On Tue, Jul 7, 2015 at 4:22 AM, Jan Beulich <jbeul...@suse.com> wrote:

> >>> On 07.07.15 at 02:43, <tleng...@novetta.com> wrote:
> > --- a/xen/arch/x86/hvm/hvm.c
> > +++ b/xen/arch/x86/hvm/hvm.c
> > @@ -6431,6 +6431,11 @@ int hvm_debug_op(struct vcpu *v, int32_t op)
> >      return rc;
> >  }
> >
> > +bool_t hvm_is_singlestep_supported(void)
> > +{
> > +    return cpu_has_monitor_trap_flag;
> > +}
>
> This being a VMX flag, it should be tested in VMX code, i.e. you'd
> want to add a new hook to hvm_funcs.
>

Ack.


>
> > --- a/xen/arch/x86/monitor.c
> > +++ b/xen/arch/x86/monitor.c
> > @@ -42,6 +42,22 @@ int status_check(struct xen_domctl_monitor_op *mop,
> bool_t status)
> >      return 0;
> >  }
> >
> > +static inline
> > +void get_capabilities(struct domain *d, struct xen_domctl_monitor_op
> *mop)
> > +{
> > +    mop->event = 0;
> > +
> > +    if ( !is_hvm_domain(d) || !cpu_has_vmx )
> > +        return;
> > +
> > +    mop->event = (1 << XEN_DOMCTL_MONITOR_EVENT_WRITE_CTRLREG) |
> > +                 (1 << XEN_DOMCTL_MONITOR_EVENT_MOV_TO_MSR) |
> > +                 (1 << XEN_DOMCTL_MONITOR_EVENT_SOFTWARE_BREAKPOINT);
> > +
> > +    if ( hvm_is_singlestep_supported() )
> > +        mop->event |= (1 << XEN_DOMCTL_MONITOR_EVENT_SINGLESTEP);
> > +}
>
> And with this in mind I suppose the hook then would return a bit
> mask to be or-ed in here, instead of just a boolean flag.
>

I think the boolean flag return is a lot more generic. I rather keep it as
is - otherwise I have to mask the bitfield again in the toggle patch too.


>
> > @@ -51,6 +67,12 @@ int monitor_domctl(struct domain *d, struct
> xen_domctl_monitor_op *mop)
> >      if ( rc )
> >          return rc;
> >
> > +    if ( mop->op == XEN_DOMCTL_MONITOR_OP_GET_CAPABILITIES )
> > +    {
> > +        get_capabilities(d, mop);
> > +        return 0;
> > +    }
> > +
> >      /*
> >       * At the moment only Intel HVM domains are supported. However,
> event
> >       * delivery could be extended to AMD and PV domains.
>
> Considering that capabilities could be domain specific (as is also
> expressed by d being passed to get_capabilities()), I think the
> conditional above should actually move past the one following this
> comment.
>

Sure.


>
> > --- a/xen/common/domctl.c
> > +++ b/xen/common/domctl.c
> > @@ -1167,6 +1167,7 @@ long
> do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_domctl)
> >              break;
> >
> >          ret = monitor_domctl(d, &op->u.monitor_op);
> > +        copyback = 1;
> >          break;
>
> Conditional upon ret == 0?
>

Yeap, wasn't sure about if we should gate the copyback. My reasoning was in
doesn't hurt to copyback for enable/disable, it's just unnecessary. But
gating it is probably better.


> > @@ -1015,7 +1019,15 @@ DEFINE_XEN_GUEST_HANDLE(xen_domctl_psr_cmt_op_t);
> >
> >  struct xen_domctl_monitor_op {
> >      uint32_t op; /* XEN_DOMCTL_MONITOR_OP_* */
> > -    uint32_t event; /* XEN_DOMCTL_MONITOR_EVENT_* */
> > +
> > +    /*
> > +     * When used with ENABLE/DISABLE this has be set to
>
> ... has to be ... ?
>

Yeap.

Thanks,
Tamas
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel

Reply via email to