This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
Home Products Support Community News


Re: [Xen-devel] [PATCH][SVM] Fix 32bit Windows guest VMs save/restore

To: <wei.huang2@xxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] [PATCH][SVM] Fix 32bit Windows guest VMs save/restore
From: Keir Fraser <keir@xxxxxxx>
Date: Mon, 31 Jan 2011 22:13:28 +0100
Cc: james.harper@xxxxxxxxxxxxxxxx
Delivery-date: Mon, 31 Jan 2011 13:14:42 -0800
Dkim-signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:sender:user-agent:date:subject:from:to:cc :message-id:thread-topic:thread-index:in-reply-to:mime-version :content-type:content-transfer-encoding; bh=/h8OZZMF0UKWtwNFNRsqLFue0fXHBlihAcSMbUiwuFs=; b=epWuU4yfAA7ZbXwdG5hSpWpINyKXlryPhTuGNRV+KaOEknWpI9+h+rr60IuNbwxW7D /BAO3vw0ENPUr35i0PnlhQflnzwfZAmP2i0vkvqwaFmPxMnIVYwF/ZMOBq4/iTFtDfl3 8mcVij/nehs/0GYlUG8riax4bRvZwadcWAuRo=
Domainkey-signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=sender:user-agent:date:subject:from:to:cc:message-id:thread-topic :thread-index:in-reply-to:mime-version:content-type :content-transfer-encoding; b=V8kI5yOlwyDGJjy+1Ehe6a4MW3aLGw4D7AT4+2bWIUJ++dQhBxO63AIEpVCV43eptt gB2u6/vihgqT3gKoCAkTK9gb0IY6TU4Y+UbXpSrxnTonR7dnM0fSih4BuxQ+bVda+RdM u1vXW+ltbwXTpuLo4rwCn6UayXEB0liwdJimM=
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <1296495223.2013.8.camel@weilaptop>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AcvBi7RQhJ+1CeXoA0aavUh0h3YWNg==
Thread-topic: [Xen-devel] [PATCH][SVM] Fix 32bit Windows guest VMs save/restore
User-agent: Microsoft-Entourage/
On 31/01/2011 18:33, "Wei Huang" <wei.huang2@xxxxxxx> wrote:

> The attached patch fixes the save/restore issue seen with 32bit Windows
> guest VMs. The root cause is that current Xen doesn't intercept
> SYSENTER-related MSRs for 32bit guest VMs. As a result, the
> guest_sysenter_xxx fields contain incorrect values and shouldn't be used
> for save/restore. This patch checks the LMA bit of EFER register in the
> save/restore code path.
> Please apply it to both Xen-4.0 and Xen-unstable trees.
> Reported-by: James Harper <james.harper@xxxxxxxxxxxxxxxx>
> Signed-off-by: Wei Huang <wei.huang2@xxxxxxx>
> Acked-by: Christoph Egger <christoph.egger@xxxxxxx>

Nacked-by: Keir Fraser <keir@xxxxxxx>

This handling of the SYSENTER MSRs is overly complicated. I suggest
reverting a bunch of the original handling of cross-vendor migration as
 * Never intercept the SYSENTER MSRs.
 * Remove the vcpu->arch.hvm_svm.guest_sysenter_* fields.
 * Always hvm save/restore from/to the values in the vmcb.
 * Modify svm_msr_read_intercept(MSR_IA32_SYSENTER_*) to svm_sync_vmcb() and
then read the sysenter msr value from vmcb
 * Modify svm_msr_write_intercept(MSR_IA32_SYSENTER_*) to svm_sync_vmcb(),
then modify the sysenter msr in the vmcb, and then svm_vmload().

Result is that we get rid of some redundant fields from the vcpu structure
and have one canonical place we always keep the sysenter msr values, in the
vmcb. The extra cost in the msr read/write functions is totally
inconsequential, and only used after guest migration from an Intel CPU
anyway. Hardly something to optimise for.

 -- Keir

> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel

Xen-devel mailing list