From: Euan Harris <euan.harris@citrix.com>
To: xen-devel@lists.xenproject.org
Cc: andrew.cooper3@citrix.com, kevin.tian@intel.com,
Euan Harris <euan.harris@citrix.com>,
jun.nakajima@intel.com, jbeulich@suse.com
Subject: [PATCH 6/9] x86/vvmx: Remove operand reading from decode_vmx_inst()
Date: Thu, 26 Oct 2017 18:03:16 +0100 [thread overview]
Message-ID: <1509037399-48926-7-git-send-email-euan.harris@citrix.com> (raw)
In-Reply-To: <1509037399-48926-1-git-send-email-euan.harris@citrix.com>
Use operand_read() to read memory operands instead of using the value
read by decode_vmx_inst() in the following functions:
* nvmx_handle_invept()
* nvmx_handle_invvpid()
* nvmx_handle_vmclear()
* nvmx_handle_vmptrld()
* nvmx_handle_vmxon()
* nvmx_handle_vmwrite()
Signed-off-by: Euan Harris <euan.harris@citrix.com>
---
xen/arch/x86/hvm/vmx/vvmx.c | 57 ++++++++++++++++++++++++---------------------
1 file changed, 31 insertions(+), 26 deletions(-)
diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c
index 7cda37b136..fc2123c7c0 100644
--- a/xen/arch/x86/hvm/vmx/vvmx.c
+++ b/xen/arch/x86/hvm/vmx/vvmx.c
@@ -456,7 +456,7 @@ gp_fault:
static int decode_vmx_inst(struct cpu_user_regs *regs,
struct vmx_inst_decoded *decode,
- unsigned long *poperandS, int vmxon_check)
+ int vmxon_check)
{
struct vcpu *v = current;
union vmx_inst_info info;
@@ -473,13 +473,6 @@ static int decode_vmx_inst(struct cpu_user_regs *regs,
if ( info.fields.memreg ) {
decode->op[0].type = VMX_INST_MEMREG_TYPE_REG;
decode->op[0].reg_idx = info.fields.reg1;
- if ( poperandS != NULL )
- {
- int rc = operand_read(poperandS, &decode->op[0], regs,
- decode->op[0].len);
- if ( rc != X86EMUL_OKAY )
- return rc;
- }
}
else
{
@@ -516,14 +509,6 @@ static int decode_vmx_inst(struct cpu_user_regs *regs,
decode->op[0].mem = base;
decode->op[0].len = size;
-
- if ( poperandS != NULL )
- {
- int rc = operand_read(poperandS, &decode->op[0], regs,
- decode->op[0].len);
- if ( rc != X86EMUL_OKAY )
- return rc;
- }
}
decode->op[1].type = VMX_INST_MEMREG_TYPE_REG;
@@ -1513,7 +1498,11 @@ int nvmx_handle_vmxon(struct cpu_user_regs *regs)
uint32_t nvmcs_revid;
int rc;
- rc = decode_vmx_inst(regs, &decode, &gpa, 1);
+ rc = decode_vmx_inst(regs, &decode, 1);
+ if ( rc != X86EMUL_OKAY )
+ return rc;
+
+ rc = operand_read(&gpa, &decode.op[0], regs, decode.op[0].len);
if ( rc != X86EMUL_OKAY )
return rc;
@@ -1729,7 +1718,11 @@ int nvmx_handle_vmptrld(struct cpu_user_regs *regs)
unsigned long gpa = 0;
int rc;
- rc = decode_vmx_inst(regs, &decode, &gpa, 0);
+ rc = decode_vmx_inst(regs, &decode, 0);
+ if ( rc != X86EMUL_OKAY )
+ return rc;
+
+ rc = operand_read(&gpa, &decode.op[0], regs, decode.op[0].len);
if ( rc != X86EMUL_OKAY )
return rc;
@@ -1801,7 +1794,7 @@ int nvmx_handle_vmptrst(struct cpu_user_regs *regs)
unsigned long gpa = 0;
int rc;
- rc = decode_vmx_inst(regs, &decode, NULL, 0);
+ rc = decode_vmx_inst(regs, &decode, 0);
if ( rc != X86EMUL_OKAY )
return rc;
@@ -1828,7 +1821,11 @@ int nvmx_handle_vmclear(struct cpu_user_regs *regs)
void *vvmcs;
int rc;
- rc = decode_vmx_inst(regs, &decode, &gpa, 0);
+ rc = decode_vmx_inst(regs, &decode, 0);
+ if ( rc != X86EMUL_OKAY )
+ return rc;
+
+ rc = operand_read(&gpa, &decode.op[0], regs, decode.op[0].len);
if ( rc != X86EMUL_OKAY )
return rc;
@@ -1879,7 +1876,7 @@ int nvmx_handle_vmread(struct cpu_user_regs *regs)
int rc;
unsigned long vmcs_encoding = 0;
- rc = decode_vmx_inst(regs, &decode, NULL, 0);
+ rc = decode_vmx_inst(regs, &decode, 0);
if ( rc != X86EMUL_OKAY )
return rc;
@@ -1928,10 +1925,13 @@ int nvmx_handle_vmwrite(struct cpu_user_regs *regs)
enum vmx_insn_errno err;
int rc;
- if ( decode_vmx_inst(regs, &decode, &operand, 0)
- != X86EMUL_OKAY )
+ if ( decode_vmx_inst(regs, &decode, 0) != X86EMUL_OKAY )
return X86EMUL_EXCEPTION;
+ rc = operand_read(&operand, &decode.op[0], regs, decode.op[0].len);
+ if ( rc != X86EMUL_OKAY )
+ return rc;
+
if ( vcpu_nestedhvm(v).nv_vvmcxaddr == INVALID_PADDR )
{
vmfail_invalid(regs);
@@ -1973,11 +1973,10 @@ int nvmx_handle_vmwrite(struct cpu_user_regs *regs)
int nvmx_handle_invept(struct cpu_user_regs *regs)
{
struct vmx_inst_decoded decode;
- unsigned long eptp;
unsigned long invept_type = 0;
int ret;
- if ( (ret = decode_vmx_inst(regs, &decode, &eptp, 0)) != X86EMUL_OKAY )
+ if ( (ret = decode_vmx_inst(regs, &decode, 0)) != X86EMUL_OKAY )
return ret;
ret = operand_read(&invept_type, &decode.op[1], regs, decode.op[1].len);
@@ -1988,6 +1987,12 @@ int nvmx_handle_invept(struct cpu_user_regs *regs)
{
case INVEPT_SINGLE_CONTEXT:
{
+ unsigned long eptp;
+
+ ret = operand_read(&eptp, &decode.op[0], regs, decode.op[0].len);
+ if ( ret )
+ return ret;
+
np2m_flush_base(current, eptp);
break;
}
@@ -2009,7 +2014,7 @@ int nvmx_handle_invvpid(struct cpu_user_regs *regs)
unsigned long invvpid_type = 0;
int ret;
- if ( (ret = decode_vmx_inst(regs, &decode, NULL, 0)) != X86EMUL_OKAY )
+ if ( (ret = decode_vmx_inst(regs, &decode, 0)) != X86EMUL_OKAY )
return ret;
ret = operand_read(&invvpid_type, &decode.op[1], regs, decode.op[1].len);
--
2.13.6
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2017-10-26 17:03 UTC|newest]
Thread overview: 24+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-10-26 17:03 [PATCH 0/9] x86/vvmx: Read instruction operands correctly on VM exit Euan Harris
2017-10-26 17:03 ` [PATCH 1/9] x86/vvmx: Remove enum vmx_regs_enc Euan Harris
2017-10-26 17:03 ` [PATCH 2/9] x86/vvmx: Unify operands in struct vmx_inst_decoded Euan Harris
2017-10-26 17:03 ` [PATCH 3/9] x86/vvmx: Extract operand reading logic into operand_read() Euan Harris
2017-11-27 17:01 ` Jan Beulich
2017-11-27 18:08 ` Andrew Cooper
2017-11-28 8:40 ` Jan Beulich
2017-11-28 8:14 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 4/9] x86/vvmx: Remove unnecessary VMX operand reads Euan Harris
2017-11-02 7:07 ` Tian, Kevin
2017-11-27 17:03 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 5/9] x86/vvmx: Replace direct calls to reg_read() with operand_read() Euan Harris
2017-10-26 17:03 ` Euan Harris [this message]
2017-10-26 17:03 ` [PATCH 7/9] x86/vvmx: Use correct sizes when reading operands Euan Harris
2017-11-28 8:32 ` Jan Beulich
2017-12-01 18:45 ` Andrew Cooper
2017-12-04 8:55 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 8/9] x86/hvm: Add hvm_copy_{to, from}_guest_virt() helpers Euan Harris
2017-11-28 8:38 ` Jan Beulich
2017-10-26 17:03 ` [PATCH 9/9] x86/vvmx: Use hvm_copy_{to, from}_guest_virt() to read operands Euan Harris
2017-11-28 8:49 ` Jan Beulich
2017-10-26 17:59 ` [PATCH 0/9] x86/vvmx: Read instruction operands correctly on VM exit Andrew Cooper
2017-11-02 7:23 ` Tian, Kevin
2017-11-02 18:39 ` Andrew Cooper
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1509037399-48926-7-git-send-email-euan.harris@citrix.com \
--to=euan.harris@citrix.com \
--cc=andrew.cooper3@citrix.com \
--cc=jbeulich@suse.com \
--cc=jun.nakajima@intel.com \
--cc=kevin.tian@intel.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).