[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3] hvm/svm: Implement CPUID events
On Fri, Feb 23, 2018 at 2:46 AM, Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> wrote: > At this moment the CPUID events for the AMD architecture are not > forwarded to the monitor layer. > > This patch adds the CPUID event to the common capabilities and then > forwards the event to the monitor layer. > > --- > Changes since V2: > - Pass the inst_len to svm_vmexit_do_cpuid() > > Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx> Acked-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx> > --- > xen/arch/x86/hvm/svm/svm.c | 27 ++++++++++++++++++--------- > xen/include/asm-x86/monitor.h | 2 +- > 2 files changed, 19 insertions(+), 10 deletions(-) > > diff --git a/xen/arch/x86/hvm/svm/svm.c b/xen/arch/x86/hvm/svm/svm.c > index e36ad05..8ae2ae5 100644 > --- a/xen/arch/x86/hvm/svm/svm.c > +++ b/xen/arch/x86/hvm/svm/svm.c > @@ -1799,19 +1799,15 @@ static void svm_fpu_dirty_intercept(void) > vmcb_set_cr0(vmcb, vmcb_get_cr0(vmcb) & ~X86_CR0_TS); > } > > -static void svm_vmexit_do_cpuid(struct cpu_user_regs *regs) > +static int svm_vmexit_do_cpuid(struct cpu_user_regs *regs, unsigned int > inst_len) > { > struct vcpu *curr = current; > - unsigned int inst_len; > struct cpuid_leaf res; > > - if ( (inst_len = __get_instruction_length(curr, INSTR_CPUID)) == 0 ) > - return; > - > if ( hvm_check_cpuid_faulting(curr) ) > { > hvm_inject_hw_exception(TRAP_gp_fault, 0); > - return; > + return 1; /* Don't advance the guest IP! */ > } > > guest_cpuid(curr, regs->eax, regs->ecx, &res); > @@ -1822,7 +1818,7 @@ static void svm_vmexit_do_cpuid(struct cpu_user_regs > *regs) > regs->rcx = res.c; > regs->rdx = res.d; > > - __update_guest_eip(regs, inst_len); > + return hvm_monitor_cpuid(inst_len, regs->eax, regs->ecx); > } > > static void svm_vmexit_do_cr_access( > @@ -2768,9 +2764,22 @@ void svm_vmexit_handler(struct cpu_user_regs *regs) > } > > case VMEXIT_CPUID: > - svm_vmexit_do_cpuid(regs); > - break; > + { > + unsigned int inst_len = __get_instruction_length(v, INSTR_CPUID); > + int rc = 0; > > + if ( inst_len == 0 ) > + break; > + > + rc = svm_vmexit_do_cpuid(regs, inst_len); > + > + if ( rc < 0 ) > + goto unexpected_exit_type; > + if ( !rc ) > + __update_guest_eip(regs, inst_len); /* Safe: CPUID */ > + > + break; > + } > case VMEXIT_HLT: > svm_vmexit_do_hlt(vmcb, regs); > break; > diff --git a/xen/include/asm-x86/monitor.h b/xen/include/asm-x86/monitor.h > index 7a9e1e8..99ed4b87 100644 > --- a/xen/include/asm-x86/monitor.h > +++ b/xen/include/asm-x86/monitor.h > @@ -81,12 +81,12 @@ static inline uint32_t > arch_monitor_get_capabilities(struct domain *d) > (1U << XEN_DOMCTL_MONITOR_EVENT_SOFTWARE_BREAKPOINT) | > (1U << XEN_DOMCTL_MONITOR_EVENT_MOV_TO_MSR) | > (1U << XEN_DOMCTL_MONITOR_EVENT_INTERRUPT) | > + (1U << XEN_DOMCTL_MONITOR_EVENT_CPUID) | > (1U << XEN_DOMCTL_MONITOR_EVENT_WRITE_CTRLREG)); > > if ( cpu_has_vmx ) > { > capabilities |= ((1U << XEN_DOMCTL_MONITOR_EVENT_DEBUG_EXCEPTION) | > - (1U << XEN_DOMCTL_MONITOR_EVENT_CPUID) | > (1U << > XEN_DOMCTL_MONITOR_EVENT_EMUL_UNIMPLEMENTED)); > > /* Since we know this is on VMX, we can just call the hvm func */ > -- > 2.7.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |