|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH RFC v2 11/12] x86: modify interrupt handlers to support stack switching
>>> On 30.01.18 at 18:19, <jgross@xxxxxxxx> wrote:
> On 30/01/18 17:07, Jan Beulich wrote:
>>>>> On 22.01.18 at 13:32, <jgross@xxxxxxxx> wrote:
>>> --- a/xen/arch/x86/x86_64/asm-offsets.c
>>> +++ b/xen/arch/x86/x86_64/asm-offsets.c
>>> @@ -137,6 +137,10 @@ void __dummy__(void)
>>> OFFSET(CPUINFO_processor_id, struct cpu_info, processor_id);
>>> OFFSET(CPUINFO_current_vcpu, struct cpu_info, current_vcpu);
>>> OFFSET(CPUINFO_cr4, struct cpu_info, cr4);
>>> + OFFSET(CPUINFO_stack_bottom_cpu, struct cpu_info, stack_bottom_cpu);
>>> + OFFSET(CPUINFO_flags, struct cpu_info, flags);
>>> + DEFINE(ASM_ON_VCPUSTACK, ON_VCPUSTACK);
>>> + DEFINE(ASM_VCPUSTACK_ACTIVE, VCPUSTACK_ACTIVE);
>>
>> Seeing their uses in asm_defns.h it's not really clear to me why
>> you can't use the C constants there, the more that those uses
>> are inside C macros (which perhaps would better be assembler
>> ones). The latter doesn't even appear to be used in assembly
>> code.
>
> I tried using the C constants but this led to rather nasty include
> dependencies.
Hmm, I can imagine this to be the case, but I'd like to have more
detail for justification. current.h itself doesn't have that many
dependencies, and if half-way reasonable disentangling our
headers may be the better choice.
> ASM_VCPUSTACK_ACTIVE will be used when %cr3 switching is being added.
Please introduce it when needed.
>>> --- a/xen/common/wait.c
>>> +++ b/xen/common/wait.c
>>> @@ -122,10 +122,10 @@ void wake_up_all(struct waitqueue_head *wq)
>>>
>>> static void __prepare_to_wait(struct waitqueue_vcpu *wqv)
>>> {
>>> - struct cpu_info *cpu_info = get_cpu_info();
>>> + struct cpu_user_regs *user_regs = guest_cpu_user_regs();
>>> struct vcpu *curr = current;
>>> unsigned long dummy;
>>> - u32 entry_vector = cpu_info->guest_cpu_user_regs.entry_vector;
>>> + u32 entry_vector = user_regs->entry_vector;
>>>
>>> ASSERT(wqv->esp == 0);
>>>
>>> @@ -160,7 +160,7 @@ static void __prepare_to_wait(struct waitqueue_vcpu
>>> *wqv)
>>> "pop %%r11; pop %%r10; pop %%r9; pop %%r8;"
>>> "pop %%rbp; pop %%rdx; pop %%rbx; pop %%rax"
>>> : "=&S" (wqv->esp), "=&c" (dummy), "=&D" (dummy)
>>> - : "i" (PAGE_SIZE), "0" (0), "1" (cpu_info), "2" (wqv->stack)
>>> + : "i" (PAGE_SIZE), "0" (0), "1" (user_regs), "2" (wqv->stack)
>>> : "memory" );
>>>
>>> if ( unlikely(wqv->esp == 0) )
>>> @@ -169,7 +169,7 @@ static void __prepare_to_wait(struct waitqueue_vcpu
>>> *wqv)
>>> domain_crash_synchronous();
>>> }
>>>
>>> - cpu_info->guest_cpu_user_regs.entry_vector = entry_vector;
>>> + user_regs->entry_vector = entry_vector;
>>> }
>>
>> I don't see how this change is related to the purpose of this patch,
>> or why the change is needed. All you do is utilize that
>> guest_cpu_user_regs is the first field of struct cpu_info afaics.
>
> guest_cpu_user_regs() might point to either stack, while get_cpu_info()
> will always reference the Xen stack and never the per-vcpu one.
Then the description should say so for justification.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |