From patchwork Mon Mar 20 17:08:19 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Paul Durrant X-Patchwork-Id: 9634609 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id E11CE60132 for ; Mon, 20 Mar 2017 17:11:25 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id CC4A420453 for ; Mon, 20 Mar 2017 17:11:25 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id C117B27D4D; Mon, 20 Mar 2017 17:11:25 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 2D1E820453 for ; Mon, 20 Mar 2017 17:11:25 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1cq0nc-00078u-4J; Mon, 20 Mar 2017 17:08:52 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1cq0na-00075e-I3 for xen-devel@lists.xenproject.org; Mon, 20 Mar 2017 17:08:50 +0000 Received: from [193.109.254.147] by server-11.bemta-6.messagelabs.com id 9B/0E-04971-1AC00D85; Mon, 20 Mar 2017 17:08:49 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFmpmkeJIrShJLcpLzFFi42JxWrohUncBz4U Ig8mnpSy+b5nM5MDocfjDFZYAxijWzLyk/IoE1oxjH6czFbywq3h06CpLA+MNnS5GTg4JAX+J u2emMIPYbAI6ElOfXmLtYuTgEBFQkbi91wDEZBYol+iYUAtSISwQIfHn6W42EJtFQFXi/s3nr CA2r4CbxKmrDxghJspJnD/+E2wip4C7xL5nt1lAbCGgmodL9jBC2CoS66fOYoPoFZQ4OfMJWA 2zgITEwRcvmCcw8s5CkpqFJLWAkWkVo0ZxalFZapGukbFeUlFmekZJbmJmjq6hgZlebmpxcWJ 6ak5iUrFecn7uJkZg4DAAwQ7GP/MDDzFKcjApifKqCJ6IEOJLyk+pzEgszogvKs1JLT7EKMPB oSTBOzkNKCdYlJqeWpGWmQMMYZi0BAePkgjvTJA0b3FBYm5xZjpE6hSjopQ4bxNIQgAkkVGaB 9cGi5tLjLJSwryMQIcI8RSkFuVmlqDKv2IU52BUEuZNB5nCk5lXAjf9FdBiJqDFiT+PgCwuSU RISTUw5oXvy607Gizwdquam+HvpVs0eY4XLytYkpfYnuhoxDFBRrkzr+F9jMd85jMd5s+zWwM LqpySAuPy/b1v6ssUrC+QvpHCqK934TdLufNFs1KGP86PTzEs22V69MgzBg7RJ2e901LVfA8q uFubVBmE+y9r2sTYLBr1ubhmUdGGkvj4d7psW5VYijMSDbWYi4oTAdh1ucCWAgAA X-Env-Sender: prvs=245da84ed=Paul.Durrant@citrix.com X-Msg-Ref: server-15.tower-27.messagelabs.com!1490029725!39889195!2 X-Originating-IP: [66.165.176.89] X-SpamReason: No, hits=0.0 required=7.0 tests=sa_preprocessor: VHJ1c3RlZCBJUDogNjYuMTY1LjE3Ni44OSA9PiAyMDMwMDc=\n, received_headers: No Received headers X-StarScan-Received: X-StarScan-Version: 9.2.3; banners=-,-,- X-VirusChecked: Checked Received: (qmail 39515 invoked from network); 20 Mar 2017 17:08:48 -0000 Received: from smtp.citrix.com (HELO SMTP.CITRIX.COM) (66.165.176.89) by server-15.tower-27.messagelabs.com with RC4-SHA encrypted SMTP; 20 Mar 2017 17:08:48 -0000 X-IronPort-AV: E=Sophos;i="5.36,195,1486425600"; d="scan'208";a="415033669" From: Paul Durrant To: Date: Mon, 20 Mar 2017 17:08:19 +0000 Message-ID: <1490029701-4311-5-git-send-email-paul.durrant@citrix.com> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1490029701-4311-1-git-send-email-paul.durrant@citrix.com> References: <1490029701-4311-1-git-send-email-paul.durrant@citrix.com> MIME-Version: 1.0 Cc: Andrew Cooper , Paul Durrant , Jan Beulich Subject: [Xen-devel] [PATCH v2 4/6] x86/viridian: add warnings for unimplemented hypercalls and MSRs X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP These warnings can be useful when Microsoft updates Windows. In the past there have been several cases when Windows erroneously uses hypercalls and MSRs that should be gated on CPUID flags than Xen does not set. The usual symptom is a guest crash with little or no information in the hypervisor log. Adding these warnings at least gives a clue as to what might be happening in such cases. Some versions of Windows do currently issue hypercalls that they should not, so this patch whitelists those to avoid the warnings as the lack of implementation is clearly proved not to be a problem to the guest. The warnings are rate limited so a malicious guest cannot use them to as a DoS. NOTE: Because the MSR warnings need to be gated on range checking the MSR address this patch imports the up-to-date definitions of all the viridian MSRs from the specification. Signed-off-by: Paul Durrant Reviewed-by: Jan Beulich --- Cc: Jan Beulich Cc: Andrew Cooper v2: - Use gprintk() rather than gdprintk() - Further changes requested by Jan --- xen/arch/x86/hvm/viridian.c | 106 ++++++++++++++++++++++++++++++++++++++------ 1 file changed, 92 insertions(+), 14 deletions(-) diff --git a/xen/arch/x86/hvm/viridian.c b/xen/arch/x86/hvm/viridian.c index 27ad5e8..d241de2 100644 --- a/xen/arch/x86/hvm/viridian.c +++ b/xen/arch/x86/hvm/viridian.c @@ -23,17 +23,73 @@ #include /* Viridian MSR numbers. */ -#define HV_X64_MSR_GUEST_OS_ID 0x40000000 -#define HV_X64_MSR_HYPERCALL 0x40000001 -#define HV_X64_MSR_VP_INDEX 0x40000002 -#define HV_X64_MSR_TIME_REF_COUNT 0x40000020 -#define HV_X64_MSR_REFERENCE_TSC 0x40000021 -#define HV_X64_MSR_TSC_FREQUENCY 0x40000022 -#define HV_X64_MSR_APIC_FREQUENCY 0x40000023 -#define HV_X64_MSR_EOI 0x40000070 -#define HV_X64_MSR_ICR 0x40000071 -#define HV_X64_MSR_TPR 0x40000072 -#define HV_X64_MSR_VP_ASSIST_PAGE 0x40000073 +#define HV_X64_MSR_GUEST_OS_ID 0x40000000 +#define HV_X64_MSR_HYPERCALL 0x40000001 +#define HV_X64_MSR_VP_INDEX 0x40000002 +#define HV_X64_MSR_RESET 0x40000003 +#define HV_X64_MSR_VP_RUNTIME 0x40000010 +#define HV_X64_MSR_TIME_REF_COUNT 0x40000020 +#define HV_X64_MSR_REFERENCE_TSC 0x40000021 +#define HV_X64_MSR_TSC_FREQUENCY 0x40000022 +#define HV_X64_MSR_APIC_FREQUENCY 0x40000023 +#define HV_X64_MSR_EOI 0x40000070 +#define HV_X64_MSR_ICR 0x40000071 +#define HV_X64_MSR_TPR 0x40000072 +#define HV_X64_MSR_VP_ASSIST_PAGE 0x40000073 +#define HV_X64_MSR_SCONTROL 0x40000080 +#define HV_X64_MSR_SVERSION 0x40000081 +#define HV_X64_MSR_SIEFP 0x40000082 +#define HV_X64_MSR_SIMP 0x40000083 +#define HV_X64_MSR_EOM 0x40000084 +#define HV_X64_MSR_SINT0 0x40000090 +#define HV_X64_MSR_SINT1 0x40000091 +#define HV_X64_MSR_SINT2 0x40000092 +#define HV_X64_MSR_SINT3 0x40000093 +#define HV_X64_MSR_SINT4 0x40000094 +#define HV_X64_MSR_SINT5 0x40000095 +#define HV_X64_MSR_SINT6 0x40000096 +#define HV_X64_MSR_SINT7 0x40000097 +#define HV_X64_MSR_SINT8 0x40000098 +#define HV_X64_MSR_SINT9 0x40000099 +#define HV_X64_MSR_SINT10 0x4000009A +#define HV_X64_MSR_SINT11 0x4000009B +#define HV_X64_MSR_SINT12 0x4000009C +#define HV_X64_MSR_SINT13 0x4000009D +#define HV_X64_MSR_SINT14 0x4000009E +#define HV_X64_MSR_SINT15 0x4000009F +#define HV_X64_MSR_STIMER0_CONFIG 0x400000B0 +#define HV_X64_MSR_STIMER0_COUNT 0x400000B1 +#define HV_X64_MSR_STIMER1_CONFIG 0x400000B2 +#define HV_X64_MSR_STIMER1_COUNT 0x400000B3 +#define HV_X64_MSR_STIMER2_CONFIG 0x400000B4 +#define HV_X64_MSR_STIMER2_COUNT 0x400000B5 +#define HV_X64_MSR_STIMER3_CONFIG 0x400000B6 +#define HV_X64_MSR_STIMER3_COUNT 0x400000B7 +#define HV_X64_MSR_POWER_STATE_TRIGGER_C1 0x400000C1 +#define HV_X64_MSR_POWER_STATE_TRIGGER_C2 0x400000C2 +#define HV_X64_MSR_POWER_STATE_TRIGGER_C3 0x400000C3 +#define HV_X64_MSR_POWER_STATE_CONFIG_C1 0x400000D1 +#define HV_X64_MSR_POWER_STATE_CONFIG_C2 0x400000D2 +#define HV_X64_MSR_POWER_STATE_CONFIG_C3 0x400000D3 +#define HV_X64_MSR_STATS_PARTITION_RETAIL_PAGE 0x400000E0 +#define HV_X64_MSR_STATS_PARTITION_INTERNAL_PAGE 0x400000E1 +#define HV_X64_MSR_STATS_VP_RETAIL_PAGE 0x400000E2 +#define HV_X64_MSR_STATS_VP_INTERNAL_PAGE 0x400000E3 +#define HV_X64_MSR_GUEST_IDLE 0x400000F0 +#define HV_X64_MSR_SYNTH_DEBUG_CONTROL 0x400000F1 +#define HV_X64_MSR_SYNTH_DEBUG_STATUS 0x400000F2 +#define HV_X64_MSR_SYNTH_DEBUG_SEND_BUFFER 0x400000F3 +#define HV_X64_MSR_SYNTH_DEBUG_RECEIVE_BUFFER 0x400000F4 +#define HV_X64_MSR_SYNTH_DEBUG_PENDING_BUFFER 0x400000F5 +#define HV_X64_MSR_CRASH_P0 0x40000100 +#define HV_X64_MSR_CRASH_P1 0x40000101 +#define HV_X64_MSR_CRASH_P2 0x40000102 +#define HV_X64_MSR_CRASH_P3 0x40000103 +#define HV_X64_MSR_CRASH_P4 0x40000104 +#define HV_X64_MSR_CRASH_CTL 0x40000105 + +#define VIRIDIAN_MSR_MIN HV_X64_MSR_GUEST_OS_ID +#define VIRIDIAN_MSR_MAX HV_X64_MSR_CRASH_CTL /* Viridian Hypercall Status Codes. */ #define HV_STATUS_SUCCESS 0x0000 @@ -41,9 +97,11 @@ #define HV_STATUS_INVALID_PARAMETER 0x0005 /* Viridian Hypercall Codes. */ -#define HvFlushVirtualAddressSpace 2 -#define HvFlushVirtualAddressList 3 -#define HvNotifyLongSpinWait 8 +#define HvFlushVirtualAddressSpace 0x0002 +#define HvFlushVirtualAddressList 0x0003 +#define HvNotifyLongSpinWait 0x0008 +#define HvGetPartitionId 0x0046 +#define HvExtCallQueryCapabilities 0x8001 /* Viridian Hypercall Flags. */ #define HV_FLUSH_ALL_PROCESSORS 1 @@ -552,6 +610,10 @@ int wrmsr_viridian_regs(uint32_t idx, uint64_t val) break; default: + if ( idx >= VIRIDIAN_MSR_MIN && idx <= VIRIDIAN_MSR_MAX ) + gprintk(XENLOG_WARNING, "write to unimplemented MSR %08x\n", + idx); + return 0; } @@ -675,6 +737,10 @@ int rdmsr_viridian_regs(uint32_t idx, uint64_t *val) } default: + if ( idx >= VIRIDIAN_MSR_MIN && idx <= VIRIDIAN_MSR_MAX ) + gprintk(XENLOG_WARNING, "read from unimplemented MSR %08x\n", + idx); + return 0; } @@ -828,6 +894,18 @@ int viridian_hypercall(struct cpu_user_regs *regs) } default: + gprintk(XENLOG_WARNING, "unimplemented hypercall %04x\n", + input.call_code); + + case HvGetPartitionId: + case HvExtCallQueryCapabilities: + /* + * These hypercalls seem to be erroneously issued by Windows + * despite neither AccessPartitionId nor EnableExtendedHypercalls + * being set in CPUID leaf 2. + * Given that return a status of 'invalid code' has not so far + * caused any problems it's not worth logging. + */ status = HV_STATUS_INVALID_HYPERCALL_CODE; break; }