[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH for-next] x86/svm: Correct vm_event API for descriptor accesses


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx>
  • Date: Thu, 28 Nov 2019 14:46:22 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=bitdefender.com; dmarc=pass action=none header.from=bitdefender.com; dkim=pass header.d=bitdefender.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=kc6/HlTC/ulzvBda8/ZYJDeOH5h4q3j1zLNviOxHHRY=; b=DBv3cqUXtT8tDDixrm/glER1TlSp1g1/rt0L7wVvghG2NCAwZ1WouoCaVSTwTL0nBP9NwmlOeSvx1nOr8Dnb6Z9o2fTrSDz/Ds17N3V7Y5Vi42HPbRmVRR+PmHynl5jxDgLyidiEffKBfwmxS3E+m7eUql6xZfBqPwazdaGQvUGIuXLNZdGsTWW7jn9dJMNrvxo6RxrH7dQVuCuDxuPfa4TGiUqYlaHqg01QYLWUIJy3YsF/M/m8pZJZyxwc8WNFpPA5r570Suf3nTbkjpqEy4Sj6lrit85uYz8ez1/XRCAByTx3foBW14H5H0EA6j7GoMeHpFk/xDS/on5+ivRONw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=jVQWJQbZlkScaKh3U7YBYNnkarbzLpMhKiOy4grBpIqPz/MlqKXu91RNBbFx1ldaP6syi0YroBrYCY1ekpPt0KHM77cqHQxEwlX0UzFx03fQZFcrzu6SxdOp2cpVPwkXpq/DJY7cjKk3f0tGhoOv1hT8B2RgehoQoDvSZyqUaE3PcneXpu1nz/qMgGnoHzJYVM7hEJl5oFFRF4HBOswrg/Olr3RiOfrqr+7GytjhXjB0wBZccMzKT8I5BY/3m+xX5O9stNt61Kc64pU8Z9pw7WyBVhClbuEiLpYGsaaeBYlZ5P93+PvuTODmMfcROhJfLThiAhBDysxI1bqKAzQCmA==
  • Authentication-results: spf=none (sender IP is ) smtp.mailfrom=aisaila@xxxxxxxxxxxxxxx;
  • Cc: Petre Ovidiu PIRCALABU <ppircalabu@xxxxxxxxxxxxxxx>, Tamas K Lengyel <tamas@xxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Razvan COJOCARU <rcojocaru@xxxxxxxxxxxxxxx>, Adrian Pop <apop@xxxxxxxxxxxxxxx>, Jan Beulich <JBeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Thu, 28 Nov 2019 14:46:31 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHVpeE7MQoSVCksIUqIPDZofDbFxaegqXCA
  • Thread-topic: [PATCH for-next] x86/svm: Correct vm_event API for descriptor accesses


On 28.11.2019 13:44, Andrew Cooper wrote:
> c/s d0a699a389f1 "x86/monitor: add support for descriptor access events"
> introduced logic looking for what appeared to be exitinfo (not that this
> exists in SVM - exitinfo1 or 2 do), but actually passed the exit IDT vectoring
> information.  There is never any IDT vectoring involved in these intercepts so
> the value passed is always zero.
> 
> In fact, SVM doesn't provide any information, even in exitinfo1 and 2.  Note
> the error in the public API and state that this field is always 0, and drop
> the SVM logic in hvm_monitor_descriptor_access().
> 
> In the SVM vmexit handler itself, optimise the switch statement by observing
> that there is a linear transformation between the SVM exit_reason and
> VM_EVENT_DESC_* values.  (Bloat-o-meter reports 6028 => 5877 for a saving of
> 151 bytes).
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Reviewed-by: Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>

I agree with Tamas, good thing to have that field removed.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.