Re: Where is the entry of hypercalls in kvm?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Thank you Alex for the reply, very glad to know you!!!

On Wed, Jun 30, 2010 at 4:56 PM, Alexander Graf <agraf@xxxxxxx> wrote:
>
> On 30.06.2010, at 10:17, Peter Teoh wrote:
>
>> Your questioned is answered here:
>>
>> http://www.spinics.net/lists/kvm/msg37526.html
>>
>> And check this paper out:
>>
>> http://ozlabs.org/~rusty/virtio-spec/virtio-paper.pdf
>>
>> The general concept to remember is that QEMU and KVM just execute the
>> input as binary stream....it does not know what "functions" it is
>> executing...so the binary stream can be any OS (windows / Linux
>> etc)....QEMU just setup the basic block (call basic blocks
>> translation) mechanism, and then execute it block by block.   Each
>> block by definition is demarcated by a branch/jump etc.   Within the
>> block if there is any privilege instruction, (eg, write MSR registers,
>> load LDT registers etc), then a transition will be made from guest in
>> QEMU into KVM to update the VMCB/VMCS information.   (these terms are
>> from Intel/AMD manual).
>
> Eh, no.
>
> There are two modes of operation:
>
> 1) TCG
> 2) KVM
>

Now I am clear, it is translate-all.c vs kvm-all.c as the two main
file in QEMU.   Thanks for that!

> In mode 1, qemu goes through target-xxx/translate.c and converts the basic blocks you were talking about above to native machine code on the host system using tcg (see the tcg directory). No KVM is involved, everything happens in user mode.
>
> In mode 2, qemu executes _everything_ by calling KVM. There is no guest code interpreted, looked at or whatever in qemu. Whenever the guest CPU runs, it runs because qemu called ioctrl(VCPU_RUN) on its kvm vcpu fd.
>

Now I don't understand.....guest codes usually have two parts --> one
running in ring3, and another in ring0, so if we were running
everything in KVM, won't it posed a security risks?   as far as I
know, VMware use ring1 to run ALL the guest codes, and transition to
ring0 whenever privilege instructions is encountered.   so what is the
equivalent mechanism in qemu?   Key issue I am facing with here is
basically "privilege insn", -----> only these should be executing in
kvm module, which is running in ring0, and the rest is best to be at
lower level?

>>
>> I have not seen any IOCTL calls in QEMU,
>
> See kvm*.c and target-xxx/kvm.c
>
>> but I suspect ultimately it
>> should drop to a VMRUN (for AMD, Intel called it VMLAUNCH or VMRESUME)
>> calls inside KVM, which can be found here:
>>
>> arch/x86/kvm/
>>
>> And the AMD specific virtualization is done in svm.c whereas that of
>> vmx.c is for Intel.
>>
>> Copying the remark in vmx.c:
>>
>> /*
>> * The exit handlers return 1 if the exit was handled fully and guest execution
>> * may resume.  Otherwise they set the kvm_run parameter to indicate what needs
>> * to be done to userspace and return 0.
>> */
>> static int (*kvm_vmx_exit_handlers[])(struct kvm_vcpu *vcpu) = {
>>        [EXIT_REASON_EXCEPTION_
>>
>> And after reading the Intel manual, u will understand that "exit" here
>> actually refers to the special set of privilege intel instructions,
>> which upon being executed by the guest OS, will immediately caused and
>> VMEXIT condition, and these are handled by the above handler in
>> kvm.ko.
>
> in kvm-xxx.ko for x86.
>
> Also, please don't top post :)
>
>
> Alex
>
>

Thanks again.

-- 
Regards,
Peter Teoh
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [KVM ARM]     [KVM ia64]     [KVM ppc]     [Virtualization Tools]     [Spice Development]     [Libvirt]     [Libvirt Users]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite Questions]     [Linux Kernel]     [Linux SCSI]     [XFree86]
  Powered by Linux