From: Avi Kivity <avi@redhat.com>
To: Jan Kiszka <jan.kiszka@web.de>
Cc: KVM list <kvm@vger.kernel.org>,
Sheng Yang <sheng@linux.intel.com>,
Marcelo Tosatti <mtosatti@redhat.com>
Subject: Re: Multiplexing RFLAGS.TF
Date: Mon, 02 Aug 2010 06:18:27 +0300 [thread overview]
Message-ID: <4C563903.9050901@redhat.com> (raw)
In-Reply-To: <4C561CB9.5020407@web.de>
On 08/02/2010 04:17 AM, Jan Kiszka wrote:
>
>
>> So we need an rflags_guest_owned_bits, usually set to -1ULL, but
>> sometimes (NMI, host debugging) clearing EFLAGS_TF. When we do that, we
>> need to intercept instructions that influence RFLAGS.TF (POPF, IRET,
>> INTn) and emulate them. Otherwise, the guest can disable tracing which
>> was enabled on behalf of the host.
> I was still waiting on some smart idea from AMD how to properly
> implement NMIs without having to fully emulate IRET. Probably there is
> no alternative...
Well, there's the existing singlestep implementation, it just needs to
be fixed not to assume the host has exclusive ownership of TF. It's
probably faster than emulation, and certainly more accurate.
>> We also need to drop the 'return 1' on the top of the function to allow
>> both guest and host tracing.
> Support for host and guest-initiated tracing at the same time would be
> nice, but I would not spend to much effort on this corner case of the
> corner cases. If it happens to fall off from the NMI fix, OK. But
> otherwise let the host rule TF if it wants to.
Taking an NMI while the guest is tracing itself is not a corner case. I
agree about simulataneous debugging.
>> On Intel, the situation is harder. We can't trap POPF or IRET. What we
>> can do, is use the Monitor Trap Flag on hosts that have it.
Actually, I think a POPF or IRET that disables TF still takes a last
trap? If so it's workable.
> Setting TF before POPF and IRET should give us at least the chance to
> provide host-overrules-guest tracing support. Adding monitor trap
> support would be nice. It would allow more things actually, but it may
> then require some additional knob in the user/kernel interface to
> control the mode (MTF steps into exceptions/interrupts, TF not).
There's also branch trace in debugctlmsr, that allows you to quickly
step out of a function.
>> Comments? Perhaps I missed something. Maybe I'll try writing a test
>> case to prove the brokenness, it's fashionable these days.
>>
>> Jan, as this is your code, are you interested in doing this?
> I'm not very keen on writing complex and error-prone opcode emulations,
> but in principle resolving the AMD issue is on my long to-do list - with
> moderate prio though.
>
Definitely all this code has to be accompanied by test cases.
--
I have a truly marvellous patch that fixes the bug which this
signature is too narrow to contain.
prev parent reply other threads:[~2010-08-02 3:18 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-07-29 14:37 Multiplexing RFLAGS.TF Avi Kivity
2010-08-02 1:17 ` Jan Kiszka
2010-08-02 3:18 ` Avi Kivity [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=4C563903.9050901@redhat.com \
--to=avi@redhat.com \
--cc=jan.kiszka@web.de \
--cc=kvm@vger.kernel.org \
--cc=mtosatti@redhat.com \
--cc=sheng@linux.intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox