[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH 2/3] xen: arm: correctly handle continuations for 64-bit guests



The 64-bit ABI is different to 32-bit:

 - uses x16 as the op register rather than r12.
 - arguments in x0..x5 and not r0..r5. Using rN here potentially
   truncates.
 - return value goes in x0, not r0.

Hypercalls can only be made directly from kernel space, so checking
the domain's size is sufficient.

The update of regs->pc is duplicated in both halves because the 32-bit
case is going to need fixing to handle Thumb mode (next patch).

Spotted due to spurious -EFAULT when destroying a domain, due to the
hypercall's pointer argument being truncated. I'm unclear why I am
only seeing this now.

Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
---
I imagine this needs backporting everywhere...

For reference the git diff -b version of this is:
        @@ -357,6 +357,36 @@ unsigned long hypercall_create_continuation(
             else
             {
                 regs = guest_cpu_user_regs();
        +
        +#ifdef CONFIG_ARM_64
        +        if ( !is_32bit_domain(current->domain) )
        +        {
        +            regs->x16 = op;
        +
        +            /* Ensure the hypercall trap instruction is re-executed. */
        +            regs->pc -= 4;  /* re-execute 'hvc #XEN_HYPERCALL_TAG' */
        +
        +            for ( i = 0; *p != '\0'; i++ )
        +            {
        +                arg = next_arg(p, args);
        +
        +                switch ( i )
        +                {
        +                case 0: regs->x0 = arg; break;
        +                case 1: regs->x1 = arg; break;
        +                case 2: regs->x2 = arg; break;
        +                case 3: regs->x3 = arg; break;
        +                case 4: regs->x4 = arg; break;
        +                case 5: regs->x5 = arg; break;
        +                }
        +            }
        +
        +            /* Return value gets written back to x0 */
        +            rc = regs->x0;
        +        }
        +        else
        +#endif
        +        {
                     regs->r12 = op;

                     /* Ensure the hypercall trap instruction is re-executed.
         * */
        @@ -380,6 +410,7 @@ unsigned long hypercall_create_continuation(
             /* Return value gets written back to r0 */
             rc = regs->r0;
         }
        +    }

             va_end(args);
---
 xen/arch/arm/domain.c |   63 ++++++++++++++++++++++++++++++++++++-------------
 1 file changed, 47 insertions(+), 16 deletions(-)

diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index 939d8cd..10f13e4 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -356,29 +356,60 @@ unsigned long hypercall_create_continuation(
     }
     else
     {
-        regs      = guest_cpu_user_regs();
-        regs->r12 = op;
+        regs = guest_cpu_user_regs();
 
-        /* Ensure the hypercall trap instruction is re-executed. */
-        regs->pc -= 4;  /* re-execute 'hvc #XEN_HYPERCALL_TAG' */
-
-        for ( i = 0; *p != '\0'; i++ )
+#ifdef CONFIG_ARM_64
+        if ( !is_32bit_domain(current->domain) )
         {
-            arg = next_arg(p, args);
+            regs->x16 = op;
 
-            switch ( i )
+            /* Ensure the hypercall trap instruction is re-executed. */
+            regs->pc -= 4;  /* re-execute 'hvc #XEN_HYPERCALL_TAG' */
+
+            for ( i = 0; *p != '\0'; i++ )
             {
-            case 0: regs->r0 = arg; break;
-            case 1: regs->r1 = arg; break;
-            case 2: regs->r2 = arg; break;
-            case 3: regs->r3 = arg; break;
-            case 4: regs->r4 = arg; break;
-            case 5: regs->r5 = arg; break;
+                arg = next_arg(p, args);
+
+                switch ( i )
+                {
+                case 0: regs->x0 = arg; break;
+                case 1: regs->x1 = arg; break;
+                case 2: regs->x2 = arg; break;
+                case 3: regs->x3 = arg; break;
+                case 4: regs->x4 = arg; break;
+                case 5: regs->x5 = arg; break;
+                }
             }
+
+            /* Return value gets written back to x0 */
+            rc = regs->x0;
         }
+        else
+#endif
+        {
+            regs->r12 = op;
+
+            /* Ensure the hypercall trap instruction is re-executed. */
+            regs->pc -= 4;  /* re-execute 'hvc #XEN_HYPERCALL_TAG' */
+
+            for ( i = 0; *p != '\0'; i++ )
+            {
+                arg = next_arg(p, args);
+
+                switch ( i )
+                {
+                case 0: regs->r0 = arg; break;
+                case 1: regs->r1 = arg; break;
+                case 2: regs->r2 = arg; break;
+                case 3: regs->r3 = arg; break;
+                case 4: regs->r4 = arg; break;
+                case 5: regs->r5 = arg; break;
+                }
+            }
 
-        /* Return value gets written back to r0 */
-        rc = regs->r0;
+            /* Return value gets written back to r0 */
+            rc = regs->r0;
+        }
     }
 
     va_end(args);
-- 
1.7.10.4


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.