[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XEN][PATCH v5] xen/x86: guest_access: optimize raw_x_guest() for PV and HVM combinations


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>
  • Date: Thu, 18 Dec 2025 17:39:23 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=epam.com; dmarc=pass action=none header.from=epam.com; dkim=pass header.d=epam.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=yROL6qwXR/NO4o/u+IU8nol6Gq44egK5+UBEFIOJFHM=; b=dMn98kpi+5Vw2k8dfsD/JiMnV6fCM8HpIRacywKLeI3qm8nf74M6GZmEECs7s021a8SFpPZzGmDa1elbW3W98BY86uf7Qf3mOnI7Dzh9ySQ1sHrfG/L+z+EtU36CjTkkvud4BettGtOlBAHI9umT/s2+5h0PzYqKtWX9DdwGgsR7bBs9A1b3b3dLTDlyh626ck+rtQm+pTMjQBatCv9NOwx+mZvh15uCVsUXKooN4O8wgCI2cqdv6lImsTCzACHWSJNPkZl5hxvHFqodOLAQ2J5kHJlmYpnp71YcXJOqB2uW2+C+5kotHQ7ZqPPLllYBId62n5W0ygJAp0hYGMm7rQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=pZYwfkAPzycyP+OQuW155V0vgcbBIFNk8ZZPSWdrs3YMcAH+JENKLDokvVin2YvTXrXSTXUZQKSm3WW50Wl5gFxAqDCq0ebQS05PPjZWUh3fUtsLZV1zl2r/MpY1QXpU9rNodc19Zl7SKd7Xrecz+gXKHAtYcE03xrtaqlzmMutD8WbVb0TM6Ws5TiS4yNz7siNdcKJmtdfWdLPySuy+Q/fcns7Leo8a3flaPhZ7y0NnSyz7f6bh+AW3Xzn5JsTpk6hvheY4sxuQYA2XgP44MHT3oXZGUEWwiqdt2Fvng6KW0EXuttstREjNQZonhLN7T+KAThdJ4AhsJYWhbmeyVw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=epam.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, Jason Andryuk <jason.andryuk@xxxxxxx>, Teddy Astie <teddy.astie@xxxxxxxxxx>, Alejandro Vallejo <alejandro.garciavallejo@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 18 Dec 2025 15:39:34 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>



On 18.12.25 17:22, Jan Beulich wrote:
On 18.12.2025 14:59, Grygorii Strashko wrote:
From: Grygorii Strashko <grygorii_strashko@xxxxxxxx>

Xen uses below pattern for raw_x_guest() functions:

define raw_copy_to_guest(dst, src, len)        \
     (is_hvm_vcpu(current) ?                     \
      copy_to_user_hvm((dst), (src), (len)) :    \
      copy_to_guest_pv(dst, src, len))

This pattern works depending on CONFIG_PV/CONFIG_HVM as:
- PV=y and HVM=y
   Proper guest access function is selected depending on domain type.
- PV=y and HVM=n
   Only PV domains are possible. is_hvm_domain/vcpu() will constify to "false"
   and compiler will optimize code and skip HVM specific part.
- PV=n and HVM=y
   Only HVM domains are possible. is_hvm_domain/vcpu() will not be constified.
   No PV specific code will be optimized by compiler.
- PV=n and HVM=n
   No guests should possible. The code will still follow PV path.

Rework raw_x_guest() code to use static inline functions which account for
above PV/HVM possible configurations with main intention to optimize code
for (PV=n and HVM=y) case.

For the case (PV=n and HVM=n) return "len" value indicating a failure (no
guests should be possible in this case, which means no access to guest
memory should ever happen).

I agree with Teddy's sentiment towards HVM={y,n} not really mattering when
PV=n, as far as non-HVM domains go.

--- a/xen/arch/x86/include/asm/guest_access.h
+++ b/xen/arch/x86/include/asm/guest_access.h
@@ -13,26 +13,64 @@
  #include <asm/hvm/guest_access.h>
/* Raw access functions: no type checking. */
-#define raw_copy_to_guest(dst, src, len)        \
-    (is_hvm_vcpu(current) ?                     \
-     copy_to_user_hvm((dst), (src), (len)) :    \
-     copy_to_guest_pv(dst, src, len))
-#define raw_copy_from_guest(dst, src, len)      \
-    (is_hvm_vcpu(current) ?                     \
-     copy_from_user_hvm((dst), (src), (len)) :  \
-     copy_from_guest_pv(dst, src, len))
-#define raw_clear_guest(dst,  len)              \
-    (is_hvm_vcpu(current) ?                     \
-     clear_user_hvm((dst), (len)) :             \
-     clear_guest_pv(dst, len))
-#define __raw_copy_to_guest(dst, src, len)      \
-    (is_hvm_vcpu(current) ?                     \
-     copy_to_user_hvm((dst), (src), (len)) :    \
-     __copy_to_guest_pv(dst, src, len))
-#define __raw_copy_from_guest(dst, src, len)    \
-    (is_hvm_vcpu(current) ?                     \
-     copy_from_user_hvm((dst), (src), (len)) :  \
-     __copy_from_guest_pv(dst, src, len))
+static inline unsigned int raw_copy_to_guest(void *dst, const void *src,
+                                             unsigned int len)

A side effect of the converting to inline functions, besides being more
intrusive, is that now you will want to add proper __user modifiers.
See lib/copy-guest.c's use of them. That said, ..._user_hvm() functions
also don't have them, but imo wrongly so. Really I question the use of
pointers in that case, because they "point" into a different address
space, entirely inaccessible via use of those pointers. Hence adding
__user is going to be only a marginal improvement for the HVM case, but
is going to be wanted for the PV side of things.

ok. so it need to be like this in all funcs

-static inline unsigned int raw_copy_to_guest(void *dst, const void *src,
+static inline unsigned int raw_copy_to_guest(void __user *dst, const void *src,
                                              unsigned int len)



--
Best regards,
-grygorii




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.