All of lore.kernel.org
 help / color / mirror / Atom feed
* [PATCH] xen/x86: Clean up vm_event-related code in asm-x86/domain.h
@ 2015-08-14  9:54 Razvan Cojocaru
  2015-08-14 10:21 ` Jan Beulich
  0 siblings, 1 reply; 4+ messages in thread
From: Razvan Cojocaru @ 2015-08-14  9:54 UTC (permalink / raw)
  To: xen-devel
  Cc: tamas, keir, Razvan Cojocaru, george.dunlap, andrew.cooper3,
	jbeulich

As suggested by Jan Beulich, moved struct monitor_write_data from
struct arch_domain to struct arch_vcpu, as well as moving all
vm_event-related data from asm-x86/domain.h to struct vm_event,
and allocating it dynamically only when needed.

Signed-off-by: Razvan Cojocaru <rcojocaru@bitdefender.com>
---
 xen/arch/x86/domain.c        |   10 ++--------
 xen/arch/x86/hvm/emulate.c   |    6 +++---
 xen/arch/x86/hvm/hvm.c       |   32 ++++++++++++++++----------------
 xen/arch/x86/mm/p2m.c        |   24 ++++++++++++------------
 xen/arch/x86/vm_event.c      |   26 +++++++-------------------
 xen/include/asm-x86/domain.h |   26 ++++++++++++++------------
 6 files changed, 54 insertions(+), 70 deletions(-)

diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index 045f6ff..58e173e 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -424,9 +424,6 @@ int vcpu_initialise(struct vcpu *v)
 
     v->arch.flags = TF_kernel_mode;
 
-    /* By default, do not emulate */
-    v->arch.vm_event.emulate_flags = 0;
-
     rc = mapcache_vcpu_init(v);
     if ( rc )
         return rc;
@@ -511,8 +508,8 @@ int vcpu_initialise(struct vcpu *v)
 
 void vcpu_destroy(struct vcpu *v)
 {
-    xfree(v->arch.vm_event.emul_read_data);
-    v->arch.vm_event.emul_read_data = NULL;
+    xfree(v->arch.vm_event);
+    v->arch.vm_event = NULL;
 
     if ( is_pv_32bit_vcpu(v) )
     {
@@ -668,9 +665,6 @@ int arch_domain_create(struct domain *d, unsigned int domcr_flags,
 
 void arch_domain_destroy(struct domain *d)
 {
-    vfree(d->arch.event_write_data);
-    d->arch.event_write_data = NULL;
-
     if ( has_hvm_container_domain(d) )
         hvm_domain_destroy(d);
 
diff --git a/xen/arch/x86/hvm/emulate.c b/xen/arch/x86/hvm/emulate.c
index 30acb78..d0f98c8 100644
--- a/xen/arch/x86/hvm/emulate.c
+++ b/xen/arch/x86/hvm/emulate.c
@@ -71,12 +71,12 @@ static int set_context_data(void *buffer, unsigned int size)
 {
     struct vcpu *curr = current;
 
-    if ( curr->arch.vm_event.emul_read_data )
+    if ( curr->arch.vm_event )
     {
         unsigned int safe_size =
-            min(size, curr->arch.vm_event.emul_read_data->size);
+            min(size, curr->arch.vm_event->emul_read_data.size);
 
-        memcpy(buffer, curr->arch.vm_event.emul_read_data->data, safe_size);
+        memcpy(buffer, curr->arch.vm_event->emul_read_data.data, safe_size);
         memset(buffer + safe_size, 0, size - safe_size);
         return X86EMUL_OKAY;
     }
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index c957610..9bc698c 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -541,9 +541,9 @@ void hvm_do_resume(struct vcpu *v)
         break;
     }
 
-    if ( unlikely(d->arch.event_write_data) )
+    if ( unlikely(v->arch.vm_event) )
     {
-        struct monitor_write_data *w = &d->arch.event_write_data[v->vcpu_id];
+        struct monitor_write_data *w = &v->arch.vm_event->write_data;
 
         if ( w->do_write.msr )
         {
@@ -571,7 +571,7 @@ void hvm_do_resume(struct vcpu *v)
     }
 
     /* Inject pending hw/sw trap */
-    if ( v->arch.hvm_vcpu.inject_trap.vector != -1 ) 
+    if ( v->arch.hvm_vcpu.inject_trap.vector != -1 )
     {
         hvm_inject_trap(&v->arch.hvm_vcpu.inject_trap);
         v->arch.hvm_vcpu.inject_trap.vector = -1;
@@ -3371,13 +3371,13 @@ int hvm_set_cr0(unsigned long value, bool_t may_defer)
                                monitor_ctrlreg_bitmask(VM_EVENT_X86_CR0)) &&
          value != old_value )
     {
-        ASSERT(currad->event_write_data != NULL);
+        ASSERT(v->arch.vm_event != NULL);
 
         if ( hvm_event_crX(CR0, value, old_value) )
         {
             /* The actual write will occur in hvm_do_resume(), if permitted. */
-            currad->event_write_data[v->vcpu_id].do_write.cr0 = 1;
-            currad->event_write_data[v->vcpu_id].cr0 = value;
+            v->arch.vm_event->write_data.do_write.cr0 = 1;
+            v->arch.vm_event->write_data.cr0 = value;
 
             return X86EMUL_OKAY;
         }
@@ -3475,13 +3475,13 @@ int hvm_set_cr3(unsigned long value, bool_t may_defer)
                                monitor_ctrlreg_bitmask(VM_EVENT_X86_CR3)) &&
          value != old )
     {
-        ASSERT(currad->event_write_data != NULL);
+        ASSERT(v->arch.vm_event != NULL);
 
         if ( hvm_event_crX(CR3, value, old) )
         {
             /* The actual write will occur in hvm_do_resume(), if permitted. */
-            currad->event_write_data[v->vcpu_id].do_write.cr3 = 1;
-            currad->event_write_data[v->vcpu_id].cr3 = value;
+            v->arch.vm_event->write_data.do_write.cr3 = 1;
+            v->arch.vm_event->write_data.cr3 = value;
 
             return X86EMUL_OKAY;
         }
@@ -3549,13 +3549,13 @@ int hvm_set_cr4(unsigned long value, bool_t may_defer)
                                monitor_ctrlreg_bitmask(VM_EVENT_X86_CR4)) &&
          value != old_cr )
     {
-        ASSERT(currad->event_write_data != NULL);
+        ASSERT(v->arch.vm_event != NULL);
 
         if ( hvm_event_crX(CR4, value, old_cr) )
         {
             /* The actual write will occur in hvm_do_resume(), if permitted. */
-            currad->event_write_data[v->vcpu_id].do_write.cr4 = 1;
-            currad->event_write_data[v->vcpu_id].cr4 = value;
+            v->arch.vm_event->write_data.do_write.cr4 = 1;
+            v->arch.vm_event->write_data.cr4 = value;
 
             return X86EMUL_OKAY;
         }
@@ -4744,12 +4744,12 @@ int hvm_msr_write_intercept(unsigned int msr, uint64_t msr_content,
 
     if ( may_defer && unlikely(currad->monitor.mov_to_msr_enabled) )
     {
-        ASSERT(currad->event_write_data != NULL);
+        ASSERT(v->arch.vm_event != NULL);
 
         /* The actual write will occur in hvm_do_resume() (if permitted). */
-        currad->event_write_data[v->vcpu_id].do_write.msr = 1;
-        currad->event_write_data[v->vcpu_id].msr = msr;
-        currad->event_write_data[v->vcpu_id].value = msr_content;
+        v->arch.vm_event->write_data.do_write.msr = 1;
+        v->arch.vm_event->write_data.msr = msr;
+        v->arch.vm_event->write_data.value = msr_content;
 
         hvm_event_msr(msr, msr_content);
         return X86EMUL_OKAY;
diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c
index 7aafacc..530c47b 100644
--- a/xen/arch/x86/mm/p2m.c
+++ b/xen/arch/x86/mm/p2m.c
@@ -1551,11 +1551,10 @@ void p2m_mem_access_emulate_check(struct vcpu *v,
             }
         }
 
-        v->arch.vm_event.emulate_flags = violation ? rsp->flags : 0;
+        v->arch.vm_event->emulate_flags = violation ? rsp->flags : 0;
 
-        if ( (rsp->flags & VM_EVENT_FLAG_SET_EMUL_READ_DATA) &&
-             v->arch.vm_event.emul_read_data )
-            *v->arch.vm_event.emul_read_data = rsp->data.emul_read_data;
+        if ( (rsp->flags & VM_EVENT_FLAG_SET_EMUL_READ_DATA) )
+            v->arch.vm_event->emul_read_data = rsp->data.emul_read_data;
     }
 }
 
@@ -1638,34 +1637,35 @@ bool_t p2m_mem_access_check(paddr_t gpa, unsigned long gla,
     }
 
     /* The previous vm_event reply does not match the current state. */
-    if ( v->arch.vm_event.gpa != gpa || v->arch.vm_event.eip != eip )
+    if ( unlikely(v->arch.vm_event) &&
+         (v->arch.vm_event->gpa != gpa || v->arch.vm_event->eip != eip) )
     {
         /* Don't emulate the current instruction, send a new vm_event. */
-        v->arch.vm_event.emulate_flags = 0;
+        v->arch.vm_event->emulate_flags = 0;
 
         /*
          * Make sure to mark the current state to match it again against
          * the new vm_event about to be sent.
          */
-        v->arch.vm_event.gpa = gpa;
-        v->arch.vm_event.eip = eip;
+        v->arch.vm_event->gpa = gpa;
+        v->arch.vm_event->eip = eip;
     }
 
-    if ( v->arch.vm_event.emulate_flags )
+    if ( unlikely(v->arch.vm_event) && v->arch.vm_event->emulate_flags )
     {
         enum emul_kind kind = EMUL_KIND_NORMAL;
 
-        if ( v->arch.vm_event.emulate_flags &
+        if ( v->arch.vm_event->emulate_flags &
              VM_EVENT_FLAG_SET_EMUL_READ_DATA )
             kind = EMUL_KIND_SET_CONTEXT;
-        else if ( v->arch.vm_event.emulate_flags &
+        else if ( v->arch.vm_event->emulate_flags &
                   VM_EVENT_FLAG_EMULATE_NOWRITE )
             kind = EMUL_KIND_NOWRITE;
 
         hvm_mem_access_emulate_one(kind, TRAP_invalid_op,
                                    HVM_DELIVER_NO_ERROR_CODE);
 
-        v->arch.vm_event.emulate_flags = 0;
+        v->arch.vm_event->emulate_flags = 0;
         return 1;
     }
 
diff --git a/xen/arch/x86/vm_event.c b/xen/arch/x86/vm_event.c
index b32a839..27b875c 100644
--- a/xen/arch/x86/vm_event.c
+++ b/xen/arch/x86/vm_event.c
@@ -27,22 +27,14 @@ int vm_event_init_domain(struct domain *d)
 {
     struct vcpu *v;
 
-    if ( !d->arch.event_write_data )
-        d->arch.event_write_data =
-            vzalloc(sizeof(struct monitor_write_data) * d->max_vcpus);
-
-    if ( !d->arch.event_write_data )
-        return -ENOMEM;
-
     for_each_vcpu ( d, v )
     {
-        if ( v->arch.vm_event.emul_read_data )
+        if ( v->arch.vm_event )
             continue;
 
-        v->arch.vm_event.emul_read_data =
-            xzalloc(struct vm_event_emul_read_data);
+        v->arch.vm_event = xzalloc(struct vm_event);
 
-        if ( !v->arch.vm_event.emul_read_data )
+        if ( !v->arch.vm_event )
             return -ENOMEM;
     }
 
@@ -57,13 +49,10 @@ void vm_event_cleanup_domain(struct domain *d)
 {
     struct vcpu *v;
 
-    vfree(d->arch.event_write_data);
-    d->arch.event_write_data = NULL;
-
     for_each_vcpu ( d, v )
     {
-        xfree(v->arch.vm_event.emul_read_data);
-        v->arch.vm_event.emul_read_data = NULL;
+        xfree(v->arch.vm_event);
+        v->arch.vm_event = NULL;
     }
 }
 
@@ -79,10 +68,9 @@ void vm_event_register_write_resume(struct vcpu *v, vm_event_response_t *rsp)
 {
     if ( rsp->flags & VM_EVENT_FLAG_DENY )
     {
-        struct monitor_write_data *w =
-            &v->domain->arch.event_write_data[v->vcpu_id];
+        struct monitor_write_data *w = &v->arch.vm_event->write_data;
 
-        ASSERT(v->domain->arch.event_write_data != NULL);
+        ASSERT(w != NULL);
 
         switch ( rsp->reason )
         {
diff --git a/xen/include/asm-x86/domain.h b/xen/include/asm-x86/domain.h
index 0fce09e..3500dd8 100644
--- a/xen/include/asm-x86/domain.h
+++ b/xen/include/asm-x86/domain.h
@@ -8,6 +8,7 @@
 #include <asm/hvm/domain.h>
 #include <asm/e820.h>
 #include <asm/mce.h>
+#include <public/vm_event.h>
 #include <public/vcpu.h>
 #include <public/hvm/hvm_info_table.h>
 
@@ -385,8 +386,6 @@ struct arch_domain
 
     /* Mem_access emulation control */
     bool_t mem_access_emulate_enabled;
-
-    struct monitor_write_data *event_write_data;
 } __cacheline_aligned;
 
 #define has_arch_pdevs(d)    (!list_empty(&(d)->arch.pdev_list))
@@ -460,6 +459,18 @@ typedef enum __packed {
     SMAP_CHECK_DISABLED,        /* disable the check */
 } smap_check_policy_t;
 
+/*
+ * Should we emulate the next matching instruction on VCPU resume
+ * after a vm_event?
+ */
+struct vm_event {
+    uint32_t emulate_flags;
+    unsigned long gpa;
+    unsigned long eip;
+    struct vm_event_emul_read_data emul_read_data;
+    struct monitor_write_data write_data;
+};
+
 struct arch_vcpu
 {
     /*
@@ -533,16 +544,7 @@ struct arch_vcpu
     /* A secondary copy of the vcpu time info. */
     XEN_GUEST_HANDLE(vcpu_time_info_t) time_info_guest;
 
-    /*
-     * Should we emulate the next matching instruction on VCPU resume
-     * after a vm_event?
-     */
-    struct {
-        uint32_t emulate_flags;
-        unsigned long gpa;
-        unsigned long eip;
-        struct vm_event_emul_read_data *emul_read_data;
-    } vm_event;
+    struct vm_event *vm_event;
 };
 
 smap_check_policy_t smap_policy_change(struct vcpu *v,
-- 
1.7.9.5

^ permalink raw reply related	[flat|nested] 4+ messages in thread

* Re: [PATCH] xen/x86: Clean up vm_event-related code in asm-x86/domain.h
  2015-08-14  9:54 [PATCH] xen/x86: Clean up vm_event-related code in asm-x86/domain.h Razvan Cojocaru
@ 2015-08-14 10:21 ` Jan Beulich
  2015-08-14 10:30   ` Razvan Cojocaru
  0 siblings, 1 reply; 4+ messages in thread
From: Jan Beulich @ 2015-08-14 10:21 UTC (permalink / raw)
  To: Razvan Cojocaru; +Cc: george.dunlap, andrew.cooper3, tamas, keir, xen-devel

>>> On 14.08.15 at 11:54, <rcojocaru@bitdefender.com> wrote:
> @@ -571,7 +571,7 @@ void hvm_do_resume(struct vcpu *v)
>      }
>  
>      /* Inject pending hw/sw trap */
> -    if ( v->arch.hvm_vcpu.inject_trap.vector != -1 ) 
> +    if ( v->arch.hvm_vcpu.inject_trap.vector != -1 )

Stray whitespace change to unrelated code.

> @@ -3371,13 +3371,13 @@ int hvm_set_cr0(unsigned long value, bool_t 
> may_defer)
>                                 monitor_ctrlreg_bitmask(VM_EVENT_X86_CR0)) &&
>           value != old_value )
>      {
> -        ASSERT(currad->event_write_data != NULL);
> +        ASSERT(v->arch.vm_event != NULL);

May I recommend dropping the redundant != NULL namely in ASSERT()
expressions (the only effect they have is produce larger string literals
in debug builds).

>          if ( hvm_event_crX(CR0, value, old_value) )
>          {
>              /* The actual write will occur in hvm_do_resume(), if permitted. */
> -            currad->event_write_data[v->vcpu_id].do_write.cr0 = 1;
> -            currad->event_write_data[v->vcpu_id].cr0 = value;
> +            v->arch.vm_event->write_data.do_write.cr0 = 1;
> +            v->arch.vm_event->write_data.cr0 = value;

Looks like this leaves just a single use of currad in the function, in
which case I'd like to see the variable go away.

> --- a/xen/include/asm-x86/domain.h
> +++ b/xen/include/asm-x86/domain.h
> @@ -8,6 +8,7 @@
>  #include <asm/hvm/domain.h>
>  #include <asm/e820.h>
>  #include <asm/mce.h>
> +#include <public/vm_event.h>

It looks like both this and ...

> @@ -460,6 +459,18 @@ typedef enum __packed {
>      SMAP_CHECK_DISABLED,        /* disable the check */
>  } smap_check_policy_t;
>  
> +/*
> + * Should we emulate the next matching instruction on VCPU resume
> + * after a vm_event?
> + */
> +struct vm_event {
> +    uint32_t emulate_flags;
> +    unsigned long gpa;
> +    unsigned long eip;
> +    struct vm_event_emul_read_data emul_read_data;
> +    struct monitor_write_data write_data;
> +};

... this would better go into asm-x86/vm_event.h (despite it meaning
that the file will then be included by basically everything).

Jan

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] xen/x86: Clean up vm_event-related code in asm-x86/domain.h
  2015-08-14 10:21 ` Jan Beulich
@ 2015-08-14 10:30   ` Razvan Cojocaru
  2015-08-14 10:41     ` Jan Beulich
  0 siblings, 1 reply; 4+ messages in thread
From: Razvan Cojocaru @ 2015-08-14 10:30 UTC (permalink / raw)
  To: Jan Beulich; +Cc: george.dunlap, andrew.cooper3, tamas, keir, xen-devel

On 08/14/2015 01:21 PM, Jan Beulich wrote:
>>>> On 14.08.15 at 11:54, <rcojocaru@bitdefender.com> wrote:
>> @@ -571,7 +571,7 @@ void hvm_do_resume(struct vcpu *v)
>>      }
>>  
>>      /* Inject pending hw/sw trap */
>> -    if ( v->arch.hvm_vcpu.inject_trap.vector != -1 ) 
>> +    if ( v->arch.hvm_vcpu.inject_trap.vector != -1 )
> 
> Stray whitespace change to unrelated code.

Understood, thought I'd remove the trailing whitespace there, but I will
leave the unrelated code alone.

>> @@ -3371,13 +3371,13 @@ int hvm_set_cr0(unsigned long value, bool_t 
>> may_defer)
>>                                 monitor_ctrlreg_bitmask(VM_EVENT_X86_CR0)) &&
>>           value != old_value )
>>      {
>> -        ASSERT(currad->event_write_data != NULL);
>> +        ASSERT(v->arch.vm_event != NULL);
> 
> May I recommend dropping the redundant != NULL namely in ASSERT()
> expressions (the only effect they have is produce larger string literals
> in debug builds).

