[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v6] arch/x86: Add registers to vm_event



Hi Tamas,

Is this ok for a ACK now?

Thanks,
Alex

On 30.10.2018 17:49, Alexandru Stefan ISAILA wrote:
> This patch adds a couple of regs to the vm_event that are used by
> the introspection. The base, limit and ar
> bits are compressed into a uint64_t union so as not to enlarge the
> vm_event.
> 
> Signed-off-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>
> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx>
> 
> ---
> Changes since V5:
>       - Rename x86_selector_reg to vm_event_x86_selector_reg.
> ---
>   xen/arch/x86/vm_event.c       | 71 +++++++++++++++++++++++++++++++----
>   xen/include/public/vm_event.h | 26 ++++++++++++-
>   2 files changed, 87 insertions(+), 10 deletions(-)
> 
> diff --git a/xen/arch/x86/vm_event.c b/xen/arch/x86/vm_event.c
> index 15de43c3e6..4e7b748010 100644
> --- a/xen/arch/x86/vm_event.c
> +++ b/xen/arch/x86/vm_event.c
> @@ -122,11 +122,66 @@ void vm_event_monitor_next_interrupt(struct vcpu *v)
>       v->arch.monitor.next_interrupt_enabled = true;
>   }
>   
> +static void vm_event_pack_segment_register(enum x86_segment segment,
> +                                           struct vm_event_regs_x86 *reg)
> +{
> +    struct segment_register seg;
> +
> +    hvm_get_segment_register(current, segment, &seg);
> +
> +    switch ( segment )
> +    {
> +    case x86_seg_ss:
> +        reg->ss_base = seg.base;
> +        reg->ss.limit = seg.g ? seg.limit >> 12 : seg.limit;
> +        reg->ss.ar = seg.attr;
> +        reg->ss_sel = seg.sel;
> +        break;
> +
> +    case x86_seg_fs:
> +        reg->fs_base = seg.base;
> +        reg->fs.limit = seg.g ? seg.limit >> 12 : seg.limit;
> +        reg->fs.ar = seg.attr;
> +        reg->fs_sel = seg.sel;
> +        break;
> +
> +    case x86_seg_gs:
> +        reg->gs_base = seg.base;
> +        reg->gs.limit = seg.g ? seg.limit >> 12 : seg.limit;
> +        reg->gs.ar = seg.attr;
> +        reg->gs_sel = seg.sel;
> +        break;
> +
> +    case x86_seg_cs:
> +        reg->cs_base = seg.base;
> +        reg->cs.limit = seg.g ? seg.limit >> 12 : seg.limit;
> +        reg->cs.ar = seg.attr;
> +        reg->cs_sel = seg.sel;
> +        break;
> +
> +    case x86_seg_ds:
> +        reg->ds_base = seg.base;
> +        reg->ds.limit = seg.g ? seg.limit >> 12 : seg.limit;
> +        reg->ds.ar = seg.attr;
> +        reg->ds_sel = seg.sel;
> +        break;
> +
> +    case x86_seg_es:
> +        reg->es_base = seg.base;
> +        reg->es.limit = seg.g ? seg.limit >> 12 : seg.limit;
> +        reg->es.ar = seg.attr;
> +        reg->es_sel = seg.sel;
> +        break;
> +
> +    default:
> +        ASSERT_UNREACHABLE();
> +    }
> +}
> +
>   void vm_event_fill_regs(vm_event_request_t *req)
>   {
>   #ifdef CONFIG_HVM
>       const struct cpu_user_regs *regs = guest_cpu_user_regs();
> -    struct segment_register seg;
>       struct hvm_hw_cpu ctxt = {};
>       struct vcpu *curr = current;
>   
> @@ -170,14 +225,14 @@ void vm_event_fill_regs(vm_event_request_t *req)
>       req->data.regs.x86.msr_star = ctxt.msr_star;
>       req->data.regs.x86.msr_lstar = ctxt.msr_lstar;
>   
> -    hvm_get_segment_register(curr, x86_seg_fs, &seg);
> -    req->data.regs.x86.fs_base = seg.base;
> -
> -    hvm_get_segment_register(curr, x86_seg_gs, &seg);
> -    req->data.regs.x86.gs_base = seg.base;
> +    vm_event_pack_segment_register(x86_seg_fs, &req->data.regs.x86);
> +    vm_event_pack_segment_register(x86_seg_gs, &req->data.regs.x86);
> +    vm_event_pack_segment_register(x86_seg_cs, &req->data.regs.x86);
> +    vm_event_pack_segment_register(x86_seg_ss, &req->data.regs.x86);
> +    vm_event_pack_segment_register(x86_seg_ds, &req->data.regs.x86);
> +    vm_event_pack_segment_register(x86_seg_es, &req->data.regs.x86);
>   
> -    hvm_get_segment_register(curr, x86_seg_cs, &seg);
> -    req->data.regs.x86.cs_arbytes = seg.attr;
> +    req->data.regs.x86.shadow_gs = ctxt.shadow_gs;
>   #endif
>   }
>   
> diff --git a/xen/include/public/vm_event.h b/xen/include/public/vm_event.h
> index 36e3f4685d..d1111f3139 100644
> --- a/xen/include/public/vm_event.h
> +++ b/xen/include/public/vm_event.h
> @@ -29,7 +29,7 @@
>   
>   #include "xen.h"
>   
> -#define VM_EVENT_INTERFACE_VERSION 0x00000003
> +#define VM_EVENT_INTERFACE_VERSION 0x00000004
>   
>   #if defined(__XEN__) || defined(__XEN_TOOLS__)
>   
> @@ -157,6 +157,12 @@
>   #define VM_EVENT_X86_CR4    2
>   #define VM_EVENT_X86_XCR0   3
>   
> +/* The limit field is right-shifted by 12 bits if .ar.g is set. */
> +struct vm_event_x86_selector_reg {
> +    uint32_t limit  :    20;
> +    uint32_t ar     :    12;
> +};
> +
>   /*
>    * Using custom vCPU structs (i.e. not hvm_hw_cpu) for both x86 and ARM
>    * so as to not fill the vm_event ring buffer too quickly.
> @@ -191,9 +197,25 @@ struct vm_event_regs_x86 {
>       uint64_t msr_efer;
>       uint64_t msr_star;
>       uint64_t msr_lstar;
> +    uint32_t cs_base;
> +    uint32_t ss_base;
> +    uint32_t ds_base;
> +    uint32_t es_base;
>       uint64_t fs_base;
>       uint64_t gs_base;
> -    uint32_t cs_arbytes;
> +    struct vm_event_x86_selector_reg cs;
> +    struct vm_event_x86_selector_reg ss;
> +    struct vm_event_x86_selector_reg ds;
> +    struct vm_event_x86_selector_reg es;
> +    struct vm_event_x86_selector_reg fs;
> +    struct vm_event_x86_selector_reg gs;
> +    uint64_t shadow_gs;
> +    uint16_t cs_sel;
> +    uint16_t ss_sel;
> +    uint16_t ds_sel;
> +    uint16_t es_sel;
> +    uint16_t fs_sel;
> +    uint16_t gs_sel;
>       uint32_t _pad;
>   };
>   
> 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.