|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v3 3/5] xen/domain: Move guest type checks into the arch_sanitise_domain_config() path
This is a more appropriate location for the checks to happen, and cleans up
the common code substantially.
Take the opportunity to make ARM strictly require HVM|HAP for guests, which is
how the toolstack behaves, and leave a dprintk() behind for auditing failures.
Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
---
CC: Jan Beulich <JBeulich@xxxxxxxx>
CC: Wei Liu <wei.liu2@xxxxxxxxxx>
CC: Stefano Stabellini <sstabellini@xxxxxxxxxx>
CC: Julien Grall <julien.grall@xxxxxxx>
v2:
* New
v3:
* Rewrite to retain the existing bug compatibility on the x86 side.
---
xen/arch/arm/domain.c | 6 ++++++
xen/arch/x86/domain.c | 8 ++++++++
xen/common/domain.c | 34 +++-------------------------------
3 files changed, 17 insertions(+), 31 deletions(-)
diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c
index c24ace6..71ad1f9 100644
--- a/xen/arch/arm/domain.c
+++ b/xen/arch/arm/domain.c
@@ -601,6 +601,12 @@ void vcpu_switch_to_aarch64_mode(struct vcpu *v)
int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
{
+ if ( config->flags != (XEN_DOMCTL_CDF_hvm_guest | XEN_DOMCTL_CDF_hap) )
+ {
+ dprintk(XENLOG_INFO, "Unsupported configuration %#x\n", config->flags);
+ return -EINVAL;
+ }
+
/* Fill in the native GIC version, passed back to the toolstack. */
if ( config->arch.gic_version == XEN_DOMCTL_CONFIG_GIC_NATIVE )
{
diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c
index 28a145a..272fd84 100644
--- a/xen/arch/x86/domain.c
+++ b/xen/arch/x86/domain.c
@@ -420,6 +420,14 @@ void arch_vcpu_destroy(struct vcpu *v)
int arch_sanitise_domain_config(struct xen_domctl_createdomain *config)
{
+ bool hvm = config->flags & XEN_DOMCTL_CDF_hvm_guest;
+
+ if ( hvm ? !hvm_enabled : !IS_ENABLED(CONFIG_PV) )
+ {
+ dprintk(XENLOG_INFO, "%s support not available\n", hvm ? "HVM" : "PV");
+ return -EINVAL;
+ }
+
return 0;
}
diff --git a/xen/common/domain.c b/xen/common/domain.c
index ddaf74a..f69f405 100644
--- a/xen/common/domain.c
+++ b/xen/common/domain.c
@@ -339,37 +339,9 @@ struct domain *domain_create(domid_t domid,
hardware_domain = d;
}
- /* Sort out our idea of is_{pv,hvm}_domain(). */
- if ( config )
- {
- if ( config->flags & XEN_DOMCTL_CDF_hvm_guest )
- {
-#ifdef CONFIG_HVM
- d->guest_type = guest_type_hvm;
-#else
- err = -EINVAL;
- goto fail;
-#endif
- }
- else
- {
-#ifdef CONFIG_PV
- d->guest_type = guest_type_pv;
-#else
- err = -EINVAL;
- goto fail;
-#endif
- }
- }
- else
- {
- /*
- * At least the idle domain should be treated as PV domain
- * because it uses PV context switch functions. To err on the
- * safe side, leave all system domains to be guest_type_pv.
- */
- d->guest_type = guest_type_pv;
- }
+ /* Sort out our idea of is_{pv,hvm}_domain(). All system domains are PV.
*/
+ d->guest_type = ((config && (config->flags & XEN_DOMCTL_CDF_hvm_guest))
+ ? guest_type_hvm : guest_type_pv);
TRACE_1D(TRC_DOM0_DOM_ADD, d->domain_id);
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |