[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] x86/emul: Hold x86_emulate() to strict X86EMUL_EXCEPTION requirements
commit 92cf67888aeb8a7dd8c1d2e8e835b8b271c13ce1 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Thu Mar 2 11:41:17 2017 +0000 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Fri Mar 3 11:46:37 2017 +0000 x86/emul: Hold x86_emulate() to strict X86EMUL_EXCEPTION requirements All known paths raising faults behind the back of the emulator have been fixed. Reinstate the original intended assertion concerning the behaviour of X86EMUL_EXCEPTION and ctxt->event_pending. As x86_emulate_wrapper() now covers both PV and HVM guests properly, there is no need for the PV assertions following calls to x86_emulate(). Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> --- xen/arch/x86/mm.c | 6 ------ xen/arch/x86/traps.c | 3 --- xen/arch/x86/x86_emulate/x86_emulate.c | 15 +++++---------- 3 files changed, 5 insertions(+), 19 deletions(-) diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index 1661e66..7bc951d 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -5420,9 +5420,6 @@ int ptwr_do_page_fault(struct vcpu *v, unsigned long addr, page_unlock(page); put_page(page); - /* More strict than x86_emulate_wrapper(), as this is now true for PV. */ - ASSERT(ptwr_ctxt.ctxt.event_pending == (rc == X86EMUL_EXCEPTION)); - switch ( rc ) { case X86EMUL_EXCEPTION: @@ -5574,9 +5571,6 @@ int mmio_ro_do_page_fault(struct vcpu *v, unsigned long addr, else rc = x86_emulate(&ctxt, &mmio_ro_emulate_ops); - /* More strict than x86_emulate_wrapper(), as this is now true for PV. */ - ASSERT(ctxt.event_pending == (rc == X86EMUL_EXCEPTION)); - switch ( rc ) { case X86EMUL_EXCEPTION: diff --git a/xen/arch/x86/traps.c b/xen/arch/x86/traps.c index 13a609b..08b0070 100644 --- a/xen/arch/x86/traps.c +++ b/xen/arch/x86/traps.c @@ -3004,9 +3004,6 @@ static int emulate_privileged_op(struct cpu_user_regs *regs) regs->eflags |= X86_EFLAGS_IF; regs->eflags &= ~X86_EFLAGS_IOPL; - /* More strict than x86_emulate_wrapper(). */ - ASSERT(ctxt.ctxt.event_pending == (rc == X86EMUL_EXCEPTION)); - switch ( rc ) { case X86EMUL_OKAY: diff --git a/xen/arch/x86/x86_emulate/x86_emulate.c b/xen/arch/x86/x86_emulate/x86_emulate.c index 667049d..ad62420 100644 --- a/xen/arch/x86/x86_emulate/x86_emulate.c +++ b/xen/arch/x86/x86_emulate/x86_emulate.c @@ -6307,17 +6307,12 @@ int x86_emulate_wrapper( ASSERT(ctxt->regs->r(ip) == orig_ip); /* - * TODO: Make this true: - * - ASSERT(ctxt->event_pending == (rc == X86EMUL_EXCEPTION)); - * - * Some codepaths still raise exceptions behind the back of the - * emulator. (i.e. return X86EMUL_EXCEPTION but without - * event_pending being set). In the meantime, use a slightly - * relaxed check... + * An event being pending should exactly match returning + * X86EMUL_EXCEPTION. (If this trips, the chances are a codepath has + * called hvm_inject_hw_exception() rather than using + * x86_emul_hw_exception().) */ - if ( ctxt->event_pending ) - ASSERT(rc == X86EMUL_EXCEPTION); + ASSERT(ctxt->event_pending == (rc == X86EMUL_EXCEPTION)); return rc; } -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |