|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2] mem_access: sanitize code around sending vm_event request
On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap <george.dunlap@xxxxxxxxxx> wrote:
> On 03/08/16 16:18, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 8:41 AM, George Dunlap <george.dunlap@xxxxxxxxxx>
>> wrote:
>>> On 01/08/16 17:52, Tamas K Lengyel wrote:
>>>> The two functions monitor_traps and mem_access_send_req duplicate some of
>>>> the
>>>> same functionality. The mem_access_send_req however leaves a lot of the
>>>> standard vm_event fields to be filled by other functions.
>>>>
>>>> Remove mem_access_send_req() completely, making use of monitor_traps() to
>>>> put
>>>> requests into the monitor ring. This in turn causes some cleanup around
>>>> the
>>>> old callsites of mem_access_send_req(), and on ARM, the introduction of the
>>>> __p2m_mem_access_send_req() helper to fill in common mem_access
>>>> information.
>>>> We also update monitor_traps to now include setting the common vcpu_id
>>>> field
>>>> so that all other call-sites can ommit this step.
>>>>
>>>> Finally, this change identifies that errors from mem_access_send_req() were
>>>> never checked. As errors constitute a problem with the monitor ring,
>>>> crashing the domain is the most appropriate action to take.
>>>>
>>>> Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
>>>> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>>>
>>> This appears to be v3, not v2?
>>
>> No, it's still just v2.
>>
>>>
>>>> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
>>>> index 812dbf6..27f9d26 100644
>>>> --- a/xen/arch/x86/mm/p2m.c
>>>> +++ b/xen/arch/x86/mm/p2m.c
>>>> @@ -1728,13 +1728,8 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned
>>>> long gla,
>>>> if ( req )
>>>> {
>>>> *req_ptr = req;
>>>> - req->reason = VM_EVENT_REASON_MEM_ACCESS;
>>>> -
>>>> - /* Pause the current VCPU */
>>>> - if ( p2ma != p2m_access_n2rwx )
>>>> - req->flags |= VM_EVENT_FLAG_VCPU_PAUSED;
>>>>
>>>> - /* Send request to mem event */
>>>> + req->reason = VM_EVENT_REASON_MEM_ACCESS;
>>>> req->u.mem_access.gfn = gfn;
>>>> req->u.mem_access.offset = gpa & ((1 << PAGE_SHIFT) - 1);
>>>> if ( npfec.gla_valid )
>>>> @@ -1750,23 +1745,10 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned
>>>> long gla,
>>>> req->u.mem_access.flags |= npfec.read_access ? MEM_ACCESS_R :
>>>> 0;
>>>> req->u.mem_access.flags |= npfec.write_access ? MEM_ACCESS_W :
>>>> 0;
>>>> req->u.mem_access.flags |= npfec.insn_fetch ? MEM_ACCESS_X :
>>>> 0;
>>>> - req->vcpu_id = v->vcpu_id;
>>>> -
>>>> - vm_event_fill_regs(req);
>>>> -
>>>> - if ( altp2m_active(v->domain) )
>>>> - {
>>>> - req->flags |= VM_EVENT_FLAG_ALTERNATE_P2M;
>>>> - req->altp2m_idx = vcpu_altp2m(v).p2midx;
>>>> - }
>>>> }
>>>>
>>>> - /* Pause the current VCPU */
>>>> - if ( p2ma != p2m_access_n2rwx )
>>>> - vm_event_vcpu_pause(v);
>>>> -
>>>> - /* VCPU may be paused, return whether we promoted automatically */
>>>> - return (p2ma == p2m_access_n2rwx);
>>>> + /* Return whether vCPU pause is required (aka. sync event) */
>>>> + return (p2ma != p2m_access_n2rwx);
>>>> }
>>>>
>>>> static inline
>>>
>>> p2m-bits:
>>>
>>> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
>>>
>>> But I agree with Julien -- this patch has several independent changes
>>> which makes it quite difficult to tell what's going on. I'm sure it's
>>> taken the two of us a lot more time together to figure out what is and
>>> is not happening than it would have for you to break it down into
>>> several little chunks.
>>>
>>> If you're not already familiar with it, I would recommend looking into
>>> stackgit. My modus operandi for things like this is to get things
>>> working in one big patch, then pop it off the stack and apply bits of it
>>> at a time to make a series.
>>>
>>> It's not only more considerate of your reviewers, but it's also a
>>> helpful exercise for yourself.
>>>
>>
>> The extra work doesn't just come from splitting the code itself
>> (although I don't know which bits would really make sense to split
>> here that would worth the effort) but testing a series on various
>> platforms.
>
> I don't understand this statement -- why is testing a 3-patch series
> more difficult than testing a one-patch series? Are you testing each
> individual patch?
>
Yes, I do. And when a patch touches multiple archs it adds up quite fast.
Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |