xstate_bv = header->xstate_bv;
     e = &x86_ext_save_areas[XSTATE_YMM_BIT];
--
2.34.1
-------------------------------------------------------------------------------------------------------------------------------------
?????????????????????????????????
????????????????????????????????????????
????????????????????????????????????????
???
This e-mail and its attachments contain confidential information from New H3C, which is
intended only for the person or entity whose address is listed above. Any use of the
information contained herein in any way (including, but not limited to, total or partial
disclosure, reproduction, or dissemination) by persons other than the intended
recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender
by phone or email immediately and delete it!

Comments

Paolo Bonzini May 17, 2023, 5:08 p.m. UTC | #1
On 5/17/23 12:55, Yuchen wrote:
> Migrating guest from Intel new CPU (as Gold 6230) to old CPU (as
> E5-2650 v4) will pause on the destination host. Because old CPU
> not support xsave pkru feature, and KVM KVM_SET_XSAVE ioctl
> return EINVAL.
> 
> This kernel commit introduces the problem:
> 
> ea4d6938d4c0 x86/fpu: Replace KVMs home brewed FPU copy from user
> 
> Signed-off-by: YuChen <yu.chen@h3c.com>

Would this work instead?

diff --git a/target/i386/xsave_helper.c b/target/i386/xsave_helper.c
index 996e9f3bfef5..d3e5edad2ecd 100644
--- a/target/i386/xsave_helper.c
+++ b/target/i386/xsave_helper.c
@@ -47,7 +47,7 @@ void x86_cpu_xsave_all_areas(X86CPU *cpu, void *buf, uint32_t buflen)
          stq_p(xmm + 8, env->xmm_regs[i].ZMM_Q(1));
      }
  
-    header->xstate_bv = env->xstate_bv;
+    header->xstate_bv = env->xstate_bv & x86_cpu_xsave_xcr0_components(cpu);
  
      e = &x86_ext_save_areas[XSTATE_YMM_BIT];
      if (e->size && e->offset) {

Paolo
Dongli Zhang May 17, 2023, 5:17 p.m. UTC | #2
Hi Yuchen,

On 5/17/23 03:55, Yuchen wrote:
> Migrating guest from Intel new CPU (as Gold 6230) to old CPU (as
> E5-2650 v4) will pause on the destination host. Because old CPU
> not support xsave pkru feature, and KVM KVM_SET_XSAVE ioctl
> return EINVAL.
> 
> This kernel commit introduces the problem:
> ea4d6938d4c0 x86/fpu: Replace KVMs home brewed FPU copy from user

This kernel commit issue should be resolved by the below kernel commit.

x86/kvm/fpu: Limit guest user_xfeatures to supported bits of XCR0

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ad856280ddea3401e1f5060ef20e6de9f6122c76

Since the old target server does not support pkru, I assume the VM's cpu type
should not support pkru. Therefore, the pkru should never be migrated away from
source server.

Dongli Zhang

> 
> Signed-off-by: YuChen <yu.chen@h3c.com>
> ---
> target/i386/xsave_helper.c | 8 ++++++++
> 1 file changed, 8 insertions(+)
> 
> diff --git a/target/i386/xsave_helper.c b/target/i386/xsave_helper.c
> index 996e9f3bfe..64e2b969fe 100644
> --- a/target/i386/xsave_helper.c
> +++ b/target/i386/xsave_helper.c
> @@ -6,6 +6,8 @@
>  #include "cpu.h"
> +static bool has_xsave_pkru;
> +
> void x86_cpu_xsave_all_areas(X86CPU *cpu, void *buf, uint32_t buflen)
> {
>      CPUX86State *env = &cpu->env;
> @@ -47,6 +49,9 @@ void x86_cpu_xsave_all_areas(X86CPU *cpu, void *buf, uint32_t buflen)
>          stq_p(xmm + 8, env->xmm_regs[i].ZMM_Q(1));
>      }
> +    if (!has_xsave_pkru) {
> +        env->xstate_bv &= ~XSTATE_PKRU_MASK;
> +    }
>      header->xstate_bv = env->xstate_bv;
>      e = &x86_ext_save_areas[XSTATE_YMM_BIT];
> @@ -181,6 +186,9 @@ void x86_cpu_xrstor_all_areas(X86CPU *cpu, const void *buf, uint32_t buflen)
>          env->xmm_regs[i].ZMM_Q(1) = ldq_p(xmm + 8);
>      }
> +    if (xsave->header.xstate_bv & XSTATE_PKRU_MASK) {
> +        has_xsave_pkru = true;
> +    }
>      env->xstate_bv = header->xstate_bv;
>      e = &x86_ext_save_areas[XSTATE_YMM_BIT];
> --
> 2.34.1
> -------------------------------------------------------------------------------------------------------------------------------------
> ?????????????????????????????????
> ????????????????????????????????????????
> ????????????????????????????????????????
> ???
> This e-mail and its attachments contain confidential information from New H3C, which is
> intended only for the person or entity whose address is listed above. Any use of the
> information contained herein in any way (including, but not limited to, total or partial
> disclosure, reproduction, or dissemination) by persons other than the intended
> recipient(s) is prohibited. If you receive this e-mail in error, please notify the sender
> by phone or email immediately and delete it!
>
Yuchen May 20, 2023, 1:57 a.m. UTC | #3
Paolo, thanks, 
The kernel patch can solve this problem. But it is difficult to upgrade the kernel in some production environments, 
and upgrading qemu is easy. This patch is just to sync qemu with kvm XSAVE features, no negative impact. 
At the same time, it increases the compatibility of qemu to kernel and improves the robustness of qemu.

> -----邮件原件-----
> 发件人: Paolo Bonzini <pbonzini@redhat.com>
> 发送时间: 2023年5月20日 1:37
> 收件人: yuchen (Cloud) <yu.chen@h3c.com>
> 主题: Re: 回复: [PATCH] target/i386: Clear xsave pkru bit when KVM
> XCR0 not support
> 
> On 5/18/23 14:37, Yuchen wrote:
> > Yes, because x86_cpu_xsave_all_areas() can get the correct XSAVE
> features.
> 
> If you tested it, I can post the patch as a workaround.  However, the
> kernel bug has been fixed too.
> 
> Paolo
> 
> >> -----邮件原件-----
> >> 发件人: Paolo Bonzini <pbonzini@redhat.com>
> >> 发送时间: 2023年5月18日 1:08
> >> 收件人: yuchen (Cloud) <yu.chen@h3c.com>;
> qemu-devel@nongnu.org
> >> 抄送: rth@twiddle.net; ehabkost@redhat.com; chengchiwen (Cloud)
> >> <chengchiwen@h3c.com>
> >> 主题: Re: [PATCH] target/i386: Clear xsave pkru bit when KVM XCR0
> not
> >> support
> >>
> >> On 5/17/23 12:55, Yuchen wrote:
> >>> Migrating guest from Intel new CPU (as Gold 6230) to old CPU (as
> >>> E5-2650 v4) will pause on the destination host. Because old CPU not
> >>> support xsave pkru feature, and KVM KVM_SET_XSAVE ioctl return
> >> EINVAL.
> >>>
> >>> This kernel commit introduces the problem:
> >>>
> >>> ea4d6938d4c0 x86/fpu: Replace KVMs home brewed FPU copy from
> >> user
> >>>
> >>> Signed-off-by: YuChen <yu.chen@h3c.com>
> >>
> >> Would this work instead?
> >>
> >> diff --git a/target/i386/xsave_helper.c b/target/i386/xsave_helper.c
> >> index 996e9f3bfef5..d3e5edad2ecd 100644
> >> --- a/target/i386/xsave_helper.c
> >> +++ b/target/i386/xsave_helper.c
> >> @@ -47,7 +47,7 @@ void x86_cpu_xsave_all_areas(X86CPU *cpu,
> void
> >> *buf, uint32_t buflen)
> >>            stq_p(xmm + 8, env->xmm_regs[i].ZMM_Q(1));
> >>        }
> >>
> >> -    header->xstate_bv = env->xstate_bv;
> >> +    header->xstate_bv = env->xstate_bv &
> >> + x86_cpu_xsave_xcr0_components(cpu);
> >>
> >>        e = &x86_ext_save_areas[XSTATE_YMM_BIT];
> >>        if (e->size && e->offset) {
> >>
> >> Paolo
> >
> > ----------------------------------------------------------------------
> > ---------------------------------------------------------------
> > 本邮件及其附件含有新华三集团的保密信息,仅限于发送给上面地址
> 中列出
> > 的个人或群组。禁止任何其他人以任何形式使用(包括但不限于全部
> 或部分地泄露、复制、
> > 或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话或邮
> 件通知发件人并删除本
> > 邮件!
> > This e-mail and its attachments contain confidential information from
> > New H3C, which is intended only for the person or entity whose address
> > is listed above. Any use of the information contained herein in any
> > way (including, but not limited to, total or partial disclosure,
> > reproduction, or dissemination) by persons other than the intended
> > recipient(s) is prohibited. If you receive this e-mail in error,
> > please notify the sender by phone or email immediately and delete it!
Yuchen May 20, 2023, 6:21 a.m. UTC | #4
Paolo,
I debugged and found, x86_cpu_xsave_xcr0_components() retuen 0, although it can solve problem, but XCR0 bit 0 also is 0, 
this is not correct. Because Intel manual Requirements : " XCR0.X87 (bit 0): This bit 0 must be 1. An attempt to write 0 to this bit causes a #GP exception. " (2.6 EXTENDED CONTROL REGISTERS (INCLUDING XCR0)).

> -----邮件原件-----
> 发件人: yuchen (Cloud)
> 发送时间: 2023年5月20日 9:58
> 收件人: 'Paolo Bonzini' <pbonzini@redhat.com>;
> 'qemu-devel@nongnu.org' <qemu-devel@nongnu.org>
> 抄送: 'rth@twiddle.net' <rth@twiddle.net>; 'ehabkost@redhat.com'
> <ehabkost@redhat.com>; 'Dongli Zhang' <dongli.zhang@oracle.com>
> 主题: 回复: 回复: [PATCH] target/i386: Clear xsave pkru bit when KVM
> XCR0 not support
> 
> Paolo, thanks,
> The kernel patch can solve this problem. But it is difficult to upgrade the
> kernel in some production environments, and upgrading qemu is easy.
> This patch is just to sync qemu with kvm XSAVE features, no negative
> impact.
> At the same time, it increases the compatibility of qemu to kernel and
> improves the robustness of qemu.
> 
> > -----邮件原件-----
> > 发件人: Paolo Bonzini <pbonzini@redhat.com>
> > 发送时间: 2023年5月20日 1:37
> > 收件人: yuchen (Cloud) <yu.chen@h3c.com>
> > 主题: Re: 回复: [PATCH] target/i386: Clear xsave pkru bit when KVM
> > XCR0 not support
> >
> > On 5/18/23 14:37, Yuchen wrote:
> > > Yes, because x86_cpu_xsave_all_areas() can get the correct XSAVE
> > features.
> >
> > If you tested it, I can post the patch as a workaround.  However, the
> > kernel bug has been fixed too.
> >
> > Paolo
> >
> > >> -----邮件原件-----
> > >> 发件人: Paolo Bonzini <pbonzini@redhat.com>
> > >> 发送时间: 2023年5月18日 1:08
> > >> 收件人: yuchen (Cloud) <yu.chen@h3c.com>;
> > qemu-devel@nongnu.org
> > >> 抄送: rth@twiddle.net; ehabkost@redhat.com; chengchiwen
> (Cloud)
> > >> <chengchiwen@h3c.com>
> > >> 主题: Re: [PATCH] target/i386: Clear xsave pkru bit when KVM XCR0
> > not
> > >> support
> > >>
> > >> On 5/17/23 12:55, Yuchen wrote:
> > >>> Migrating guest from Intel new CPU (as Gold 6230) to old CPU (as
> > >>> E5-2650 v4) will pause on the destination host. Because old CPU
> > >>> not support xsave pkru feature, and KVM KVM_SET_XSAVE ioctl
> return
> > >> EINVAL.
> > >>>
> > >>> This kernel commit introduces the problem:
> > >>>
> > >>> ea4d6938d4c0 x86/fpu: Replace KVMs home brewed FPU copy
> from
> > >> user
> > >>>
> > >>> Signed-off-by: YuChen <yu.chen@h3c.com>
> > >>
> > >> Would this work instead?
> > >>
> > >> diff --git a/target/i386/xsave_helper.c
> > >> b/target/i386/xsave_helper.c index 996e9f3bfef5..d3e5edad2ecd
> > >> 100644
> > >> --- a/target/i386/xsave_helper.c
> > >> +++ b/target/i386/xsave_helper.c
> > >> @@ -47,7 +47,7 @@ void x86_cpu_xsave_all_areas(X86CPU *cpu,
> > void
> > >> *buf, uint32_t buflen)
> > >>            stq_p(xmm + 8, env->xmm_regs[i].ZMM_Q(1));
> > >>        }
> > >>
> > >> -    header->xstate_bv = env->xstate_bv;
> > >> +    header->xstate_bv = env->xstate_bv &
> > >> + x86_cpu_xsave_xcr0_components(cpu);
> > >>
> > >>        e = &x86_ext_save_areas[XSTATE_YMM_BIT];
> > >>        if (e->size && e->offset) {
> > >>
> > >> Paolo
> > >
> > > --------------------------------------------------------------------
> > > --
> > > ---------------------------------------------------------------
> > > 本邮件及其附件含有新华三集团的保密信息,仅限于发送给上面地
> 址
> > 中列出
> > > 的个人或群组。禁止任何其他人以任何形式使用(包括但不限于全
> 部
> > 或部分地泄露、复制、
> > > 或散发)本邮件中的信息。如果您错收了本邮件,请您立即电话或
> 邮
> > 件通知发件人并删除本
> > > 邮件!
> > > This e-mail and its attachments contain confidential information
> > > from New H3C, which is intended only for the person or entity whose
> > > address is listed above. Any use of the information contained herein
> > > in any way (including, but not limited to, total or partial
> > > disclosure, reproduction, or dissemination) by persons other than
> > > the intended
> > > recipient(s) is prohibited. If you receive this e-mail in error,
> > > please notify the sender by phone or email immediately and delete it!
diff mbox series

Patch

diff --git a/target/i386/xsave_helper.c b/target/i386/xsave_helper.c
index 996e9f3bfe..64e2b969fe 100644
--- a/target/i386/xsave_helper.c
+++ b/target/i386/xsave_helper.c
@@ -6,6 +6,8 @@ 
 #include "cpu.h"
+static bool has_xsave_pkru;
+
void x86_cpu_xsave_all_areas(X86CPU *cpu, void *buf, uint32_t buflen)
{
     CPUX86State *env = &cpu->env;
@@ -47,6 +49,9 @@  void x86_cpu_xsave_all_areas(X86CPU *cpu, void *buf, uint32_t buflen)
         stq_p(xmm + 8, env->xmm_regs[i].ZMM_Q(1));