WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] assumptions when hvm guest uses string instructions on M

To: Jan Beulich <jbeulich@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxx>
Subject: Re: [Xen-devel] assumptions when hvm guest uses string instructions on MMIO memory
From: Keir Fraser <keir@xxxxxxxxxxxxx>
Date: Wed, 29 Nov 2006 17:19:56 +0000
Delivery-date: Wed, 29 Nov 2006 09:20:02 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxx
In-reply-to: <456DC393.76E4.0078.0@xxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
Thread-index: AccT2pb41U+Uin/NEducNwAX8io7RQ==
Thread-topic: [Xen-devel] assumptions when hvm guest uses string instructions on MMIO memory
User-agent: Microsoft-Entourage/11.2.5.060620
On 29/11/06 16:29, "Jan Beulich" <jbeulich@xxxxxxxxxx> wrote:

> Likewise I find it at least strange that all the I/O related
> hvm_copy_{from,to}_guest_virt invocations have their return value
> cast to void instead of forcing page faults into the guest. While I
> can see the point for single datum instructions (the CPU supposedly
> did the checking, except perhaps for ins/outs), movs where the
> non-mmio address crosses a page boundary and lods/stos because
> they're not being broken up would still seem to cause issues. Even
> in the single datum case I think it would be much more consistent
> to force a fault into the guest rather than silently ignoring any
> problems.

Although it's not going to happen for 3.0.4 now, my changes to the
x86_emulate code are being done with the intention that it can replace the
mmio emulator for 3.0.5. This will present a clean uniform interface for all
memory accesses performed during emulation of an instruction.

So don't get too worked up about the deficiencies of the current mmio code,
but do feel free to kick the x86_emulate routines. :-)

 -- Keir


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>