[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2] mem_access: sanitize code around sending vm_event request



On Wed, Aug 3, 2016 at 9:30 AM, George Dunlap <george.dunlap@xxxxxxxxxx> wrote:
> On 03/08/16 16:18, Tamas K Lengyel wrote:
>> On Wed, Aug 3, 2016 at 8:41 AM, George Dunlap <george.dunlap@xxxxxxxxxx> 
>> wrote:
>>> On 01/08/16 17:52, Tamas K Lengyel wrote:
>>>> The two functions monitor_traps and mem_access_send_req duplicate some of 
>>>> the
>>>> same functionality. The mem_access_send_req however leaves a lot of the
>>>> standard vm_event fields to be filled by other functions.
>>>>
>>>> Remove mem_access_send_req() completely, making use of monitor_traps() to 
>>>> put
>>>> requests into the monitor ring.  This in turn causes some cleanup around 
>>>> the
>>>> old callsites of mem_access_send_req(), and on ARM, the introduction of the
>>>> __p2m_mem_access_send_req() helper to fill in common mem_access 
>>>> information.
>>>> We also update monitor_traps to now include setting the common vcpu_id 
>>>> field
>>>> so that all other call-sites can ommit this step.
>>>>
>>>> Finally, this change identifies that errors from mem_access_send_req() were
>>>> never checked.  As errors constitute a problem with the monitor ring,
>>>> crashing the domain is the most appropriate action to take.
>>>>
>>>> Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx>
>>>> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
>>>
>>> This appears to be v3, not v2?
>>
>> No, it's still just v2.
>>
>>>
>>>> diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
>>>> index 812dbf6..27f9d26 100644
>>>> --- a/xen/arch/x86/mm/p2m.c
>>>> +++ b/xen/arch/x86/mm/p2m.c
>>>> @@ -1728,13 +1728,8 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned 
>>>> long gla,
>>>>      if ( req )
>>>>      {
>>>>          *req_ptr = req;
>>>> -        req->reason = VM_EVENT_REASON_MEM_ACCESS;
>>>> -
>>>> -        /* Pause the current VCPU */
>>>> -        if ( p2ma != p2m_access_n2rwx )
>>>> -            req->flags |= VM_EVENT_FLAG_VCPU_PAUSED;
>>>>
>>>> -        /* Send request to mem event */
>>>> +        req->reason = VM_EVENT_REASON_MEM_ACCESS;
>>>>          req->u.mem_access.gfn = gfn;
>>>>          req->u.mem_access.offset = gpa & ((1 << PAGE_SHIFT) - 1);
>>>>          if ( npfec.gla_valid )
>>>> @@ -1750,23 +1745,10 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned 
>>>> long gla,
>>>>          req->u.mem_access.flags |= npfec.read_access    ? MEM_ACCESS_R : 
>>>> 0;
>>>>          req->u.mem_access.flags |= npfec.write_access   ? MEM_ACCESS_W : 
>>>> 0;
>>>>          req->u.mem_access.flags |= npfec.insn_fetch     ? MEM_ACCESS_X : 
>>>> 0;
>>>> -        req->vcpu_id = v->vcpu_id;
>>>> -
>>>> -        vm_event_fill_regs(req);
>>>> -
>>>> -        if ( altp2m_active(v->domain) )
>>>> -        {
>>>> -            req->flags |= VM_EVENT_FLAG_ALTERNATE_P2M;
>>>> -            req->altp2m_idx = vcpu_altp2m(v).p2midx;
>>>> -        }
>>>>      }
>>>>
>>>> -    /* Pause the current VCPU */
>>>> -    if ( p2ma != p2m_access_n2rwx )
>>>> -        vm_event_vcpu_pause(v);
>>>> -
>>>> -    /* VCPU may be paused, return whether we promoted automatically */
>>>> -    return (p2ma == p2m_access_n2rwx);
>>>> +    /* Return whether vCPU pause is required (aka. sync event) */
>>>> +    return (p2ma != p2m_access_n2rwx);
>>>>  }
>>>>
>>>>  static inline
>>>
>>> p2m-bits:
>>>
>>> Acked-by: George Dunlap <george.dunlap@xxxxxxxxxx>
>>>
>>> But I agree with Julien -- this patch has several independent changes
>>> which makes it quite difficult to tell what's going on.  I'm sure it's
>>> taken the two of us a lot more time together to figure out what is and
>>> is not happening than it would have for you to break it down into
>>> several little chunks.
>>>
>>> If you're not already familiar with it, I would recommend looking into
>>> stackgit.  My modus operandi for things like this is to get things
>>> working in one big patch, then pop it off the stack and apply bits of it
>>> at a time to make a series.
>>>
>>> It's not only more considerate of your reviewers, but it's also a
>>> helpful exercise for yourself.
>>>
>>
>> The extra work doesn't just come from splitting the code itself
>> (although I don't know which bits would really make sense to split
>> here that would worth the effort) but testing a series on various
>> platforms.
>
> I don't understand this statement -- why is testing a 3-patch series
> more difficult than testing a one-patch series?  Are you testing each
> individual patch?
>

Yes, I do. And when a patch touches multiple archs it adds up quite fast.

Tamas

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.