[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-changelog] [xen-unstable] [IA64] vti fault handler clean up: improve the VTi domain fault handler



# HG changeset patch
# User Alex Williamson <alex.williamson@xxxxxx>
# Date 1197664677 25200
# Node ID 9ab95900afec2083fce4fe04926d67c09e0cba32
# Parent  fa80218de06a7c3c81a43c6bb176a159c9d4b768
[IA64] vti fault handler clean up: improve the VTi domain fault handler

Improve the VTi domain fault handler panic path.  Currently when a
VTi fault handler finds something wrong, it enters an infinite loop
in vmx_panic with interrupts masked.  It makes sense if hw-based
debugger is available.  However in most cases this isn't available,
especially for normal users.  This patch makes those panic paths
more user friendly by printing out the panic message.  The old
behaviour is left with vmx_panic configuration.

Signed-off-by: Isaku Yamahata <yamahata@xxxxxxxxxxxxx>
---
 xen/arch/ia64/Rules.mk           |    4 ++++
 xen/arch/ia64/vmx/vmx_ivt.S      |   19 ++++++++++++++++++-
 xen/arch/ia64/vmx/vmx_minstate.h |   14 +++++++++++++-
 3 files changed, 35 insertions(+), 2 deletions(-)

diff -r fa80218de06a -r 9ab95900afec xen/arch/ia64/Rules.mk
--- a/xen/arch/ia64/Rules.mk    Fri Dec 14 13:33:01 2007 -0700
+++ b/xen/arch/ia64/Rules.mk    Fri Dec 14 13:37:57 2007 -0700
@@ -7,6 +7,7 @@ xenoprof := y
 xenoprof := y
 no_warns ?= n
 vti_debug ?= n
+vmx_panic ?= n
 xen_ia64_expose_p2m    ?= y
 xen_ia64_pervcpu_vhpt  ?= y
 xen_ia64_tlb_track     ?= y
@@ -39,6 +40,9 @@ CFLAGS        += -g
 CFLAGS += -g
 ifeq ($(vti_debug),y)
 CFLAGS  += -DVTI_DEBUG
+endif
+ifeq ($(vmx_panic),y)
+CFLAGS  += -DCONFIG_VMX_PANIC
 endif
 ifeq ($(xen_ia64_expose_p2m),y)
 CFLAGS += -DCONFIG_XEN_IA64_EXPOSE_P2M
diff -r fa80218de06a -r 9ab95900afec xen/arch/ia64/vmx/vmx_ivt.S
--- a/xen/arch/ia64/vmx/vmx_ivt.S       Fri Dec 14 13:33:01 2007 -0700
+++ b/xen/arch/ia64/vmx/vmx_ivt.S       Fri Dec 14 13:37:57 2007 -0700
@@ -119,11 +119,12 @@ vmx_fault_##n:;                         
 (p7)br.sptk.many vmx_dispatch_reflection;           \
     br.sptk.many dispatch_to_fault_handler
 
+#ifdef CONFIG_VMX_PANIC
 GLOBAL_ENTRY(vmx_panic)
     br.sptk.many vmx_panic
     ;;
 END(vmx_panic)
-
+#endif
 
 
 
@@ -1353,6 +1354,7 @@ ENTRY(vmx_dispatch_reflection)
     VMX_SAVE_REST
     mov rp=r14
     ;;
+    P6_BR_CALL_PANIC(.Lvmx_dispatch_reflection_string)
     adds out4=16,r12
     br.call.sptk.many b6=vmx_reflect_interruption
 END(vmx_dispatch_reflection)
@@ -1375,6 +1377,7 @@ ENTRY(vmx_dispatch_virtualization_fault)
     VMX_SAVE_EXTRA
     mov rp=r14
     ;;
+    P6_BR_CALL_PANIC(.Lvmx_dispatch_virtualization_fault_string)
     adds out1=16,sp         //regs
     br.call.sptk.many b6=vmx_emulate
 END(vmx_dispatch_virtualization_fault)
@@ -1396,6 +1399,7 @@ GLOBAL_ENTRY(vmx_dispatch_vexirq)
     movl r14=ia64_leave_hypervisor
     ;;
     mov rp=r14
+    P6_BR_CALL_PANIC(.Lvmx_dispatch_vexirq_string)
     br.call.sptk.many b6=vmx_vexirq
 END(vmx_dispatch_vexirq)
 
@@ -1416,6 +1420,7 @@ ENTRY(vmx_dispatch_tlb_miss)
     VMX_SAVE_REST
     mov rp=r14
     ;;
+    P6_BR_CALL_PANIC(.Lvmx_dispatch_tlb_miss_string)
     adds out2=16,r12
     br.call.sptk.many b6=vmx_hpw_miss
 END(vmx_dispatch_tlb_miss)
@@ -1439,6 +1444,7 @@ ENTRY(vmx_dispatch_break_fault)
     VMX_SAVE_REST
     mov rp=r14
     ;;
+    P6_BR_CALL_PANIC(.Lvmx_dispatch_break_fault_string)
     adds out1=16,sp
     br.call.sptk.many b6=vmx_ia64_handle_break
     ;;
@@ -1463,3 +1469,14 @@ ENTRY(vmx_dispatch_interrupt)
     add out1=16,sp             // pass pointer to pt_regs as second arg
     br.call.sptk.many b6=ia64_handle_irq
 END(vmx_dispatch_interrupt)
+
+.Lvmx_dispatch_reflection_string:
+    .asciz "vmx_dispatch_reflection\n"
+.Lvmx_dispatch_virtualization_fault_string:
+    .asciz "vmx_dispatch_virtualization_fault\n"
+.Lvmx_dispatch_vexirq_string:
+    .asciz "vmx_dispatch_vexirq\n"
+.Lvmx_dispatch_tlb_miss_string:
+    .asciz "vmx_dispatch_tlb_miss\n"
+.Lvmx_dispatch_break_fault_string:
+    .asciz "vmx_dispatch_break_fault\n"
diff -r fa80218de06a -r 9ab95900afec xen/arch/ia64/vmx/vmx_minstate.h
--- a/xen/arch/ia64/vmx/vmx_minstate.h  Fri Dec 14 13:33:01 2007 -0700
+++ b/xen/arch/ia64/vmx/vmx_minstate.h  Fri Dec 14 13:37:57 2007 -0700
@@ -100,6 +100,8 @@
  *  r11 = FPSR_DEFAULT
  *  r12 = kernel sp (kernel virtual address)
  *  r13 = points to current task_struct (kernel virtual address)
+ *   p6 = (psr.vm || isr.ni)
+ *        panic if not external interrupt (fault in xen VMM)
  *  p15 = TRUE if psr.i is set in cr.ipsr
  *  predicate registers (other than p2, p3, and p15), b6, r3, r14, r15:
  *      preserved
@@ -107,6 +109,16 @@
  * Note that psr.ic is NOT turned on by this macro.  This is so that
  * we can pass interruption state as arguments to a handler.
  */
+
+#ifdef CONFIG_VMX_PANIC
+# define P6_BR_VMX_PANIC        (p6)br.spnt.few vmx_panic;
+#else
+# define P6_BR_VMX_PANIC        /* nothing */
+#endif
+
+#define P6_BR_CALL_PANIC(panic_string)  \
+(p6) movl out0=panic_string;            \
+(p6) br.call.spnt.few b6=panic;
 
 #define VMX_DO_SAVE_MIN(COVER,SAVE_IFS,EXTRA)                                  
         \
     mov r27=ar.rsc;                     /* M */                                
         \
@@ -123,7 +135,7 @@
     ;;                                                                         
         \
 (pUStk) tbit.nz.and p6,p0=r18,IA64_ISR_NI_BIT;                                 
         \
     ;;                                                                         
         \
-(p6)br.spnt.few vmx_panic;                                                     
         \
+    P6_BR_VMX_PANIC                                                            
         \
 (pUStk)VMX_MINSTATE_GET_CURRENT(r1);                                           
         \
     /*    mov r21=r16;  */                                                     
         \
     /* switch from user to kernel RBS: */                                      
         \

_______________________________________________
Xen-changelog mailing list
Xen-changelog@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-changelog


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.