From: Zachary Amsden <zach@vmware.com>
To: Andi Kleen <ak@suse.de>
Cc: virtualization@lists.osdl.org, Chris Wright <chrisw@sous-sol.org>,
Ian Pratt <ian.pratt@xensource.com>,
xen-devel@lists.xensource.com, linux-kernel@vger.kernel.org
Subject: Re: [Xen-devel] Re: [RFC PATCH 18/35] Support gdt/idt/ldt handling on Xen.
Date: Wed, 22 Mar 2006 09:51:24 -0800 [thread overview]
Message-ID: <44218E9C.3060102@vmware.com> (raw)
In-Reply-To: <200603221530.51644.ak@suse.de>
Andi Kleen wrote:
> On Wednesday 22 March 2006 07:30, Chris Wright wrote:
>
>
>>
>> -#define load_TR_desc() __asm__ __volatile__("ltr %w0"::"q" (GDT_ENTRY_TSS*8))
>> -#define load_LDT_desc() __asm__ __volatile__("lldt %w0"::"q" (GDT_ENTRY_LDT*8))
>> -
>> -#define load_gdt(dtr) __asm__ __volatile("lgdt %0"::"m" (*dtr))
>> -#define load_idt(dtr) __asm__ __volatile("lidt %0"::"m" (*dtr))
>> -#define load_tr(tr) __asm__ __volatile("ltr %0"::"mr" (tr))
>> -#define load_ldt(ldt) __asm__ __volatile("lldt %0"::"mr" (ldt))
>> -
>> -#define store_gdt(dtr) __asm__ ("sgdt %0":"=m" (*dtr))
>> -#define store_idt(dtr) __asm__ ("sidt %0":"=m" (*dtr))
>> -#define store_tr(tr) __asm__ ("str %0":"=mr" (tr))
>> -#define store_ldt(ldt) __asm__ ("sldt %0":"=mr" (ldt))
>>
>
>
> These are all very infrequent except perhaps LLDT. I suspect trapping would
> work too. But ok.
>
Yes, trapping works fine. Even LLDT is infrequent. But, you do impose
a very large amount of complexity on the hypervisor by trapping on any
instruction. Suppose you wanted to write a minimal hypervisor, which
consisted of pretty much a wrapper based on the Xen or VMI interface
that just stole a couple pages of physical memory, and hooked trap
handlers by hooking the call out for lidt.
If you instead remove the hypervisor wrapper for lidt, and require the
hypervisor to trap and emulate it, you have just imposed an insidious
amount of overhead on it. It doesn't seem too much at first - trap and
emulate, right?
No. First, you have to create a special #GP handler for the general
protection fault. But the fault doesn't tell you anything about why it
happened - just that it was a general protection fault, and maybe a
segment related to it. To figure out what happened, you have to decode
the instruction stream. To decode the instruction stream, you have to
take the EIP pointer and read from it, right? Wrong. You have to
extract segment information from the code segment, apply segmentation
rules to the access, rule out invalid processor modes, deal with wrap
around conditions, etc. But lets say you do all that. Now, you have to
read the guest memory to decode. Which requires reading guest page
tables. The memory in question has to be mapped present and
executable. You have to deal conditionally with PAE / non-PAE paging
modes. And race conditions where self-modifying code can trick you into
decoding something that really didn't happen. Then, finally, you can
interpret the instruction, go through the whole process of reading guest
memory again (fortunately, this time, without segmentation), read the
guest IDT, and hook in your trap handlers where appropriate.
Yeah, it really is that bad, and that is really only a scratch on the
surface. Trap and emulate, while possible, is basically about as evil a
requirement as you can impose on a hypervisor. Everyone who is serious
about the market needs to support it in one form or another eventually,
but it raises the bar to such a point as to stop proliferation of
minimal hypervisors, which could make extremely useful research tools
for the community under an open source license.
Zach
next prev parent reply other threads:[~2006-03-22 17:54 UTC|newest]
Thread overview: 108+ messages / expand[flat|nested] mbox.gz Atom feed top
2006-03-22 6:30 [RFC PATCH 00/35] Xen i386 paravirtualization support Chris Wright
2006-03-22 6:30 ` [RFC PATCH 01/35] Add XEN config options and disable unsupported config options Chris Wright
2006-03-22 6:30 ` [RFC PATCH 02/35] Makefile support to build Xen subarch Chris Wright
2006-03-22 6:30 ` [RFC PATCH 03/35] Add Xen interface header files Chris Wright
2006-03-22 6:30 ` [RFC PATCH 04/35] Hypervisor " Chris Wright
2006-03-22 8:28 ` Arjan van de Ven
2006-03-22 9:31 ` Keir Fraser
2006-03-22 9:46 ` Arjan van de Ven
2006-03-22 11:32 ` David Schwartz
2006-03-22 14:29 ` Keir Fraser
2006-03-22 6:30 ` [RFC PATCH 05/35] Add sync bitops Chris Wright
2006-03-22 6:30 ` [RFC PATCH 06/35] Add vmlinuz build target Chris Wright
2006-03-22 6:30 ` [RFC PATCH 07/35] Make LOAD_OFFSET defined by subarch Chris Wright
2006-03-22 22:57 ` Dan Hecht
2006-03-27 8:18 ` Gerd Hoffmann
2006-03-22 6:30 ` [RFC PATCH 08/35] Add Xen-specific memory management definitions Chris Wright
2006-03-22 6:30 ` [RFC PATCH 09/35] Change __FIXADDR_TOP to leave room for the hypervisor Chris Wright
2006-03-22 17:27 ` Anthony Liguori
2006-03-22 17:32 ` Chris Wright
2006-03-22 6:30 ` [RFC PATCH 10/35] Add a new head.S start-of-day file for booting on Xen Chris Wright
2006-03-22 13:43 ` Andi Kleen
2006-03-22 18:58 ` Chris Wright
2006-03-22 18:45 ` Andi Kleen
2006-03-22 19:26 ` Chris Wright
2006-03-22 6:30 ` [RFC PATCH 11/35] Add support for Xen to entry.S Chris Wright
2006-03-22 13:55 ` Andi Kleen
2006-03-22 17:24 ` [Xen-devel] " Zachary Amsden
2006-03-22 6:30 ` [RFC PATCH 12/35] Add start-of-day setup hooks to subarch Chris Wright
2006-03-22 6:30 ` [RFC PATCH 13/35] Support loading an initrd when running on Xen Chris Wright
2006-03-22 14:22 ` Andi Kleen
2006-03-22 19:20 ` Chris Wright
2006-03-22 6:30 ` [RFC PATCH 14/35] subarch modify CPU capabilities Chris Wright
2006-03-22 8:35 ` [Xen-devel] " Zachary Amsden
2006-03-22 9:33 ` Keir Fraser
2006-03-22 19:29 ` Chris Wright
2006-03-22 6:30 ` [RFC PATCH 15/35] subarch support for controlling interrupt delivery Chris Wright
2006-03-22 6:30 ` [RFC PATCH 16/35] subarch support for interrupt and exception gates Chris Wright
2006-03-22 13:45 ` Andi Kleen
2006-03-22 20:54 ` Chris Wright
2006-03-22 6:30 ` [RFC PATCH 17/35] Segment register changes for Xen Chris Wright
2006-03-22 14:24 ` Andi Kleen
2006-03-22 19:33 ` Chris Wright
2006-03-23 0:16 ` Zachary Amsden
2006-03-22 6:30 ` [RFC PATCH 18/35] Support gdt/idt/ldt handling on Xen Chris Wright
2006-03-22 14:30 ` Andi Kleen
2006-03-22 17:51 ` Zachary Amsden [this message]
2006-03-22 17:36 ` [Xen-devel] " Andi Kleen
2006-03-22 6:30 ` [RFC PATCH 19/35] subarch support for control register accesses Chris Wright
2006-03-22 8:55 ` Zachary Amsden
2006-03-22 21:45 ` Chris Wright
2006-03-22 6:31 ` [RFC PATCH 20/35] subarch stack pointer update Chris Wright
2006-03-22 6:31 ` [RFC PATCH 21/35] subarch TLB support Chris Wright
2006-03-22 6:31 ` [RFC PATCH 22/35] subarch suport for idle loop (NO_IDLE_HZ for Xen) Chris Wright
2006-03-22 6:31 ` [RFC PATCH 23/35] Add support for Xen event channels Chris Wright
2006-03-22 8:36 ` Arjan van de Ven
2006-03-22 11:30 ` Keir Fraser
2006-03-22 14:07 ` Andi Kleen
2006-03-22 6:31 ` [RFC PATCH 24/35] subarch support for mask value for irq nubmers Chris Wright
2006-03-22 6:31 ` [RFC PATCH 25/35] Add Xen time abstractions Chris Wright
2006-03-22 8:38 ` Arjan van de Ven
2006-03-22 19:37 ` Chris Wright
2006-03-22 22:26 ` [Xen-devel] " Dan Hecht
2006-03-23 3:23 ` [Xen-devel] " Eli Collins
2006-03-23 6:47 ` Chris Wright
2006-03-22 6:31 ` [RFC PATCH 26/35] Add Xen subarch reboot support Chris Wright
2006-03-22 8:40 ` Arjan van de Ven
2006-03-22 10:22 ` Keir Fraser
2006-03-22 10:39 ` Arjan van de Ven
2006-03-22 10:52 ` Keir Fraser
2006-03-22 14:21 ` Andi Kleen
2006-03-22 20:59 ` Pavel Machek
2006-03-22 6:31 ` [RFC PATCH 27/35] Add nosegneg capability to the vsyscall page notes Chris Wright
2006-03-22 6:31 ` [RFC PATCH 28/35] add support for Xen feature queries Chris Wright
2006-03-22 8:42 ` Arjan van de Ven
2006-03-22 6:31 ` [RFC PATCH 29/35] Add the Xen virtual console driver Chris Wright
2006-03-22 8:43 ` Arjan van de Ven
2006-03-22 9:29 ` Keir Fraser
2006-03-22 14:17 ` Andi Kleen
2006-03-22 16:00 ` Anthony Liguori
2006-03-22 16:07 ` Keir Fraser
2006-03-22 16:14 ` Anthony Liguori
2006-03-22 6:31 ` [RFC PATCH 30/35] Add generic_page_range() function Chris Wright
2006-03-22 8:51 ` Zachary Amsden
2006-03-22 9:27 ` [Xen-devel] " Keir Fraser
2006-03-22 11:21 ` Nick Piggin
2006-03-22 14:33 ` Keir Fraser
2006-03-22 15:35 ` Keir Fraser
2006-03-23 0:15 ` Nick Piggin
2006-03-23 0:26 ` Nick Piggin
2006-03-22 6:31 ` [RFC PATCH 31/35] Add Xen grant table support Chris Wright
2006-03-22 8:45 ` Arjan van de Ven
2006-03-22 18:38 ` Chris Wright
2006-03-22 6:31 ` [RFC PATCH 32/35] Add Xen driver utility functions Chris Wright
2006-03-22 14:12 ` Andi Kleen
2006-03-22 6:31 ` [RFC PATCH 33/35] Add the Xenbus sysfs and virtual device hotplug driver Chris Wright
2006-03-22 8:53 ` Arjan van de Ven
2006-03-22 11:14 ` Keir Fraser
2006-03-22 6:31 ` [RFC PATCH 34/35] Add the Xen virtual network device driver Chris Wright
2006-03-22 8:59 ` Arjan van de Ven
2006-03-22 15:29 ` James Morris
2006-03-22 17:17 ` Stephen Hemminger
2006-03-22 6:31 ` [RFC PATCH 35/35] Add Xen virtual block " Chris Wright
2006-03-22 16:39 ` Anthony Liguori
2006-03-22 16:54 ` Christoph Hellwig
2006-03-27 8:42 ` Gerd Hoffmann
2006-03-22 17:15 ` [RFC PATCH 00/35] Xen i386 paravirtualization support Anthony Liguori
2006-03-22 17:27 ` Chris Wright
2006-03-22 17:50 ` Anthony Liguori
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=44218E9C.3060102@vmware.com \
--to=zach@vmware.com \
--cc=ak@suse.de \
--cc=chrisw@sous-sol.org \
--cc=ian.pratt@xensource.com \
--cc=linux-kernel@vger.kernel.org \
--cc=virtualization@lists.osdl.org \
--cc=xen-devel@lists.xensource.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox