[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v4 2/5] x86emul: generalize exception handling for rep_* hooks


  • To: Jan Beulich <JBeulich@xxxxxxxx>, xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Paul Durrant <Paul.Durrant@xxxxxxxxxx>
  • Date: Tue, 13 Dec 2016 15:15:42 +0000
  • Accept-language: en-GB, en-US
  • Cc: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>
  • Delivery-date: Tue, 13 Dec 2016 15:28:05 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xen.org>
  • Thread-index: AQHSVTPsx/BkO93Qg02twIRdWko2E6EF/QKQ
  • Thread-topic: [PATCH v4 2/5] x86emul: generalize exception handling for rep_* hooks

> -----Original Message-----
> From: Jan Beulich [mailto:JBeulich@xxxxxxxx]
> Sent: 13 December 2016 11:28
> To: xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
> Cc: Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>; Paul Durrant
> <Paul.Durrant@xxxxxxxxxx>
> Subject: [PATCH v4 2/5] x86emul: generalize exception handling for rep_*
> hooks
> 
> If any of those hooks returns X86EMUL_EXCEPTION, some register state
> should still get updated if some iterations have been performed (but
> the rIP update will get suppressed if not all of them did get handled).
> This updating is done by register_address_increment() and
> __put_rep_prefix() (which hence must no longer be bypassed). As a
> result put_rep_prefix() can then skip most of the writeback, but needs
> to ensure proper completion of the executed instruction.
> 
> While on the HVM side the VA -> LA -> PA translation process ensures
> that an exception would be raised on the first iteration only, doing so
> would unduly complicate the PV side code about to be added.
> 
> Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx>
> Reviewed-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>

Reviewed-by: Paul Durrant <paul.durrant@xxxxxxxxxx>

> ---
> v4: Move changes to xen/arch/x86/hvm/emulate.c here (from a later
>     patch). Re-base.
> v3: Broken out from a later patch.
> 
> --- a/xen/arch/x86/hvm/emulate.c
> +++ b/xen/arch/x86/hvm/emulate.c
> @@ -459,6 +459,7 @@ static int hvmemul_linear_to_phys(
>      {
>          if ( pfec & (PFEC_page_paged | PFEC_page_shared) )
>              return X86EMUL_RETRY;
> +        *reps = 0;
>          x86_emul_pagefault(pfec, addr, &hvmemul_ctxt->ctxt);
>          return X86EMUL_EXCEPTION;
>      }
> @@ -478,6 +479,7 @@ static int hvmemul_linear_to_phys(
>              if ( pfec & (PFEC_page_paged | PFEC_page_shared) )
>                  return X86EMUL_RETRY;
>              done /= bytes_per_rep;
> +            *reps = done;
>              if ( done == 0 )
>              {
>                  ASSERT(!reverse);
> @@ -486,7 +488,6 @@ static int hvmemul_linear_to_phys(
>                  x86_emul_pagefault(pfec, addr & PAGE_MASK, &hvmemul_ctxt-
> >ctxt);
>                  return X86EMUL_EXCEPTION;
>              }
> -            *reps = done;
>              break;
>          }
> 
> @@ -572,6 +573,7 @@ static int hvmemul_virtual_to_linear(
>       * neither know the exact error code to be used, nor can we easily
>       * determine the kind of exception (#GP or #TS) in that case.
>       */
> +    *reps = 0;
>      if ( is_x86_user_segment(seg) )
>          x86_emul_hw_exception((seg == x86_seg_ss)
>                                ? TRAP_stack_error
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -971,7 +971,11 @@ static void __put_rep_prefix(
> 
>  #define put_rep_prefix(reps_completed) ({                               \
>      if ( rep_prefix() )                                                 \
> +    {                                                                   \
>          __put_rep_prefix(&_regs, ctxt->regs, ad_bytes, reps_completed); \
> +        if ( unlikely(rc == X86EMUL_EXCEPTION) )                        \
> +            goto no_writeback;                                          \
> +    }                                                                   \
>  })
> 
>  /* Clip maximum repetitions so that the index register at most just wraps. */
> @@ -2919,14 +2923,9 @@ x86_emulate(
>          dst.mem.off = truncate_ea_and_reps(_regs.edi, nr_reps, dst.bytes);
>          if ( (rc = ioport_access_check(port, dst.bytes, ctxt, ops)) != 0 )
>              goto done;
> -        if ( (nr_reps > 1) && (ops->rep_ins != NULL) &&
> +        if ( (nr_reps == 1) || !ops->rep_ins ||
>               ((rc = ops->rep_ins(port, dst.mem.seg, dst.mem.off, dst.bytes,
> -                                 &nr_reps, ctxt)) != X86EMUL_UNHANDLEABLE) )
> -        {
> -            if ( rc != 0 )
> -                goto done;
> -        }
> -        else
> +                                 &nr_reps, ctxt)) == X86EMUL_UNHANDLEABLE) )
>          {
>              fail_if(ops->read_io == NULL);
>              if ( (rc = ops->read_io(port, dst.bytes, &dst.val, ctxt)) != 0 )
> @@ -2936,6 +2935,8 @@ x86_emulate(
>          }
>          register_address_adjust(_regs.edi, nr_reps * dst.bytes);
>          put_rep_prefix(nr_reps);
> +        if ( rc != X86EMUL_OKAY )
> +            goto done;
>          break;
>      }
> 
> @@ -2946,14 +2947,9 @@ x86_emulate(
>          ea.mem.off = truncate_ea_and_reps(_regs.esi, nr_reps, dst.bytes);
>          if ( (rc = ioport_access_check(port, dst.bytes, ctxt, ops)) != 0 )
>              goto done;
> -        if ( (nr_reps > 1) && (ops->rep_outs != NULL) &&
> +        if ( (nr_reps == 1) || !ops->rep_outs ||
>               ((rc = ops->rep_outs(ea.mem.seg, ea.mem.off, port, dst.bytes,
> -                                  &nr_reps, ctxt)) != X86EMUL_UNHANDLEABLE) )
> -        {
> -            if ( rc != 0 )
> -                goto done;
> -        }
> -        else
> +                                  &nr_reps, ctxt)) == X86EMUL_UNHANDLEABLE) )
>          {
>              if ( (rc = read_ulong(ea.mem.seg, truncate_ea(_regs.esi),
>                                    &dst.val, dst.bytes, ctxt, ops)) != 0 )
> @@ -2965,6 +2961,8 @@ x86_emulate(
>          }
>          register_address_adjust(_regs.esi, nr_reps * dst.bytes);
>          put_rep_prefix(nr_reps);
> +        if ( rc != X86EMUL_OKAY )
> +            goto done;
>          break;
>      }
> 
> @@ -3187,15 +3185,10 @@ x86_emulate(
>          dst.mem.seg = x86_seg_es;
>          dst.mem.off = truncate_ea_and_reps(_regs.edi, nr_reps, dst.bytes);
>          src.mem.off = truncate_ea_and_reps(_regs.esi, nr_reps, dst.bytes);
> -        if ( (nr_reps > 1) && (ops->rep_movs != NULL) &&
> +        if ( (nr_reps == 1) || !ops->rep_movs ||
>               ((rc = ops->rep_movs(ea.mem.seg, src.mem.off,
>                                    dst.mem.seg, dst.mem.off, dst.bytes,
> -                                  &nr_reps, ctxt)) != X86EMUL_UNHANDLEABLE) )
> -        {
> -            if ( rc != 0 )
> -                goto done;
> -        }
> -        else
> +                                  &nr_reps, ctxt)) == X86EMUL_UNHANDLEABLE) )
>          {
>              if ( (rc = read_ulong(ea.mem.seg, src.mem.off,
>                                    &dst.val, dst.bytes, ctxt, ops)) != 0 )
> @@ -3206,6 +3199,8 @@ x86_emulate(
>          register_address_adjust(_regs.esi, nr_reps * dst.bytes);
>          register_address_adjust(_regs.edi, nr_reps * dst.bytes);
>          put_rep_prefix(nr_reps);
> +        if ( rc != X86EMUL_OKAY )
> +            goto done;
>          break;
>      }
> 
> @@ -3244,11 +3239,12 @@ x86_emulate(
>              dst.val = src.val;
>              dst.type = OP_MEM;
>              nr_reps = 1;
> +            rc = X86EMUL_OKAY;
>          }
> -        else if ( rc != X86EMUL_OKAY )
> -            goto done;
>          register_address_adjust(_regs.edi, nr_reps * dst.bytes);
>          put_rep_prefix(nr_reps);
> +        if ( rc != X86EMUL_OKAY )
> +            goto done;
>          break;
>      }
> 
> 


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.