Of course, I'll change it.

>>          if ( hvm_event_crX(CR0, value, old_value) )
>>          {
>>              /* The actual write will occur in hvm_do_resume(), if permitted. */
>> -            currad->event_write_data[v->vcpu_id].do_write.cr0 = 1;
>> -            currad->event_write_data[v->vcpu_id].cr0 = value;
>> +            v->arch.vm_event->write_data.do_write.cr0 = 1;
>> +            v->arch.vm_event->write_data.cr0 = value;
> 
> Looks like this leaves just a single use of currad in the function, in
> which case I'd like to see the variable go away.

I'll remove it.

>> --- a/xen/include/asm-x86/domain.h
>> +++ b/xen/include/asm-x86/domain.h
>> @@ -8,6 +8,7 @@
>>  #include <asm/hvm/domain.h>
>>  #include <asm/e820.h>
>>  #include <asm/mce.h>
>> +#include <public/vm_event.h>
> 
> It looks like both this and ...
> 
>> @@ -460,6 +459,18 @@ typedef enum __packed {
>>      SMAP_CHECK_DISABLED,        /* disable the check */
>>  } smap_check_policy_t;
>>  
>> +/*
>> + * Should we emulate the next matching instruction on VCPU resume
>> + * after a vm_event?
>> + */
>> +struct vm_event {
>> +    uint32_t emulate_flags;
>> +    unsigned long gpa;
>> +    unsigned long eip;
>> +    struct vm_event_emul_read_data emul_read_data;
>> +    struct monitor_write_data write_data;
>> +};
> 
> ... this would better go into asm-x86/vm_event.h (despite it meaning
> that the file will then be included by basically everything).

Ack. Thank you for the prompt review!


Thanks,
Razvan

^ permalink raw reply	[flat|nested] 4+ messages in thread

* Re: [PATCH] xen/x86: Clean up vm_event-related code in asm-x86/domain.h
  2015-08-14 10:30   ` Razvan Cojocaru
@ 2015-08-14 10:41     ` Jan Beulich
  0 siblings, 0 replies; 4+ messages in thread
From: Jan Beulich @ 2015-08-14 10:41 UTC (permalink / raw)
  To: Razvan Cojocaru; +Cc: george.dunlap, andrew.cooper3, tamas, keir, xen-devel

>>> On 14.08.15 at 12:30, <rcojocaru@bitdefender.com> wrote:
> On 08/14/2015 01:21 PM, Jan Beulich wrote:
>>>>> On 14.08.15 at 11:54, <rcojocaru@bitdefender.com> wrote:
>>> @@ -460,6 +459,18 @@ typedef enum __packed {
>>>      SMAP_CHECK_DISABLED,        /* disable the check */
>>>  } smap_check_policy_t;
>>>  
>>> +/*
>>> + * Should we emulate the next matching instruction on VCPU resume
>>> + * after a vm_event?
>>> + */
>>> +struct vm_event {
>>> +    uint32_t emulate_flags;
>>> +    unsigned long gpa;
>>> +    unsigned long eip;
>>> +    struct vm_event_emul_read_data emul_read_data;
>>> +    struct monitor_write_data write_data;
>>> +};
>> 
>> ... this would better go into asm-x86/vm_event.h (despite it meaning
>> that the file will then be included by basically everything).
> 
> Ack.

And actually (having looked another time) I don't think this implies
including asm/vm_event.h from asm-x86/domain.h.

Jan

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2015-08-14 10:41 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-08-14  9:54 [PATCH] xen/x86: Clean up vm_event-related code in asm-x86/domain.h Razvan Cojocaru
2015-08-14 10:21 ` Jan Beulich
2015-08-14 10:30   ` Razvan Cojocaru
2015-08-14 10:41     ` Jan Beulich

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.