[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen staging] x86/shadow: un-hide "full" auditing code
commit f92212e1354cafb2cee741af653f12e273783cbf Author: Jan Beulich <jbeulich@xxxxxxxx> AuthorDate: Wed Nov 21 10:53:14 2018 +0100 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Wed Nov 21 10:53:14 2018 +0100 x86/shadow: un-hide "full" auditing code In particular sh_oos_audit() has become stale due to changes elsewhere, and the need for adjustment was not noticed because both "full audit" flags are off in both release and debug builds. Switch away from pre- processor conditionals, thus exposing the code to the compiler at all times. This obviously requires correcting the accumulated issues with the so far hidden code. Note that shadow_audit_tables() now also gains an effect with "full entry audit" mode disabled; the prior code structure suggests that this was originally intended anyway. Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Acked-by: Tim Deegan <tim@xxxxxxx> --- xen/arch/x86/mm/shadow/common.c | 46 ++++++++++++++-------------------------- xen/arch/x86/mm/shadow/private.h | 4 ---- 2 files changed, 16 insertions(+), 34 deletions(-) diff --git a/xen/arch/x86/mm/shadow/common.c b/xen/arch/x86/mm/shadow/common.c index f76e5e7564..61304d739d 100644 --- a/xen/arch/x86/mm/shadow/common.c +++ b/xen/arch/x86/mm/shadow/common.c @@ -258,11 +258,9 @@ void shadow_continue_emulation(struct sh_emulate_ctxt *sh_ctxt, * will be valid. */ - -#if SHADOW_AUDIT & SHADOW_AUDIT_ENTRIES_FULL static void sh_oos_audit(struct domain *d) { - int idx, expected_idx, expected_idx_alt; + unsigned int idx, expected_idx, expected_idx_alt; struct page_info *pg; struct vcpu *v; @@ -278,7 +276,7 @@ static void sh_oos_audit(struct domain *d) expected_idx_alt = ((expected_idx + 1) % SHADOW_OOS_PAGES); if ( idx != expected_idx && idx != expected_idx_alt ) { - printk("%s: idx %d contains gmfn %lx, expected at %d or %d.\n", + printk("%s: idx %x contains gmfn %lx, expected at %x or %x.\n", __func__, idx, mfn_x(oos[idx]), expected_idx, expected_idx_alt); BUG(); @@ -286,26 +284,25 @@ static void sh_oos_audit(struct domain *d) pg = mfn_to_page(oos[idx]); if ( !(pg->count_info & PGC_page_table) ) { - printk("%s: idx %x gmfn %lx not a pt (count %"PRIx32")\n", + printk("%s: idx %x gmfn %lx not a pt (count %lx)\n", __func__, idx, mfn_x(oos[idx]), pg->count_info); BUG(); } if ( !(pg->shadow_flags & SHF_out_of_sync) ) { - printk("%s: idx %x gmfn %lx not marked oos (flags %lx)\n", + printk("%s: idx %x gmfn %lx not marked oos (flags %x)\n", __func__, idx, mfn_x(oos[idx]), pg->shadow_flags); BUG(); } if ( (pg->shadow_flags & SHF_page_type_mask & ~SHF_L1_ANY) ) { - printk("%s: idx %x gmfn %lx shadowed as non-l1 (flags %lx)\n", + printk("%s: idx %x gmfn %lx shadowed as non-l1 (flags %x)\n", __func__, idx, mfn_x(oos[idx]), pg->shadow_flags); BUG(); } } } } -#endif #if SHADOW_AUDIT & SHADOW_AUDIT_ENTRIES void oos_audit_hash_is_present(struct domain *d, mfn_t gmfn) @@ -1474,8 +1471,6 @@ static inline key_t sh_hash(unsigned long n, unsigned int t) return k % SHADOW_HASH_BUCKETS; } -#if SHADOW_AUDIT & (SHADOW_AUDIT_HASH|SHADOW_AUDIT_HASH_FULL) - /* Before we get to the mechanism, define a pair of audit functions * that sanity-check the contents of the hash table. */ static void sh_hash_audit_bucket(struct domain *d, int bucket) @@ -1483,7 +1478,8 @@ static void sh_hash_audit_bucket(struct domain *d, int bucket) { struct page_info *sp, *x; - if ( !(SHADOW_AUDIT_ENABLE) ) + if ( !(SHADOW_AUDIT & (SHADOW_AUDIT_HASH|SHADOW_AUDIT_HASH_FULL)) || + !SHADOW_AUDIT_ENABLE ) return; sp = d->arch.paging.shadow.hash_table[bucket]; @@ -1547,19 +1543,12 @@ static void sh_hash_audit_bucket(struct domain *d, int bucket) } } -#else -#define sh_hash_audit_bucket(_d, _b) do {} while(0) -#endif /* Hashtable bucket audit */ - - -#if SHADOW_AUDIT & SHADOW_AUDIT_HASH_FULL - static void sh_hash_audit(struct domain *d) /* Full audit: audit every bucket in the table */ { int i; - if ( !(SHADOW_AUDIT_ENABLE) ) + if ( !(SHADOW_AUDIT & SHADOW_AUDIT_HASH_FULL) || !SHADOW_AUDIT_ENABLE ) return; for ( i = 0; i < SHADOW_HASH_BUCKETS; i++ ) @@ -1568,10 +1557,6 @@ static void sh_hash_audit(struct domain *d) } } -#else -#define sh_hash_audit(_d) do {} while(0) -#endif /* Hashtable bucket audit */ - /* Allocate and initialise the table itself. * Returns 0 for success, 1 for error. */ static int shadow_hash_alloc(struct domain *d) @@ -3525,13 +3510,12 @@ int shadow_domctl(struct domain *d, /**************************************************************************/ /* Auditing shadow tables */ -#if SHADOW_AUDIT & SHADOW_AUDIT_ENTRIES_FULL - void shadow_audit_tables(struct vcpu *v) { /* Dispatch table for getting per-type functions */ static const hash_vcpu_callback_t callbacks[SH_type_unused] = { NULL, /* none */ +#if SHADOW_AUDIT & (SHADOW_AUDIT_ENTRIES | SHADOW_AUDIT_ENTRIES_FULL) SHADOW_INTERNAL_NAME(sh_audit_l1_table, 2), /* l1_32 */ SHADOW_INTERNAL_NAME(sh_audit_fl1_table, 2), /* fl1_32 */ SHADOW_INTERNAL_NAME(sh_audit_l2_table, 2), /* l2_32 */ @@ -3545,19 +3529,23 @@ void shadow_audit_tables(struct vcpu *v) SHADOW_INTERNAL_NAME(sh_audit_l2_table, 4), /* l2h_64 */ SHADOW_INTERNAL_NAME(sh_audit_l3_table, 4), /* l3_64 */ SHADOW_INTERNAL_NAME(sh_audit_l4_table, 4), /* l4_64 */ +#endif NULL /* All the rest */ }; unsigned int mask; - if ( !(SHADOW_AUDIT_ENABLE) ) + if ( !(SHADOW_AUDIT & (SHADOW_AUDIT_ENTRIES | SHADOW_AUDIT_ENTRIES_FULL)) || + !SHADOW_AUDIT_ENABLE ) return; + if ( SHADOW_AUDIT & SHADOW_AUDIT_ENTRIES_FULL ) + { #if (SHADOW_OPTIMIZATIONS & SHOPT_OUT_OF_SYNC) - sh_oos_audit(v->domain); + sh_oos_audit(v->domain); #endif - if ( SHADOW_AUDIT & SHADOW_AUDIT_ENTRIES_FULL ) mask = SHF_page_type_mask; /* Audit every table in the system */ + } else { /* Audit only the current mode's tables */ @@ -3575,8 +3563,6 @@ void shadow_audit_tables(struct vcpu *v) hash_vcpu_foreach(v, mask, callbacks, INVALID_MFN); } -#endif /* Shadow audit */ - #ifdef CONFIG_PV void pv_l1tf_tasklet(unsigned long data) diff --git a/xen/arch/x86/mm/shadow/private.h b/xen/arch/x86/mm/shadow/private.h index f7424650ce..e8ed7ac714 100644 --- a/xen/arch/x86/mm/shadow/private.h +++ b/xen/arch/x86/mm/shadow/private.h @@ -139,11 +139,7 @@ enum { * Auditing routines */ -#if SHADOW_AUDIT & SHADOW_AUDIT_ENTRIES_FULL extern void shadow_audit_tables(struct vcpu *v); -#else -#define shadow_audit_tables(_v) do {} while(0) -#endif /****************************************************************************** * Macro for dealing with the naming of the internal names of the -- generated by git-patchbot for /home/xen/git/xen.git#staging _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |