|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC V7 1/5] xen: Emulate with no writes
On 08/26/2014 05:40 PM, Jan Beulich wrote:
>>>> On 26.08.14 at 16:30, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>> On 08/26/2014 05:19 PM, Jan Beulich wrote:
>>>>>> On 26.08.14 at 16:01, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>>>> On 08/26/2014 04:56 PM, Jan Beulich wrote:
>>>>>>>> On 13.08.14 at 17:28, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>>>>>> +void hvm_emulate_one_full(bool_t nowrite, unsigned int trapnr,
>>>>>> + unsigned int errcode)
>>>>>> +{
>>>>>> + struct hvm_emulate_ctxt ctx = {{ 0 }};
>>>>>> + int rc;
>>>>>> +
>>>>>> + hvm_emulate_prepare(&ctx, guest_cpu_user_regs());
>>>>>> +
>>>>>> + if ( nowrite )
>>>>>> + rc = hvm_emulate_one_no_write(&ctx);
>>>>>> + else
>>>>>> + rc = hvm_emulate_one(&ctx);
>>>>>> +
>>>>>> + switch ( rc )
>>>>>> + {
>>>>>> + case X86EMUL_UNHANDLEABLE:
>>>>>> + gdprintk(XENLOG_DEBUG, "Emulation failed @ %04x:%lx: "
>>>>>> + "%02x %02x %02x %02x %02x %02x %02x %02x %02x %02x\n",
>>>>>> + hvmemul_get_seg_reg(x86_seg_cs, &ctx)->sel,
>>>>>> + ctx.insn_buf_eip,
>>>>>> + ctx.insn_buf[0], ctx.insn_buf[1],
>>>>>> + ctx.insn_buf[2], ctx.insn_buf[3],
>>>>>> + ctx.insn_buf[4], ctx.insn_buf[5],
>>>>>> + ctx.insn_buf[6], ctx.insn_buf[7],
>>>>>> + ctx.insn_buf[8], ctx.insn_buf[9]);
>>>>>> + hvm_inject_hw_exception(trapnr, errcode);
>>>>>> + break;
>>>>>> + case X86EMUL_EXCEPTION:
>>>>>> + if ( ctx.exn_pending )
>>>>>> + hvm_inject_hw_exception(ctx.exn_vector, ctx.exn_error_code);
>>>>>> + break;
>>>>>
>>>>> Shouldn't you act on X86EMUL_RETRY here? Or at least not fall through
>>>>> to the writeback below?
>>>>
>>>> Thanks for the review, I did initially loop around hvm_emulate_one()
>>>> until rc != X86EMUL_RETRY, but I've been told that that might block
>>>> against time calibration rendezvous points.
>>>
>>> In any event it strikes me as odd that you ignore that state
>>> altogether rather than propagating it back up, so that someone
>>> in suitable position to do the retry can invoke it.
>>
>> Since it's being called in the context of handling a mem_event response,
>> the X86EMUL_RETRY case would lead to a retry anyway (since we couldn't
>> emulate the current instruction, and we haven't lifted the page access
>> restrictions). So if we've failed to somehow modify the guest's EIP, the
>> instruction will hit the page again, cause a new mem_event and a new
>> attempt to emulate it - so that would seem to fit with the spirit of
>> X86EMUL_RETRY.
>
> Makes sense. Please add a brief comment to this effect when you
> add this specific case (bailing without writeback). One thing to
> consider though is which function you're in: Based on its name it
> has no connection to the specific mem-access use, and hence - with
> the behavior you intend to have here not being generically usable -
> renaming the function may be a good idea.
Will do, thank you very much for your comments!
Thanks,
Razvan Cojocaru
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |