Source-Changes-HG archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]
[src/trunk]: src/sys/arch Fix for i386, functionality intended in:
details: https://anonhg.NetBSD.org/src/rev/fea783757f5c
branches: trunk
changeset: 433605:fea783757f5c
user: cherry <cherry%NetBSD.org@localhost>
date: Sun Sep 23 15:28:48 2018 +0000
description:
Fix for i386, functionality intended in:
http://mail-index.netbsd.org/source-changes/2018/09/23/msg099357.html
This should fix the build for both GENERIC and XEN3PAE_DOM0
This has not been boot tested on native or xen3pae
Notes: pmap_changeprot_local() seems to be x86_64 only.
I was a bit surprised by this initially, but I suspect that the table
protections are enforced via ring0/ring1 fencing rather than page protections
the gdt registration code in i386 is still messy. I will leave it as is
for now - to avoid a rabbit hole.
diffstat:
sys/arch/i386/i386/cpufunc.S | 8 +++++---
sys/arch/i386/i386/machdep.c | 13 +++++++------
sys/arch/i386/include/segments.h | 4 ++--
sys/arch/x86/x86/idt.c | 19 +++++++++++++------
sys/arch/xen/x86/xenfunc.c | 8 ++++++--
5 files changed, 33 insertions(+), 19 deletions(-)
diffs (204 lines):
diff -r 519a5409302d -r fea783757f5c sys/arch/i386/i386/cpufunc.S
--- a/sys/arch/i386/i386/cpufunc.S Sun Sep 23 15:08:41 2018 +0000
+++ b/sys/arch/i386/i386/cpufunc.S Sun Sep 23 15:28:48 2018 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: cpufunc.S,v 1.23 2018/07/21 16:21:27 maxv Exp $ */
+/* $NetBSD: cpufunc.S,v 1.24 2018/09/23 15:28:48 cherry Exp $ */
/*-
* Copyright (c) 1998, 2007 The NetBSD Foundation, Inc.
@@ -38,7 +38,7 @@
#include <sys/errno.h>
#include <machine/asm.h>
-__KERNEL_RCSID(0, "$NetBSD: cpufunc.S,v 1.23 2018/07/21 16:21:27 maxv Exp $");
+__KERNEL_RCSID(0, "$NetBSD: cpufunc.S,v 1.24 2018/09/23 15:28:48 cherry Exp $");
#include "opt_xen.h"
@@ -65,11 +65,13 @@
ret
END(x86_mfence)
-ENTRY(lidt)
+#ifndef XEN
+ ENTRY(lidt)
movl 4(%esp), %eax
lidt (%eax)
ret
END(lidt)
+#endif /* XEN */
ENTRY(rcr3)
movl %cr3, %eax
diff -r 519a5409302d -r fea783757f5c sys/arch/i386/i386/machdep.c
--- a/sys/arch/i386/i386/machdep.c Sun Sep 23 15:08:41 2018 +0000
+++ b/sys/arch/i386/i386/machdep.c Sun Sep 23 15:28:48 2018 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: machdep.c,v 1.809 2018/09/23 00:59:59 cherry Exp $ */
+/* $NetBSD: machdep.c,v 1.810 2018/09/23 15:28:48 cherry Exp $ */
/*
* Copyright (c) 1996, 1997, 1998, 2000, 2004, 2006, 2008, 2009, 2017
@@ -67,7 +67,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.809 2018/09/23 00:59:59 cherry Exp $");
+__KERNEL_RCSID(0, "$NetBSD: machdep.c,v 1.810 2018/09/23 15:28:48 cherry Exp $");
#include "opt_beep.h"
#include "opt_compat_freebsd.h"
@@ -1360,19 +1360,20 @@
default:
break;
}
- set_istgate(&idt[x], IDTVEC(exceptions)[x], 0, SDT_SYS386IGT,
+ set_idtgate(&idt[x], IDTVEC(exceptions)[x], 0, SDT_SYS386IGT,
sel, GSEL(GCODE_SEL, SEL_KPL));
}
/* new-style interrupt gate for syscalls */
idt_vec_reserve(128);
- set_istgate(&idt[128], &IDTVEC(syscall), 0, SDT_SYS386IGT, SEL_UPL,
+ set_idtgate(&idt[128], &IDTVEC(syscall), 0, SDT_SYS386IGT, SEL_UPL,
GSEL(GCODE_SEL, SEL_KPL));
+#ifndef XEN
setregion(®ion, gdtstore, NGDT * sizeof(gdtstore[0]) - 1);
lgdt(®ion);
-
- cpu_init_idt();
+#endif
+
lldt(GSEL(GLDT_SEL, SEL_KPL));
cpu_init_idt();
diff -r 519a5409302d -r fea783757f5c sys/arch/i386/include/segments.h
--- a/sys/arch/i386/include/segments.h Sun Sep 23 15:08:41 2018 +0000
+++ b/sys/arch/i386/include/segments.h Sun Sep 23 15:28:48 2018 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: segments.h,v 1.66 2018/09/23 07:54:42 cherry Exp $ */
+/* $NetBSD: segments.h,v 1.67 2018/09/23 15:28:49 cherry Exp $ */
/*-
* Copyright (c) 1990 The Regents of the University of California.
@@ -200,7 +200,7 @@
extern union descriptor *gdtstore, *ldtstore;
void setgate(struct gate_descriptor *, void *, int, int, int, int);
-void set_idtgate(idt_descriptor_t *, void *, int, int, int);
+void set_idtgate(idt_descriptor_t *, void *, int, int, int, int);
void unset_idtgate(idt_descriptor_t *);
void setregion(struct region_descriptor *, void *, size_t);
void setsegment(struct segment_descriptor *, const void *, size_t, int, int,
diff -r 519a5409302d -r fea783757f5c sys/arch/x86/x86/idt.c
--- a/sys/arch/x86/x86/idt.c Sun Sep 23 15:08:41 2018 +0000
+++ b/sys/arch/x86/x86/idt.c Sun Sep 23 15:28:48 2018 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: idt.c,v 1.7 2018/09/23 00:59:59 cherry Exp $ */
+/* $NetBSD: idt.c,v 1.8 2018/09/23 15:28:49 cherry Exp $ */
/*-
* Copyright (c) 1996, 1997, 1998, 2000, 2009 The NetBSD Foundation, Inc.
@@ -65,7 +65,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: idt.c,v 1.7 2018/09/23 00:59:59 cherry Exp $");
+__KERNEL_RCSID(0, "$NetBSD: idt.c,v 1.8 2018/09/23 15:28:49 cherry Exp $");
#include <sys/param.h>
#include <sys/systm.h>
@@ -107,9 +107,10 @@
vaddr_t xen_idt_vaddr = ((vaddr_t) xen_idd) & ~PAGE_MASK;
//kpreempt_disable();
+#if defined(__x86_64__)
/* Make it writeable, so we can update the values. */
pmap_changeprot_local(xen_idt_vaddr, VM_PROT_READ|VM_PROT_WRITE);
-
+#endif /* __x86_64 */
xen_idd->cs = sel;
xen_idd->address = (unsigned long) function;
xen_idd->flags = dpl;
@@ -122,24 +123,30 @@
xen_idd->vector = xen_idd - (idt_descriptor_t *)xen_idt_vaddr;
/* Back to read-only, as it should be. */
+#if defined(__x86_64__)
pmap_changeprot_local(xen_idt_vaddr, VM_PROT_READ);
+#endif /* __x86_64 */
//kpreempt_enable();
}
void
unset_idtgate(idt_descriptor_t *xen_idd)
{
+#if defined(__x86_64__)
vaddr_t xen_idt_vaddr = ((vaddr_t) xen_idd) & PAGE_MASK;
/* Make it writeable, so we can update the values. */
pmap_changeprot_local(xen_idt_vaddr, VM_PROT_READ|VM_PROT_WRITE);
-
+#endif /* __x86_64 */
+
/* Zero it */
memset(xen_idd, 0, sizeof (*xen_idd));
+#if defined(__x86_64__)
/* Back to read-only, as it should be. */
pmap_changeprot_local(xen_idt_vaddr, VM_PROT_READ);
+#endif /* __x86_64 */
}
-#else
+#else /* XEN */
void
set_idtgate(idt_descriptor_t *idd, void *function, int ist, int type, int dpl, int sel)
{
@@ -150,7 +157,7 @@
{
unsetgate(idd);
}
-#endif
+#endif /* XEN */
/*
* Allocate an IDT vector slot within the given range.
diff -r 519a5409302d -r fea783757f5c sys/arch/xen/x86/xenfunc.c
--- a/sys/arch/xen/x86/xenfunc.c Sun Sep 23 15:08:41 2018 +0000
+++ b/sys/arch/xen/x86/xenfunc.c Sun Sep 23 15:28:48 2018 +0000
@@ -1,4 +1,4 @@
-/* $NetBSD: xenfunc.c,v 1.20 2018/09/23 00:59:59 cherry Exp $ */
+/* $NetBSD: xenfunc.c,v 1.21 2018/09/23 15:28:49 cherry Exp $ */
/*
* Copyright (c) 2004 Christian Limpach.
@@ -26,7 +26,7 @@
*/
#include <sys/cdefs.h>
-__KERNEL_RCSID(0, "$NetBSD: xenfunc.c,v 1.20 2018/09/23 00:59:59 cherry Exp $");
+__KERNEL_RCSID(0, "$NetBSD: xenfunc.c,v 1.21 2018/09/23 15:28:49 cherry Exp $");
#include <sys/param.h>
@@ -80,15 +80,19 @@
xen_idt[xen_idt_idx++] = idd[i];
}
+#if defined(__x86_64__)
/* page needs to be r/o */
pmap_changeprot_local((vaddr_t) xen_idt, VM_PROT_READ);
+#endif /* __x86_64 */
/* Hook it up in the hypervisor */
if (HYPERVISOR_set_trap_table(xen_idt))
panic("HYPERVISOR_set_trap_table() failed");
+#if defined(__x86_64__)
/* reset */
pmap_changeprot_local((vaddr_t) xen_idt, VM_PROT_READ|VM_PROT_WRITE);
+#endif /* __x86_64 */
}
void
Home |
Main Index |
Thread Index |
Old Index