[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v2 4/8] x86/vvmx: correct vmfail() usage for vmptrld and vmclear
Calling vmfail_valid() is correct only if vvmcx is valid. Modify functions to use vmfail() instead which performs the necessary check. While at it, add ASSERTs into vmfail_valid/invalid() to quickly catch an incorrect usage in the future. Signed-off-by: Sergey Dyasli <sergey.dyasli@xxxxxxxxxx> --- v2: - Added ASSERTs --- xen/arch/x86/hvm/vmx/vvmx.c | 9 +++++++-- 1 file changed, 7 insertions(+), 2 deletions(-) diff --git a/xen/arch/x86/hvm/vmx/vvmx.c b/xen/arch/x86/hvm/vmx/vvmx.c index ba4f6d67fe..cc6942cb79 100644 --- a/xen/arch/x86/hvm/vmx/vvmx.c +++ b/xen/arch/x86/hvm/vmx/vvmx.c @@ -473,14 +473,19 @@ static void vmfail_valid(struct cpu_user_regs *regs, enum vmx_insn_errno errno) struct vcpu *v = current; unsigned int eflags = regs->eflags; + ASSERT(vvmcx_valid(v)); + regs->eflags = (eflags & ~X86_EFLAGS_ARITH_MASK) | X86_EFLAGS_ZF; set_vvmcs(v, VM_INSTRUCTION_ERROR, errno); } static void vmfail_invalid(struct cpu_user_regs *regs) { + struct vcpu *v = current; unsigned int eflags = regs->eflags; + ASSERT(!vvmcx_valid(v)); + regs->eflags = (eflags & ~X86_EFLAGS_ARITH_MASK) | X86_EFLAGS_CF; } @@ -1700,7 +1705,7 @@ static int nvmx_handle_vmptrld(struct cpu_user_regs *regs) !map_io_bitmap_all(v) || !_map_msr_bitmap(v) ) { - vmfail_valid(regs, VMX_INSN_VMPTRLD_INVALID_PHYADDR); + vmfail(regs, VMX_INSN_VMPTRLD_INVALID_PHYADDR); goto out; } } @@ -1784,7 +1789,7 @@ static int nvmx_handle_vmclear(struct cpu_user_regs *regs) if ( rc == VMSUCCEED ) vmsucceed(regs); else if ( rc == VMFAIL_VALID ) - vmfail_valid(regs, VMX_INSN_VMCLEAR_INVALID_PHYADDR); + vmfail(regs, VMX_INSN_VMCLEAR_INVALID_PHYADDR); else vmfail_invalid(regs); -- 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |