On 13/11/18 10:13, Jan Beulich wrote:
> Commit 3bdec530a5 ("x86/HVM: split page straddling emulated accesses in
> more cases") introduced a hvm_copy_to_guest_linear() attempt before
> falling back to hvmemul_linear_mmio_write(). This is wrong for the
> p2m_ioreq_server special case. That change widened a pre-existing issue
> though: Other writes to such pages also need to be failed (or forced
> through emulation), in particular hypercall buffer writes.
>
> Reported-by: ??? <???@citrix.com>
> Signed-off-by: Jan Beulich <jbeul...@suse.com>
>
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -3202,6 +3202,12 @@ static enum hvm_translation_result __hvm
>          if ( res != HVMTRANS_okay )
>              return res;
>  
> +        if ( (flags & HVMCOPY_to_guest) && p2mt == p2m_ioreq_server )

While this does address the issue, I'm concerned about hardcoding the
behaviour here.

p2m_ioreq_server doesn't mean "I want shadowing properties". It has an
as-yet unspecified per-ioreq-client meaning.

We either want to rename p2m_ioreq_server to something which indicates
its "allow-reads/emulate writes" behaviour, or design a way for the
ioreq client to specify the behaviour it wants.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to