From mboxrd@z Thu Jan 1 00:00:00 1970 From: Keir Fraser Subject: Re: [PATCH] x86/HVM: refuse doing string operations in certain situations Date: Fri, 20 Sep 2013 16:30:19 +0100 Message-ID: References: <523C64FD02000078000F4EF1@nat28.tlf.novell.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta3.messagelabs.com ([195.245.230.39]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1VN2fB-0002U7-61 for xen-devel@lists.xenproject.org; Fri, 20 Sep 2013 15:30:33 +0000 Received: by mail-wg0-f45.google.com with SMTP id y10so685413wgg.24 for ; Fri, 20 Sep 2013 08:30:31 -0700 (PDT) In-Reply-To: <523C64FD02000078000F4EF1@nat28.tlf.novell.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Jan Beulich , xen-devel Cc: Tim Deegan List-Id: xen-devel@lists.xenproject.org On 20/09/2013 14:08, "Jan Beulich" wrote: > We shouldn't do any acceleration for > - "rep movs" when either side is passed through MMIO or when both sides > are handled by qemu > - "rep ins" and "rep outs" when the memory operand is any kind of MMIO > > Signed-off-by: Jan Beulich Acked-by: Keir Fraser > --- a/xen/arch/x86/hvm/emulate.c > +++ b/xen/arch/x86/hvm/emulate.c > @@ -686,6 +686,7 @@ static int hvmemul_rep_ins( > unsigned long addr; > uint32_t pfec = PFEC_page_present | PFEC_write_access; > paddr_t gpa; > + p2m_type_t p2mt; > int rc; > > rc = hvmemul_virtual_to_linear( > @@ -702,6 +703,10 @@ static int hvmemul_rep_ins( > if ( rc != X86EMUL_OKAY ) > return rc; > > + (void) get_gfn_query_unlocked(current->domain, gpa >> PAGE_SHIFT, &p2mt); > + if ( p2mt == p2m_mmio_direct || p2mt == p2m_mmio_dm ) > + return X86EMUL_UNHANDLEABLE; > + > return hvmemul_do_pio(src_port, reps, bytes_per_rep, gpa, IOREQ_READ, > !!(ctxt->regs->eflags & X86_EFLAGS_DF), NULL); > } > @@ -719,6 +724,7 @@ static int hvmemul_rep_outs( > unsigned long addr; > uint32_t pfec = PFEC_page_present; > paddr_t gpa; > + p2m_type_t p2mt; > int rc; > > rc = hvmemul_virtual_to_linear( > @@ -735,6 +741,10 @@ static int hvmemul_rep_outs( > if ( rc != X86EMUL_OKAY ) > return rc; > > + (void) get_gfn_query_unlocked(current->domain, gpa >> PAGE_SHIFT, &p2mt); > + if ( p2mt == p2m_mmio_direct || p2mt == p2m_mmio_dm ) > + return X86EMUL_UNHANDLEABLE; > + > return hvmemul_do_pio(dst_port, reps, bytes_per_rep, gpa, IOREQ_WRITE, > !!(ctxt->regs->eflags & X86_EFLAGS_DF), NULL); > } > @@ -787,6 +797,10 @@ static int hvmemul_rep_movs( > (void) get_gfn_query_unlocked(current->domain, sgpa >> PAGE_SHIFT, > &sp2mt); > (void) get_gfn_query_unlocked(current->domain, dgpa >> PAGE_SHIFT, > &dp2mt); > > + if ( sp2mt == p2m_mmio_direct || dp2mt == p2m_mmio_direct || > + (sp2mt == p2m_mmio_dm && dp2mt == p2m_mmio_dm) ) > + return X86EMUL_UNHANDLEABLE; > + > if ( sp2mt == p2m_mmio_dm ) > return hvmemul_do_mmio( > sgpa, reps, bytes_per_rep, dgpa, IOREQ_READ, df, NULL); > > >