On 05/07/2018 11:49 AM, Andrew Cooper wrote:
> On 07/05/18 16:46, Boris Ostrovsky wrote:
>> On 05/07/2018 11:29 AM, Andrew Cooper wrote:
>>> On 07/05/18 16:25, Jan Beulich wrote:
>>>>>>> On 07.05.18 at 16:19, <andrew.coop...@citrix.com> wrote:
>>>>> On 07/05/18 15:11, Jan Beulich wrote:
>>>>>>>>> On 04.05.18 at 17:11, <jbeul...@suse.com> wrote:
>>>>>>> --- a/xen/arch/x86/hvm/svm/entry.S
>>>>>>> +++ b/xen/arch/x86/hvm/svm/entry.S
>>>>>>> @@ -61,23 +61,8 @@ UNLIKELY_START(ne, nsvm_hap)
>>>>>>>          jmp  .Lsvm_do_resume
>>>>>>>  __UNLIKELY_END(nsvm_hap)
>>>>>>>  
>>>>>>> -        call svm_asid_handle_vmrun
>>>>>>> -
>>>>>>> -        cmpb $0,tb_init_done(%rip)
>>>>>>> -UNLIKELY_START(nz, svm_trace)
>>>>>>> -        call svm_trace_vmentry
>>>>>>> -UNLIKELY_END(svm_trace)
>>>>>>> -
>>>>>>> -        mov  VCPU_svm_vmcb(%rbx),%rcx
>>>>>>> -        mov  UREGS_rax(%rsp),%rax
>>>>>>> -        mov  %rax,VMCB_rax(%rcx)
>>>>>>> -        mov  UREGS_rip(%rsp),%rax
>>>>>>> -        mov  %rax,VMCB_rip(%rcx)
>>>>>>> -        mov  UREGS_rsp(%rsp),%rax
>>>>>>> -        mov  %rax,VMCB_rsp(%rcx)
>>>>>>> -        mov  UREGS_eflags(%rsp),%rax
>>>>>>> -        or   $X86_EFLAGS_MBS,%rax
>>>>>>> -        mov  %rax,VMCB_rflags(%rcx)
>>>>>>> +        mov  %rsp, %rdi
>>>>>>> +        call svm_vmenter_helper
>>>>>> While I had committed this earlier today, there's one concern I've just 
>>>>>> come
>>>>>> to think of: Now that we're calling into C land with CLGI in effect (for 
>>>>> more
>>>>>> than just the trivial svm_trace_vmentry()) we are at risk of confusing
>>>>>> parties using local_irq_is_enabled(), first and foremost
>>>>>> common/spinlock.c:check_lock(). While it's some extra overhead, I wonder
>>>>>> whether the call wouldn't better be framed by a CLI/STI pair.
>>>>> I can't see why the SVM vmentry path uses CLGI/STGI in the first place.
>>>>>
>>>>> The VMX path uses plain cli/sti and our NMI/MCE handlers can cope. 
>>>>> Furthermore, processing NMIs/MCEs at this point will be more efficient
>>>>> that taking a vmentry then immediately exiting again.
>>>> Perhaps you're right, i.e. we could replace all current CLGI/STGI by
>>>> CLI/STI, adding a single STGI right after VMRUN.
>> The APM say "It is assumed that VMM software cleared GIF some time before
>> executing the VMRUN instruction, to ensure an atomic state switch."
>>
>> Not sure if this is meant as suggestion or requirement.
> Hmm - that can probably be tested with this proposed patch and a very
> high frequency NMI perf counter.


This may only prove the we do need it, if the test without CLGI fails.

If the test passes I don't think we can say anything one way or the other.

I am adding Suravee and Brian, perhaps they know the answer (or can
check internally).


>
> Basically every other hypervisor does CLGI; VMSAVE (host state); VMLOAD
> (guest state); VMRUN, and Xen's lack of doing this is why we have to
> play with the IDT IST settings, as well as why we can't cope cleanly
> with stack overflows.
>

KVM manipulates both GIF and RFLAGS.IF.

-boris

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to