[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH 10/17] PVH xen: introduce vmx_pvh.c and pvh.c



On Wed, 24 Apr 2013 09:47:55 +0100
"Jan Beulich" <JBeulich@xxxxxxxx> wrote:

> >>> On 23.04.13 at 23:25, Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
> >>> wrote:
> > @@ -1503,7 +1503,8 @@ void vmx_do_resume(struct vcpu *v)
> >  
> >          vmx_clear_vmcs(v);
> >          vmx_load_vmcs(v);
> > -        if ( !is_pvh_vcpu(v) ) {
> > +        if ( !is_pvh_vcpu(v) )
> > +        {
> 
> Surely an unnecessary adjustment, if an earlier patch got it right
> from the beginning?

Hmm... I don't understand lot of the time code, but PVH uses PV time
ops right now, so don't need to worry about it. But the time thing needs
a revisit anyways with more vtsc modes added in phase II.

> > +    };
> > +
> > +    regs->eip += ilen;
> > +
> > +    /* gdbsx or another debugger. Never pause dom0 */
> > +    if ( vp->domain->domain_id != 0 && guest_kernel_mode(vp,
> > regs) )
> > +    {
> > +        dbgp1("[%d]PVH: domain pause for debugger\n",
> > smp_processor_id());
> > +        current->arch.gdbsx_vcpu_event = TRAP_int3;
> > +        domain_pause_for_debugger();
> > +        return 0;
> > +    }
> > +
> > +    regs->eip -= ilen;
> 
> Please move the first adjustment into the if() body, making the
> second adjustment here unnecessary.

Actually, there could more debuggers being used also, so if you don't
mind i'd like to leave it as is:

    regs->eip += ilen;

#if defined(XEN_KDB_CONFIG)
    if ( kdb_handle_trap_entry(TRAP_int3, regs) )
        return 0;
#endif
    /* gdbsx or another debugger. Never pause dom0 */
    if ( vp->domain->domain_id != 0 && guest_kernel_mode(vp, regs) )
......


> > +static int vmxit_invalid_op(struct cpu_user_regs *regs)
> > +{
> > +    ulong addr = 0;
> > +
> > +    if ( guest_kernel_mode(current, regs) ||
> > +         emulate_forced_invalid_op(regs, &addr) == 0 )
> > +    {
> > +        hvm_inject_hw_exception(TRAP_invalid_op,
> > HVM_DELIVER_NO_ERROR_CODE);
> > +        return 0;
> > +    }
> > +    if ( addr )
> > +        hvm_inject_page_fault(0, addr);
> 
> This cannot be conditional upon addr being non-zero.

Why not? rc = emulate_forced_invalid_op():

   rc == 0 =>  not a valid emul signature. inject #UD.
   rc == 1 && addr != 0 => copy failed, need to inject PF
   rc == 1 && addr == 0 => emul done succesfully 

 
> > +static int access_cr4(struct cpu_user_regs *regs, uint acc_typ,
> > uint64_t *regp) +{
> > +    if ( acc_typ == VMX_CONTROL_REG_ACCESS_TYPE_MOV_TO_CR )
> > +    {
> > +        u64 old_cr4 = __vmread(GUEST_CR4);
> > +
> > +        if ( (old_cr4 ^ (*regp)) & (X86_CR4_PSE | X86_CR4_PGE |
> > X86_CR4_PAE) )
> > +            vpid_sync_all();
> > +
> > +        __vmwrite(GUEST_CR4, *regp);
> 
> No modification of CR4_READ_SHADOW here?

Added. BTW, I think I need to also set following unconditionally: 

     *regp |= X86_CR4_VMXE | X86_CR4_MCE;
     __vmwrite(GUEST_CR4, *regp);

in case the guest is turning them off.
 
> > +static int vmxit_io_instr(struct cpu_user_regs *regs)
> > +{
> > +    int curr_lvl;
> > +    int requested = (regs->rflags >> 12) & 3;
> > +
> > +    read_vmcs_selectors(regs);
> > +    curr_lvl = regs->cs & 3;
> 
> Shouldn't you look at SS'es DPL instead?

Ok. It looks like CPL is stored in both CS and SS, so either
should be ok. But I changed it to ss. 

> > +    switch ( (uint16_t)exit_reason )
> > +    {
> > +        case EXIT_REASON_EXCEPTION_NMI:      /* 0 */
> > +            rc = vmxit_exception(regs);
> > +            break;
> 
> Why would an NMI be blindly reflected to the guest?

I wish it was named EXIT_REASON_EXCEPTION_OR_NMI.
Anyways, TRAP_machine_check is handled in caller. We handle other 
excpetions here.
 
> > +        case EXIT_REASON_CPUID:              /* 10 */
> > +        {
> > +            if ( guest_kernel_mode(vp, regs) )
> > +                pv_cpuid(regs);
> > +            else
> > +                pvh_user_cpuid(regs);
> 
> What's the reason for this distinction? I would think it's actually a
> benefit of PVH to allow also hiding unwanted features from guest
> user mode (like HVM, but unlike PV without CPUID faulting).

I was trying to keep it exactly as PV where a user mode would not
be trapped. I will just call pv_cpuid() for both then.
 
> > +int vmx_pvh_read_descriptor(unsigned int sel, const struct vcpu *v,
> > +                            const struct cpu_user_regs *regs,
> > +                            unsigned long *base, unsigned long
> > *limit,
> > +                            unsigned int *ar)
> > +{
> > +    unsigned int tmp_ar = 0;
> > +    ASSERT(v == current);
> > +    ASSERT(is_pvh_vcpu(v));
> > +
> > +    if ( sel == (unsigned int)regs->cs )
> > +    {
> > +        *base = __vmread(GUEST_CS_BASE);
> > +        *limit = __vmread(GUEST_CS_LIMIT);
> > +        tmp_ar = __vmread(GUEST_CS_AR_BYTES);
> > +    }
> > +    else if ( sel == (unsigned int)regs->ds )
> 
> This if/else-if sequence can't be right - a selector can be in more
> than one selector register (and one of them may have got reloaded
> after a GDT/LDT adjustment, while another may not), so you can't
> base the descriptor read upon the selector value. The caller will
> have to tell you which register it wants the descriptor for, not which
> selector.

Ah, right! Duh. I must have made the change same time as the read_sreg
macro.
 
thanks a lot for your time.
Mukesh


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.