|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC V7 1/5] xen: Emulate with no writes
>>> On 26.08.14 at 16:30, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
> On 08/26/2014 05:19 PM, Jan Beulich wrote:
>>>>> On 26.08.14 at 16:01, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>>> On 08/26/2014 04:56 PM, Jan Beulich wrote:
>>>>>>> On 13.08.14 at 17:28, <rcojocaru@xxxxxxxxxxxxxxx> wrote:
>>>>> +void hvm_emulate_one_full(bool_t nowrite, unsigned int trapnr,
>>>>> + unsigned int errcode)
>>>>> +{
>>>>> + struct hvm_emulate_ctxt ctx = {{ 0 }};
>>>>> + int rc;
>>>>> +
>>>>> + hvm_emulate_prepare(&ctx, guest_cpu_user_regs());
>>>>> +
>>>>> + if ( nowrite )
>>>>> + rc = hvm_emulate_one_no_write(&ctx);
>>>>> + else
>>>>> + rc = hvm_emulate_one(&ctx);
>>>>> +
>>>>> + switch ( rc )
>>>>> + {
>>>>> + case X86EMUL_UNHANDLEABLE:
>>>>> + gdprintk(XENLOG_DEBUG, "Emulation failed @ %04x:%lx: "
>>>>> + "%02x %02x %02x %02x %02x %02x %02x %02x %02x %02x\n",
>>>>> + hvmemul_get_seg_reg(x86_seg_cs, &ctx)->sel,
>>>>> + ctx.insn_buf_eip,
>>>>> + ctx.insn_buf[0], ctx.insn_buf[1],
>>>>> + ctx.insn_buf[2], ctx.insn_buf[3],
>>>>> + ctx.insn_buf[4], ctx.insn_buf[5],
>>>>> + ctx.insn_buf[6], ctx.insn_buf[7],
>>>>> + ctx.insn_buf[8], ctx.insn_buf[9]);
>>>>> + hvm_inject_hw_exception(trapnr, errcode);
>>>>> + break;
>>>>> + case X86EMUL_EXCEPTION:
>>>>> + if ( ctx.exn_pending )
>>>>> + hvm_inject_hw_exception(ctx.exn_vector, ctx.exn_error_code);
>>>>> + break;
>>>>
>>>> Shouldn't you act on X86EMUL_RETRY here? Or at least not fall through
>>>> to the writeback below?
>>>
>>> Thanks for the review, I did initially loop around hvm_emulate_one()
>>> until rc != X86EMUL_RETRY, but I've been told that that might block
>>> against time calibration rendezvous points.
>>
>> In any event it strikes me as odd that you ignore that state
>> altogether rather than propagating it back up, so that someone
>> in suitable position to do the retry can invoke it.
>
> Since it's being called in the context of handling a mem_event response,
> the X86EMUL_RETRY case would lead to a retry anyway (since we couldn't
> emulate the current instruction, and we haven't lifted the page access
> restrictions). So if we've failed to somehow modify the guest's EIP, the
> instruction will hit the page again, cause a new mem_event and a new
> attempt to emulate it - so that would seem to fit with the spirit of
> X86EMUL_RETRY.
Makes sense. Please add a brief comment to this effect when you
add this specific case (bailing without writeback). One thing to
consider though is which function you're in: Based on its name it
has no connection to the specific mem-access use, and hence - with
the behavior you intend to have here not being generically usable -
renaming the function may be a good idea.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |