From mboxrd@z Thu Jan 1 00:00:00 1970 From: =?windows-1252?Q?Roger_Pau_Monn=E9?= Subject: Re: [PATCH v3 07/32] xen/x86: fix arch_set_info_guest for HVM guests Date: Mon, 27 Jul 2015 13:55:32 +0200 Message-ID: <55B61C34.1000804@citrix.com> References: <55B11CBE.8050704@citrix.com> <55B1208C.9090207@citrix.com> <55B211D70200007800094FCF@prv-mh.provo.novell.com> <55B20C9D.5070708@citrix.com> <55B233890200007800095124@prv-mh.provo.novell.com> <55B22B5A.8020304@citrix.com> <55B24F4A02000078000952CC@prv-mh.provo.novell.com> <55B25941.9@citrix.com> <55B27AAB02000078000954A0@prv-mh.provo.novell.com> <55B26DB1.4020302@citrix.com> <20150724173641.GA9565@l.oracle.com> Mime-Version: 1.0 Content-Type: text/plain; charset="windows-1252" Content-Transfer-Encoding: quoted-printable Return-path: Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1ZJh0N-0000Bc-3h for xen-devel@lists.xenproject.org; Mon, 27 Jul 2015 11:55:39 +0000 In-Reply-To: <20150724173641.GA9565@l.oracle.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Konrad Rzeszutek Wilk Cc: Ian Campbell , Andrew Cooper , David Vrabel , Jan Beulich , xen-devel@lists.xenproject.org, Boris Ostrovsky List-Id: xen-devel@lists.xenproject.org El 24/07/15 a les 19.36, Konrad Rzeszutek Wilk ha escrit: > On Fri, Jul 24, 2015 at 06:54:09PM +0200, Roger Pau Monn=E9 wrote: >> I have the feeling that we are over engineering this interface. IMHO we >> should only allow the user to set the control registers, efer (on amd64) >> and the GP registers. Segment selectors would be set by Xen to point to >> a flat segment suitable for the mode the guest has selected. I think >> that should be enough to get the guest OS into it's entry point, and >> then it can do whatever it wants. > = > If you are doing that why not use the old interface? Because the current structure contains quite a lot of PV fields, like the failsafe_callback, the GDT... Also the old structure is limited in a way that you can only use the x86- format if your kernel is compiled with , and we want to allow the vCPU to start in any mode, regardless of the mode the kernel is compiled with. >> >> If that's not suitable, then my second option would be to allow the >> guest to set the base, limit and AR bytes of the selectors, but not load >> a GDT. > = > They should be able to do any of those operations as a normal HVM > guest I would think? Yes, hence I would like to limit setting anything that's not essential to boot.