From: Paul Durrant <Paul.Durrant@citrix.com>
To: 'Jan Beulich' <JBeulich@suse.com>,
xen-devel <xen-devel@lists.xenproject.org>
Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>,
"Tim (Xen.org)" <tim@xen.org>,
George Dunlap <George.Dunlap@citrix.com>
Subject: Re: [PATCH v3 19/25] x86emul: tell cmpxchg hook whether LOCK is in effect
Date: Fri, 8 Dec 2017 10:58:31 +0000 [thread overview]
Message-ID: <b088f58b1fcf40b59f69e40b64860e31@AMSPEX02CL03.citrite.net> (raw)
In-Reply-To: <5A295ACD0200007800195985@prv-mh.provo.novell.com>
> -----Original Message-----
> From: Jan Beulich [mailto:JBeulich@suse.com]
> Sent: 07 December 2017 14:14
> To: xen-devel <xen-devel@lists.xenproject.org>
> Cc: Andrew Cooper <Andrew.Cooper3@citrix.com>; Paul Durrant
> <Paul.Durrant@citrix.com>; George Dunlap <George.Dunlap@citrix.com>;
> Tim (Xen.org) <tim@xen.org>
> Subject: [PATCH v3 19/25] x86emul: tell cmpxchg hook whether LOCK is in
> effect
>
> This is necessary for the hook to correctly perform the operation.
>
> Signed-off-by: Jan Beulich <jbeulich@suse.com>
Reviewed-by: Paul Durrant <paul.durrant@citrix.com>
> ---
> v3: New.
>
> --- a/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
> +++ b/tools/fuzz/x86_instruction_emulator/fuzz-emul.c
> @@ -346,6 +346,7 @@ static int fuzz_cmpxchg(
> void *old,
> void *new,
> unsigned int bytes,
> + bool lock,
> struct x86_emulate_ctxt *ctxt)
> {
> /*
> --- a/tools/tests/x86_emulator/test_x86_emulator.c
> +++ b/tools/tests/x86_emulator/test_x86_emulator.c
> @@ -320,6 +320,7 @@ static int cmpxchg(
> void *old,
> void *new,
> unsigned int bytes,
> + bool lock,
> struct x86_emulate_ctxt *ctxt)
> {
> if ( verbose )
> --- a/xen/arch/x86/hvm/emulate.c
> +++ b/xen/arch/x86/hvm/emulate.c
> @@ -1249,6 +1249,7 @@ static int hvmemul_cmpxchg_discard(
> void *p_old,
> void *p_new,
> unsigned int bytes,
> + bool lock,
> struct x86_emulate_ctxt *ctxt)
> {
> return X86EMUL_OKAY;
> @@ -1292,6 +1293,7 @@ static int hvmemul_cmpxchg(
> void *p_old,
> void *p_new,
> unsigned int bytes,
> + bool lock,
> struct x86_emulate_ctxt *ctxt)
> {
> /* Fix this in case the guest is really relying on r-m-w atomicity. */
> --- a/xen/arch/x86/mm/shadow/common.c
> +++ b/xen/arch/x86/mm/shadow/common.c
> @@ -281,6 +281,7 @@ hvm_emulate_cmpxchg(enum x86_segment seg
> void *p_old,
> void *p_new,
> unsigned int bytes,
> + bool lock,
> struct x86_emulate_ctxt *ctxt)
> {
> struct sh_emulate_ctxt *sh_ctxt =
> --- a/xen/arch/x86/pv/ro-page-fault.c
> +++ b/xen/arch/x86/pv/ro-page-fault.c
> @@ -216,7 +216,7 @@ static int ptwr_emulated_write(enum x86_
>
> static int ptwr_emulated_cmpxchg(enum x86_segment seg, unsigned long
> offset,
> void *p_old, void *p_new, unsigned int bytes,
> - struct x86_emulate_ctxt *ctxt)
> + bool lock, struct x86_emulate_ctxt *ctxt)
> {
> paddr_t old = 0, new = 0;
>
> --- a/xen/arch/x86/x86_emulate/x86_emulate.c
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.c
> @@ -1973,7 +1973,7 @@ protmode_load_seg(
>
> fail_if(!ops->cmpxchg);
> switch ( (rc = ops->cmpxchg(sel_seg, (sel & 0xfff8) + 4, &desc.b,
> - &new_desc_b, sizeof(desc.b), ctxt)) )
> + &new_desc_b, sizeof(desc.b), true, ctxt)) )
> {
> case X86EMUL_OKAY:
> break;
> @@ -6982,7 +6982,8 @@ x86_emulate(
> }
>
> if ( (rc = ops->cmpxchg(ea.mem.seg, ea.mem.off, old, aux,
> - op_bytes, ctxt)) != X86EMUL_OKAY )
> + op_bytes, lock_prefix,
> + ctxt)) != X86EMUL_OKAY )
> goto done;
> _regs.eflags |= X86_EFLAGS_ZF;
> }
> @@ -8434,7 +8435,7 @@ x86_emulate(
> fail_if(!ops->cmpxchg);
> rc = ops->cmpxchg(
> dst.mem.seg, dst.mem.off, &dst.orig_val,
> - &dst.val, dst.bytes, ctxt);
> + &dst.val, dst.bytes, true, ctxt);
> }
> else
> {
> --- a/xen/arch/x86/x86_emulate/x86_emulate.h
> +++ b/xen/arch/x86/x86_emulate/x86_emulate.h
> @@ -237,10 +237,11 @@ struct x86_emulate_ops
> struct x86_emulate_ctxt *ctxt);
>
> /*
> - * cmpxchg: Emulate an atomic (LOCKed) CMPXCHG operation.
> + * cmpxchg: Emulate a CMPXCHG operation.
> * @p_old: [IN ] Pointer to value expected to be current at @addr.
> * @p_new: [IN ] Pointer to value to write to @addr.
> * @bytes: [IN ] Operation size (up to 8 (x86/32) or 16 (x86/64) bytes).
> + * @lock: [IN ] atomic (LOCKed) operation
> */
> int (*cmpxchg)(
> enum x86_segment seg,
> @@ -248,6 +249,7 @@ struct x86_emulate_ops
> void *p_old,
> void *p_new,
> unsigned int bytes,
> + bool lock,
> struct x86_emulate_ctxt *ctxt);
>
> /*
>
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2017-12-08 10:58 UTC|newest]
Thread overview: 85+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-12-07 13:49 [PATCH v3 00/25] x86: emulator enhancements Jan Beulich
2017-12-07 13:58 ` [PATCH v3 01/25] x86emul: make decode_register() return unsigned long * Jan Beulich
2017-12-07 18:32 ` Andrew Cooper
2017-12-08 7:44 ` Jan Beulich
2017-12-07 13:59 ` [PATCH v3 02/25] x86emul: build SIMD tests with -Os Jan Beulich
2017-12-07 18:32 ` Andrew Cooper
2017-12-07 14:00 ` [PATCH v3 03/25] x86emul: support F16C insns Jan Beulich
2018-01-31 18:58 ` Andrew Cooper
2017-12-07 14:01 ` [PATCH v3 04/25] x86emul: support FMA4 insns Jan Beulich
2018-01-31 19:51 ` Andrew Cooper
2017-12-07 14:02 ` [PATCH v3 05/25] x86emul: support FMA insns Jan Beulich
2018-02-01 16:15 ` Andrew Cooper
2017-12-07 14:03 ` [PATCH v3 06/25] x86emul: support most remaining AVX2 insns Jan Beulich
2018-02-01 19:45 ` Andrew Cooper
2018-02-02 9:29 ` Jan Beulich
2017-12-07 14:03 ` [PATCH v3 07/25] x86emul: support AVX2 gather insns Jan Beulich
2018-02-01 20:53 ` Andrew Cooper
2018-02-02 9:44 ` Jan Beulich
2017-12-07 14:04 ` [PATCH v3 08/25] x86emul: add tables for XOP 08 and 09 extension spaces Jan Beulich
2018-02-02 11:43 ` Andrew Cooper
2018-02-02 15:15 ` Jan Beulich
2018-02-02 16:02 ` Andrew Cooper
2017-12-07 14:04 ` [PATCH v3 09/25] x86emul: support XOP insns Jan Beulich
2018-02-02 12:03 ` Andrew Cooper
2018-02-02 15:17 ` Jan Beulich
2018-02-05 13:01 ` Andrew Cooper
2017-12-07 14:05 ` [PATCH v3 10/25] x86emul: support 3DNow! insns Jan Beulich
2018-02-02 13:02 ` Andrew Cooper
2018-02-02 15:22 ` Jan Beulich
2018-02-02 16:04 ` Andrew Cooper
2017-12-07 14:06 ` [PATCH v3 11/25] x86emul: place test blobs in executable section Jan Beulich
2018-02-02 13:03 ` Andrew Cooper
2018-02-02 15:27 ` Jan Beulich
2018-02-05 13:11 ` Andrew Cooper
2018-02-05 13:55 ` Jan Beulich
2017-12-07 14:07 ` [PATCH v3 12/25] x86emul: abstract out XCRn accesses Jan Beulich
2018-02-02 13:29 ` Andrew Cooper
2018-02-02 17:05 ` Jan Beulich
2017-12-07 14:08 ` [PATCH v3 13/25] x86emul: adjust_bnd() should check XCR0 Jan Beulich
2018-02-02 13:30 ` Andrew Cooper
2018-02-02 16:19 ` Jan Beulich
2018-02-02 16:28 ` Andrew Cooper
2017-12-07 14:09 ` [PATCH v3 14/25] x86emul: make all FPU emulation use the stub Jan Beulich
2018-02-02 13:37 ` Andrew Cooper
2017-12-07 14:10 ` [PATCH v3 15/25] x86/HVM: eliminate custom #MF/#XM handling Jan Beulich
2018-02-02 13:38 ` Andrew Cooper
2017-12-07 14:11 ` [PATCH v3 16/25] x86emul: support SWAPGS Jan Beulich
2018-02-02 13:41 ` Andrew Cooper
2018-02-02 16:24 ` Jan Beulich
2017-12-07 14:11 ` [PATCH v3 17/25] x86emul: emulate {MONITOR, MWAIT}{, X} as no-op Jan Beulich
2018-02-02 14:05 ` Andrew Cooper
2017-12-07 14:12 ` [PATCH v3 18/25] x86emul: add missing suffixes in test harness Jan Beulich
2018-02-02 14:13 ` Andrew Cooper
2017-12-07 14:14 ` [PATCH v3 19/25] x86emul: tell cmpxchg hook whether LOCK is in effect Jan Beulich
2017-12-08 10:58 ` Paul Durrant [this message]
2018-02-02 14:13 ` Andrew Cooper
2017-12-07 14:15 ` [PATCH v3 20/25] x86emul: correctly handle CMPXCHG* comparison failures Jan Beulich
2018-02-02 14:49 ` Andrew Cooper
2018-02-05 8:07 ` Jan Beulich
2018-02-05 13:38 ` Andrew Cooper
2017-12-07 14:16 ` [PATCH v3 21/25] x86emul: add read-modify-write hook Jan Beulich
2018-02-02 16:13 ` Andrew Cooper
2018-02-05 8:22 ` Jan Beulich
2018-02-05 14:21 ` Andrew Cooper
2018-02-05 14:56 ` Jan Beulich
2017-12-07 14:16 ` [PATCH v3 22/25] x86/HVM: do actual CMPXCHG in hvmemul_cmpxchg() Jan Beulich
2017-12-07 14:38 ` Razvan Cojocaru
2017-12-08 10:38 ` Paul Durrant
2018-02-02 16:36 ` Andrew Cooper
2018-02-05 8:32 ` Jan Beulich
2018-02-05 16:09 ` Andrew Cooper
2018-02-05 16:49 ` Jan Beulich
2018-02-05 16:57 ` Andrew Cooper
2018-02-05 17:05 ` Jan Beulich
2017-12-07 14:17 ` [PATCH v3 23/25] x86/HVM: make use of new read-modify-write emulator hook Jan Beulich
2017-12-08 10:41 ` Paul Durrant
2018-02-02 16:37 ` Andrew Cooper
2018-02-05 8:34 ` Jan Beulich
2018-02-05 16:15 ` Andrew Cooper
2017-12-07 14:18 ` [PATCH v3 24/25] x86/shadow: fully move unmap-dest into common code Jan Beulich
2018-02-02 16:46 ` Andrew Cooper
2017-12-07 14:19 ` [PATCH v3 25/25] x86/shadow: fold sh_x86_emulate_{write, cmpxchg}() into their only callers Jan Beulich
2018-02-02 16:52 ` Andrew Cooper
2018-02-05 8:42 ` Jan Beulich
2018-02-05 12:16 ` Tim Deegan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=b088f58b1fcf40b59f69e40b64860e31@AMSPEX02CL03.citrite.net \
--to=paul.durrant@citrix.com \
--cc=Andrew.Cooper3@citrix.com \
--cc=George.Dunlap@citrix.com \
--cc=JBeulich@suse.com \
--cc=tim@xen.org \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).