[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen master] x86/traps: Lift all non-entrypoint logic in entry_int82() up into C
commit c98f13a124a789626e062a9a7b574ade0088f471 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Wed Apr 12 17:40:32 2017 +0100 Commit: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> CommitDate: Fri May 5 09:54:28 2017 +0100 x86/traps: Lift all non-entrypoint logic in entry_int82() up into C This is more readable, maintainable, and livepatchable. This involves declaring check_for_unexpected_msi(), untrusted_msi and pv_hypercall() suitably for use by C. While making these changes, untrusted_msi is switched over to being a C99 bool. No behavioural change. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> Release-acked-by: Julien Grall <julien.grall@xxxxxxx> --- xen/arch/x86/pv/Makefile | 2 ++ xen/arch/x86/pv/traps.c | 42 +++++++++++++++++++++++++++++++++++++ xen/arch/x86/x86_64/compat/entry.S | 9 +------- xen/drivers/passthrough/vtd/iommu.c | 4 ++-- xen/include/asm-x86/apic.h | 1 + xen/include/asm-x86/hypercall.h | 2 ++ xen/include/asm-x86/iommu.h | 2 ++ 7 files changed, 52 insertions(+), 10 deletions(-) diff --git a/xen/arch/x86/pv/Makefile b/xen/arch/x86/pv/Makefile index ea94599..8a295d0 100644 --- a/xen/arch/x86/pv/Makefile +++ b/xen/arch/x86/pv/Makefile @@ -1,2 +1,4 @@ obj-y += hypercall.o +obj-y += traps.o + obj-bin-y += dom0_build.init.o diff --git a/xen/arch/x86/pv/traps.c b/xen/arch/x86/pv/traps.c new file mode 100644 index 0000000..51125a8 --- /dev/null +++ b/xen/arch/x86/pv/traps.c @@ -0,0 +1,42 @@ +/****************************************************************************** + * arch/x86/pv/traps.c + * + * PV low level entry points. + * + * This program is free software; you can redistribute it and/or modify + * it under the terms of the GNU General Public License as published by + * the Free Software Foundation; either version 2 of the License, or + * (at your option) any later version. + * + * This program is distributed in the hope that it will be useful, + * but WITHOUT ANY WARRANTY; without even the implied warranty of + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the + * GNU General Public License for more details. + * + * You should have received a copy of the GNU General Public License + * along with this program; If not, see <http://www.gnu.org/licenses/>. + * + * Copyright (c) 2017 Citrix Systems Ltd. + */ + +#include <xen/hypercall.h> + +#include <asm/apic.h> + +void do_entry_int82(struct cpu_user_regs *regs) +{ + if ( unlikely(untrusted_msi) ) + check_for_unexpected_msi((uint8_t)regs->entry_vector); + + pv_hypercall(regs); +} + +/* + * Local variables: + * mode: C + * c-file-style: "BSD" + * c-basic-offset: 4 + * tab-width: 4 + * indent-tabs-mode: nil + * End: + */ diff --git a/xen/arch/x86/x86_64/compat/entry.S b/xen/arch/x86/x86_64/compat/entry.S index abf1094..90bda09 100644 --- a/xen/arch/x86/x86_64/compat/entry.S +++ b/xen/arch/x86/x86_64/compat/entry.S @@ -17,17 +17,10 @@ ENTRY(entry_int82) SAVE_VOLATILE type=HYPERCALL_VECTOR compat=1 CR4_PV32_RESTORE - cmpb $0,untrusted_msi(%rip) -UNLIKELY_START(ne, msi_check) - movl $HYPERCALL_VECTOR,%edi - call check_for_unexpected_msi - LOAD_C_CLOBBERED compat=1 ax=0 -UNLIKELY_END(msi_check) - GET_CURRENT(bx) mov %rsp, %rdi - call pv_hypercall + call do_entry_int82 /* %rbx: struct vcpu */ ENTRY(compat_test_all_events) diff --git a/xen/drivers/passthrough/vtd/iommu.c b/xen/drivers/passthrough/vtd/iommu.c index a5c61c6..19328f6 100644 --- a/xen/drivers/passthrough/vtd/iommu.c +++ b/xen/drivers/passthrough/vtd/iommu.c @@ -48,7 +48,7 @@ struct mapped_rmrr { }; /* Possible unfiltered LAPIC/MSI messages from untrusted sources? */ -bool_t __read_mostly untrusted_msi; +bool __read_mostly untrusted_msi; int nr_iommus; @@ -2334,7 +2334,7 @@ static int reassign_device_ownership( * by the root complex unless interrupt remapping is enabled. */ if ( (target != hardware_domain) && !iommu_intremap ) - untrusted_msi = 1; + untrusted_msi = true; /* * If the device belongs to the hardware domain, and it has RMRR, don't diff --git a/xen/include/asm-x86/apic.h b/xen/include/asm-x86/apic.h index 2f1398d..9952039 100644 --- a/xen/include/asm-x86/apic.h +++ b/xen/include/asm-x86/apic.h @@ -213,6 +213,7 @@ extern int lapic_suspend(void); extern int lapic_resume(void); extern void record_boot_APIC_mode(void); extern enum apic_mode current_local_apic_mode(void); +extern void check_for_unexpected_msi(unsigned int vector); extern int check_nmi_watchdog (void); diff --git a/xen/include/asm-x86/hypercall.h b/xen/include/asm-x86/hypercall.h index c59aa69..cfbcefe 100644 --- a/xen/include/asm-x86/hypercall.h +++ b/xen/include/asm-x86/hypercall.h @@ -25,6 +25,8 @@ typedef struct { extern const hypercall_args_t hypercall_args_table[NR_hypercalls]; +void pv_hypercall(struct cpu_user_regs *regs); + /* * Both do_mmuext_op() and do_mmu_update(): * We steal the m.s.b. of the @count parameter to indicate whether this diff --git a/xen/include/asm-x86/iommu.h b/xen/include/asm-x86/iommu.h index 0431233..14ad048 100644 --- a/xen/include/asm-x86/iommu.h +++ b/xen/include/asm-x86/iommu.h @@ -92,6 +92,8 @@ bool_t iommu_supports_eim(void); int iommu_enable_x2apic_IR(void); void iommu_disable_x2apic_IR(void); +extern bool untrusted_msi; + int pi_update_irte(const struct pi_desc *pi_desc, const struct pirq *pirq, const uint8_t gvec); -- generated by git-patchbot for /home/xen/git/xen.git#master _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |