From: Andrew Cooper Date: Tue, 14 Feb 2017 17:56:33 +0000 (+0000) Subject: arm/hypercall: Use the common hcall_preempted boolean X-Git-Tag: archive/raspbian/4.11.1-1+rpi1~1^2~66^2~2763 X-Git-Url: https://dgit.raspbian.org/?a=commitdiff_plain;h=9353e3628a8cba7edc5aea470b448f290af76118;p=xen.git arm/hypercall: Use the common hcall_preempted boolean With hcall_preempted having just been made common, ARM can use use it to simplify its hypercall handling. This simplifies the continuation logic and removes the risk of accidentally skipping multiple instructions. Signed-off-by: Andrew Cooper Reviewed-by: Julien Grall --- diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 0010b8ff03..ee803346a8 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -348,17 +348,12 @@ void sync_vcpu_execstate(struct vcpu *v) void hypercall_cancel_continuation(void) { - struct cpu_user_regs *regs = guest_cpu_user_regs(); struct mc_state *mcs = ¤t->mc_state; if ( mcs->flags & MCSF_in_multicall ) - { __clear_bit(_MCSF_call_preempted, &mcs->flags); - } else - { - regs->pc += 4; /* undo re-execute 'hvc #XEN_HYPERCALL_TAG' */ - } + current->hcall_preempted = false; } unsigned long hypercall_create_continuation( @@ -390,8 +385,7 @@ unsigned long hypercall_create_continuation( { regs = guest_cpu_user_regs(); - /* Ensure the hypercall trap instruction is re-executed. */ - regs->pc -= 4; /* re-execute 'hvc #XEN_HYPERCALL_TAG' */ + current->hcall_preempted = true; #ifdef CONFIG_ARM_64 if ( !is_32bit_domain(current->domain) ) diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index 718e820f09..729b012417 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -1453,9 +1453,6 @@ static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr, unsigned long iss) { arm_hypercall_fn_t call = NULL; -#ifndef NDEBUG - register_t orig_pc = regs->pc; -#endif BUILD_BUG_ON(NR_hypercalls < ARRAY_SIZE(arm_hypercall_table) ); @@ -1469,6 +1466,8 @@ static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr, return; } + current->hcall_preempted = false; + perfc_incra(hypercalls, *nr); call = arm_hypercall_table[*nr].fn; if ( call == NULL ) @@ -1480,12 +1479,9 @@ static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr, HYPERCALL_RESULT_REG(regs) = call(HYPERCALL_ARGS(regs)); #ifndef NDEBUG - /* - * Clobber argument registers only if pc is unchanged, otherwise - * this is a hypercall continuation. - */ - if ( orig_pc == regs->pc ) + if ( !current->hcall_preempted ) { + /* Deliberately corrupt parameter regs used by this hypercall. */ switch ( arm_hypercall_table[*nr].nr_args ) { case 5: HYPERCALL_ARG5(regs) = 0xDEADBEEF; case 4: HYPERCALL_ARG4(regs) = 0xDEADBEEF; @@ -1498,6 +1494,10 @@ static void do_trap_hypercall(struct cpu_user_regs *regs, register_t *nr, *nr = 0xDEADBEEF; } #endif + + /* Ensure the hypercall trap instruction is re-executed. */ + if ( current->hcall_preempted ) + regs->pc -= 4; /* re-execute 'hvc #XEN_HYPERCALL_TAG' */ } static bool check_multicall_32bit_clean(struct multicall_entry *multi)