[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC 6/9] x86/boot: Install trap handlers much earlier on boot
On 15/05/14 11:53, Jan Beulich wrote: >>>> On 15.05.14 at 11:48, <andrew.cooper3@xxxxxxxxxx> wrote: >> +void __cpuinit load_system_tables(void) >> +{ >> + unsigned int cpu = smp_processor_id(); >> + unsigned long stack_bottom = get_stack_bottom(), >> + stack_top = stack_bottom & ~(STACK_SIZE - 1); >> + >> + struct tss_struct *tss = &this_cpu(init_tss); >> + struct desc_struct *gdt = >> + this_cpu(gdt_table) - FIRST_RESERVED_GDT_ENTRY; >> + struct desc_struct *compat_gdt = >> + this_cpu(compat_gdt_table)- FIRST_RESERVED_GDT_ENTRY; >> + >> + struct desc_ptr gdtr = { >> + .base = (unsigned long)gdt, >> + .limit = LAST_RESERVED_GDT_BYTE, >> + }; >> + struct desc_ptr idtr = { >> + .base = (unsigned long)idt_tables[cpu], >> + .limit = (IDT_ENTRIES * sizeof(idt_entry_t)) - 1, >> + }; >> + >> + /* Main stack for interrupts/exceptions */ >> + tss->rsp0 = stack_bottom; >> + tss->bitmap = IOBMP_INVALID_OFFSET; >> + >> + /* MCE, NMI and Double Fault handlers get their own stacks */ >> + tss->ist[IST_MCE - 1] = stack_top + IST_MCE * PAGE_SIZE; >> + tss->ist[IST_DF - 1] = stack_top + IST_DF * PAGE_SIZE; > Hard tab. These should all be hard tabs, following the file's style. > >> + tss->ist[IST_NMI - 1] = stack_top + IST_NMI * PAGE_SIZE; >> + >> + _set_tssldt_desc( >> + gdt + TSS_ENTRY, >> + (unsigned long)tss, >> + offsetof(struct tss_struct, __cacheline_filler) - 1, >> + DESC_TYPE_tss_avail); >> + _set_tssldt_desc( >> + compat_gdt + TSS_ENTRY, >> + (unsigned long)tss, >> + offsetof(struct tss_struct, __cacheline_filler) - 1, >> + DESC_TYPE_tss_busy); >> + >> + asm volatile ( "lgdt %0" : : "m" (gdtr) ); >> + asm volatile ( "lldt %w0" : : "rm" (0) ); >> + asm volatile ( "ltr %w0" : : "rm" (TSS_ENTRY << 3) ); >> + asm volatile ( "lidt %0" : : "m" (idtr) ); > I think you ought to load the IDT right after the GDT, so that eventual > faults on the LLDT and LTR have less chance of ending in a triple fault. That particular lldt can't possibly fault. I wanted to avoid having IST information in the IDT without a loaded TSS, but given the proximity of the loads, catching an invalid_tss from the 'ltr' might be useful. > >> --- a/xen/arch/x86/setup.c >> +++ b/xen/arch/x86/setup.c >> @@ -558,15 +558,20 @@ void __init noreturn __start_xen(unsigned long mbi_p) >> .stop_bits = 1 >> }; >> >> + /* Critical region without IDT or TSS. Any fault is deadly! */ > Which raises the question whether the next patch shouldn't be > dropped. With this patch, the BSP code looks like: * patch ingnore_int everywhere into idt_table * call into C * patch real trap handlers into idt_table * load system tables such that faults all work. Therefore, the ignore_int() patching is almost completely pointless, which is why it is completely removed in the subsequent patch. > >> set_processor_id(0); >> set_current((struct vcpu *)0xfffff000); /* debug sanity */ >> this_cpu(curr_vcpu) = idle_vcpu[0] = current; >> >> + init_idt_traps(); >> + load_system_tables(); >> + >> sort_exception_tables(); >> >> - percpu_init_areas(); >> + /* Full trap support from here on in */ > Stop missing (also elsewhere). > >> @@ -345,6 +338,10 @@ void start_secondary(void *unused) >> */ >> spin_debug_disable(); >> >> + load_system_tables(); >> + >> + /* Full trap support from here on in */ >> + >> percpu_traps_init(); > I guess this ends up being confusing, even if it's just because the > name of the function perhaps no longer reflects its purpose. Yes - there is a little more poor resultant naming than I would like. I am also not completely happy with the names "load_system_tables()" and "init_idt_traps()", but can't think of more appropriate names offhand. > >> @@ -3515,23 +3515,40 @@ void __init trap_init(void) >> set_intr_gate(TRAP_bounds,&bounds); >> set_intr_gate(TRAP_invalid_op,&invalid_op); >> set_intr_gate(TRAP_no_device,&device_not_available); >> + set_intr_gate(TRAP_double_fault, &double_fault); >> set_intr_gate(TRAP_copro_seg,&coprocessor_segment_overrun); >> set_intr_gate(TRAP_invalid_tss,&invalid_TSS); >> set_intr_gate(TRAP_no_segment,&segment_not_present); >> set_intr_gate(TRAP_stack_error,&stack_segment); >> set_intr_gate(TRAP_gp_fault,&general_protection); >> - set_intr_gate(TRAP_page_fault,&page_fault); >> + set_intr_gate(TRAP_page_fault,&early_page_fault); >> set_intr_gate(TRAP_spurious_int,&spurious_interrupt_bug); >> set_intr_gate(TRAP_copro_error,&coprocessor_error); >> set_intr_gate(TRAP_alignment_check,&alignment_check); >> set_intr_gate(TRAP_machine_check,&machine_check); >> set_intr_gate(TRAP_simd_error,&simd_coprocessor_error); >> >> + /* Specify dedicated interrupt stacks for NMI, #DF, and #MC. */ >> + set_ist(&idt_table[TRAP_double_fault], IST_DF); >> + set_ist(&idt_table[TRAP_nmi], IST_NMI); >> + set_ist(&idt_table[TRAP_machine_check], IST_MCE); > Mind putting them right aside the respective set_intr_gate() above? Sorted in a later patch. For now I think it is clearer as obvious code motion out of cpu_init(). > >> +void __init trap_init(void) >> +{ >> + set_intr_gate(TRAP_page_fault, &page_fault); >> + >> + /* The 32-on-64 hypercall entry vector is only accessible from ring 1. >> */ >> + _set_gate(idt_table+HYPERCALL_VECTOR, DESC_TYPE_trap_gate, 1, >> &compat_hypercall); >> + >> + /* Fast trap for int80 (faster than taking the #GP-fixup path). */ >> + _set_gate(idt_table+0x80, DESC_TYPE_trap_gate, 3, &int80_direct_trap); > Long lines? > > Jan Again, code motion, although this long line was because of "DESC_TYPE_trap_gate". "SYS_DESC_trap" in the first patch would fix the issue. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |