[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 17/29] Ovmf/Xen: refactor XenBusDxe hypercall implementation
On Mon, 26 Jan 2015, Ard Biesheuvel wrote: > This refactors the Xen hypercall implementation that is part of the > XenBusDxe driver, in preparation of splitting it off entirely into > a XenHypercallLib library. This involves: > - removing the dependency on XENBUS_DEVICE* pointers in the XenHypercall() > prototypes > - moving the discovered hyperpage address to a global variable > - moving XenGetSharedInfoPage() to its only user XenBusDxe.c (the shared info > page is not strictly part of the Xen hypercall interface, and is not used > by other expected users of XenHypercallLib such as the Xen console version > of SerialPortLib > - reimplement XenHypercall2() in C and move the indexing of the hyperpage > there; the existing asm implementations are renamed to __XenHypercall2() and > invoked from the new C implementation. > > Contributed-under: TianoCore Contribution Agreement 1.0 > Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> > --- > OvmfPkg/XenBusDxe/EventChannel.c | 11 +++-------- > OvmfPkg/XenBusDxe/GrantTable.c | 4 ++-- > OvmfPkg/XenBusDxe/Ia32/hypercall.nasm | 6 +++--- > OvmfPkg/XenBusDxe/X64/hypercall.nasm | 6 +++--- > OvmfPkg/XenBusDxe/XenBusDxe.c | 44 > +++++++++++++++++++++++++++++++++++++++++++- > OvmfPkg/XenBusDxe/XenBusDxe.h | 1 - > OvmfPkg/XenBusDxe/XenHypercall.c | 50 > ++++++++++++++------------------------------------ > OvmfPkg/XenBusDxe/XenHypercall.h | 28 +++------------------------- > OvmfPkg/XenBusDxe/XenStore.c | 4 ++-- > 9 files changed, 73 insertions(+), 81 deletions(-) > > diff --git a/OvmfPkg/XenBusDxe/EventChannel.c > b/OvmfPkg/XenBusDxe/EventChannel.c > index 03efaf9cb904..a86323e6adfd 100644 > --- a/OvmfPkg/XenBusDxe/EventChannel.c > +++ b/OvmfPkg/XenBusDxe/EventChannel.c > @@ -28,7 +28,7 @@ XenEventChannelNotify ( > evtchn_send_t Send; > > Send.port = Port; > - ReturnCode = XenHypercallEventChannelOp (Dev, EVTCHNOP_send, &Send); > + ReturnCode = XenHypercallEventChannelOp (EVTCHNOP_send, &Send); > return (UINT32)ReturnCode; > } > > @@ -40,15 +40,12 @@ XenBusEventChannelAllocate ( > OUT evtchn_port_t *Port > ) > { > - XENBUS_PRIVATE_DATA *Private; > evtchn_alloc_unbound_t Parameter; > UINT32 ReturnCode; > > - Private = XENBUS_PRIVATE_DATA_FROM_THIS (This); > - > Parameter.dom = DOMID_SELF; > Parameter.remote_dom = DomainId; > - ReturnCode = (UINT32)XenHypercallEventChannelOp (Private->Dev, > + ReturnCode = (UINT32)XenHypercallEventChannelOp ( > EVTCHNOP_alloc_unbound, > &Parameter); > if (ReturnCode != 0) { > @@ -79,10 +76,8 @@ XenBusEventChannelClose ( > IN evtchn_port_t Port > ) > { > - XENBUS_PRIVATE_DATA *Private; > evtchn_close_t Close; > > - Private = XENBUS_PRIVATE_DATA_FROM_THIS (This); > Close.port = Port; > - return (UINT32)XenHypercallEventChannelOp (Private->Dev, EVTCHNOP_close, > &Close); > + return (UINT32)XenHypercallEventChannelOp (EVTCHNOP_close, &Close); > } > diff --git a/OvmfPkg/XenBusDxe/GrantTable.c b/OvmfPkg/XenBusDxe/GrantTable.c > index 8405edc51bc4..53cb99f0e004 100644 > --- a/OvmfPkg/XenBusDxe/GrantTable.c > +++ b/OvmfPkg/XenBusDxe/GrantTable.c > @@ -161,7 +161,7 @@ XenGrantTableInit ( > Parameters.idx = Index; > Parameters.space = XENMAPSPACE_grant_table; > Parameters.gpfn = (xen_pfn_t) ((UINTN) GrantTable >> EFI_PAGE_SHIFT) + > Index; > - ReturnCode = XenHypercallMemoryOp (Dev, XENMEM_add_to_physmap, > &Parameters); > + ReturnCode = XenHypercallMemoryOp (XENMEM_add_to_physmap, &Parameters); > if (ReturnCode != 0) { > DEBUG ((EFI_D_ERROR, "Xen GrantTable, add_to_physmap hypercall error: > %d\n", ReturnCode)); > } > @@ -184,7 +184,7 @@ XenGrantTableDeinit ( > Parameters.domid = DOMID_SELF; > Parameters.gpfn = (xen_pfn_t) ((UINTN) GrantTable >> EFI_PAGE_SHIFT) + > Index; > DEBUG ((EFI_D_INFO, "Xen GrantTable, removing %X\n", Parameters.gpfn)); > - ReturnCode = XenHypercallMemoryOp (Dev, XENMEM_remove_from_physmap, > &Parameters); > + ReturnCode = XenHypercallMemoryOp (XENMEM_remove_from_physmap, > &Parameters); > if (ReturnCode != 0) { > DEBUG ((EFI_D_ERROR, "Xen GrantTable, remove_from_physmap hypercall > error: %d\n", ReturnCode)); > } > diff --git a/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm > b/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm > index 8547c30b81ee..e0fa71bb5ba8 100644 > --- a/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm > +++ b/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm > @@ -2,13 +2,13 @@ SECTION .text > > ; INTN > ; EFIAPI > -; XenHypercall2 ( > +; __XenHypercall2 ( > ; IN VOID *HypercallAddr, > ; IN OUT INTN Arg1, > ; IN OUT INTN Arg2 > ; ); > -global ASM_PFX(XenHypercall2) > -ASM_PFX(XenHypercall2): > +global ASM_PFX(__XenHypercall2) > +ASM_PFX(__XenHypercall2): > ; Save only ebx, ecx is supposed to be a scratch register and needs to be > ; saved by the caller > push ebx > diff --git a/OvmfPkg/XenBusDxe/X64/hypercall.nasm > b/OvmfPkg/XenBusDxe/X64/hypercall.nasm > index 177f271ef094..5e6a0c05c5c4 100644 > --- a/OvmfPkg/XenBusDxe/X64/hypercall.nasm > +++ b/OvmfPkg/XenBusDxe/X64/hypercall.nasm > @@ -3,13 +3,13 @@ SECTION .text > > ; INTN > ; EFIAPI > -; XenHypercall2 ( > +; __XenHypercall2 ( > ; IN VOID *HypercallAddr, > ; IN OUT INTN Arg1, > ; IN OUT INTN Arg2 > ; ); > -global ASM_PFX(XenHypercall2) > -ASM_PFX(XenHypercall2): > +global ASM_PFX(__XenHypercall2) > +ASM_PFX(__XenHypercall2): > push rdi > push rsi > ; Copy HypercallAddr to rax > diff --git a/OvmfPkg/XenBusDxe/XenBusDxe.c b/OvmfPkg/XenBusDxe/XenBusDxe.c > index 7a7fd82d559d..d333b331b6db 100644 > --- a/OvmfPkg/XenBusDxe/XenBusDxe.c > +++ b/OvmfPkg/XenBusDxe/XenBusDxe.c > @@ -34,6 +34,8 @@ > #include "XenStore.h" > #include "XenBus.h" > > +#include <IndustryStandard/Xen/hvm/params.h> > +#include <IndustryStandard/Xen/memory.h> > > /// > /// Driver Binding Protocol instance > @@ -52,6 +54,46 @@ STATIC EFI_LOCK mMyDeviceLock = > EFI_INITIALIZE_LOCK_VARIABLE (TPL_CALLBACK > STATIC XENBUS_DEVICE *mMyDevice = NULL; > > /** > + Map the shared_info_t page into memory. > + > + @param Dev A XENBUS_DEVICE instance. > + > + @retval EFI_SUCCESS Dev->SharedInfo whill contain a pointer to > + the shared info page > + @retval EFI_LOAD_ERROR The shared info page could not be mapped. The > + hypercall returned an error. > +**/ > +STATIC > +EFI_STATUS > +XenGetSharedInfoPage ( > + IN OUT XENBUS_DEVICE *Dev > + ) > +{ > + xen_add_to_physmap_t Parameter; > + > + ASSERT (Dev->SharedInfo == NULL); > + > + Parameter.domid = DOMID_SELF; > + Parameter.space = XENMAPSPACE_shared_info; > + Parameter.idx = 0; > + > + // > + // using reserved page because the page is not released when Linux is > + // starting because of the add_to_physmap. QEMU might try to access the > + // page, and fail because it have no right to do so (segv). > + // > + Dev->SharedInfo = AllocateReservedPages (1); > + Parameter.gpfn = (UINTN) Dev->SharedInfo >> EFI_PAGE_SHIFT; > + if (XenHypercallMemoryOp (XENMEM_add_to_physmap, &Parameter) != 0) { > + FreePages (Dev->SharedInfo, 1); > + Dev->SharedInfo = NULL; > + return EFI_LOAD_ERROR; > + } > + > + return EFI_SUCCESS; > +} > + > +/** > Unloads an image. > > @param ImageHandle Handle that identifies the image to be > unloaded. > @@ -348,7 +390,7 @@ XenBusDxeDriverBindingStart ( > MmioAddr = BarDesc->AddrRangeMin; > FreePool (BarDesc); > > - Status = XenHyperpageInit (Dev); > + Status = XenHyperpageInit (); > if (EFI_ERROR (Status)) { > DEBUG ((EFI_D_ERROR, "XenBus: Unable to retrieve the hyperpage.\n")); > Status = EFI_UNSUPPORTED; > diff --git a/OvmfPkg/XenBusDxe/XenBusDxe.h b/OvmfPkg/XenBusDxe/XenBusDxe.h > index 80253b7d1ca9..9b7219906a69 100644 > --- a/OvmfPkg/XenBusDxe/XenBusDxe.h > +++ b/OvmfPkg/XenBusDxe/XenBusDxe.h > @@ -91,7 +91,6 @@ struct _XENBUS_DEVICE { > EFI_DEVICE_PATH_PROTOCOL *DevicePath; > LIST_ENTRY ChildList; > > - VOID *Hyperpage; > shared_info_t *SharedInfo; > }; > > diff --git a/OvmfPkg/XenBusDxe/XenHypercall.c > b/OvmfPkg/XenBusDxe/XenHypercall.c > index 34d92e76b7e3..9bcf3197633e 100644 > --- a/OvmfPkg/XenBusDxe/XenHypercall.c > +++ b/OvmfPkg/XenBusDxe/XenHypercall.c > @@ -23,9 +23,10 @@ > #include <IndustryStandard/Xen/hvm/params.h> > #include <IndustryStandard/Xen/memory.h> > > +STATIC VOID *Hyperpage; > + > EFI_STATUS > XenHyperpageInit ( > - IN OUT XENBUS_DEVICE *Dev > ) > { > EFI_HOB_GUID_TYPE *GuidHob; > @@ -36,24 +37,21 @@ XenHyperpageInit ( > return EFI_NOT_FOUND; > } > XenInfo = (EFI_XEN_INFO *) GET_GUID_HOB_DATA (GuidHob); > - Dev->Hyperpage = XenInfo->HyperPages; > + Hyperpage = XenInfo->HyperPages; > return EFI_SUCCESS; > } > > UINT64 > XenHypercallHvmGetParam ( > - IN XENBUS_DEVICE *Dev, > IN UINT32 Index > ) > { > xen_hvm_param_t Parameter; > INTN Error; > > - ASSERT (Dev->Hyperpage != NULL); > - > Parameter.domid = DOMID_SELF; > Parameter.index = Index; > - Error = XenHypercall2 ((UINT8*)Dev->Hyperpage + __HYPERVISOR_hvm_op * 32, > + Error = XenHypercall2 (__HYPERVISOR_hvm_op, > HVMOP_get_param, (INTN) &Parameter); > if (Error != 0) { > DEBUG ((EFI_D_ERROR, > @@ -66,53 +64,33 @@ XenHypercallHvmGetParam ( > > INTN > XenHypercallMemoryOp ( > - IN XENBUS_DEVICE *Dev, > IN UINTN Operation, > IN OUT VOID *Arguments > ) > { > - ASSERT (Dev->Hyperpage != NULL); > - return XenHypercall2 ((UINT8*)Dev->Hyperpage + __HYPERVISOR_memory_op * 32, > + return XenHypercall2 (__HYPERVISOR_memory_op, > Operation, (INTN) Arguments); > } > > INTN > XenHypercallEventChannelOp ( > - IN XENBUS_DEVICE *Dev, > IN INTN Operation, > IN OUT VOID *Arguments > ) > { > - ASSERT (Dev->Hyperpage != NULL); > - return XenHypercall2 ((UINT8*)Dev->Hyperpage + > __HYPERVISOR_event_channel_op * 32, > + return XenHypercall2 (__HYPERVISOR_event_channel_op, > Operation, (INTN) Arguments); > } > > -EFI_STATUS > -XenGetSharedInfoPage ( > - IN OUT XENBUS_DEVICE *Dev > +INTN > +EFIAPI > +XenHypercall2 ( > + IN INTN HypercallID, > + IN OUT INTN Arg1, > + IN OUT INTN Arg2 > ) > { > - xen_add_to_physmap_t Parameter; > - > - ASSERT (Dev->SharedInfo == NULL); > + ASSERT (HyperPage != NULL); > > - Parameter.domid = DOMID_SELF; > - Parameter.space = XENMAPSPACE_shared_info; > - Parameter.idx = 0; > - > - // > - // using reserved page because the page is not released when Linux is > - // starting because of the add_to_physmap. QEMU might try to access the > - // page, and fail because it have no right to do so (segv). > - // > - Dev->SharedInfo = AllocateReservedPages (1); > - Parameter.gpfn = (UINTN) Dev->SharedInfo >> EFI_PAGE_SHIFT; > - if (XenHypercallMemoryOp (Dev, XENMEM_add_to_physmap, &Parameter) != 0) { > - FreePages (Dev->SharedInfo, 1); > - Dev->SharedInfo = NULL; > - return EFI_LOAD_ERROR; > - } > - > - return EFI_SUCCESS; > + return __XenHypercall2 ((UINT8*)HyperPage + HypercallID * 32, Arg1, Arg2); ^ shouldn't it be Hyperpage? > } > diff --git a/OvmfPkg/XenBusDxe/XenHypercall.h > b/OvmfPkg/XenBusDxe/XenHypercall.h > index 06693830e16e..9d49e33eb5af 100644 > --- a/OvmfPkg/XenBusDxe/XenHypercall.h > +++ b/OvmfPkg/XenBusDxe/XenHypercall.h > @@ -18,9 +18,9 @@ > > /** > This function will put the two arguments in the right place (registers) and > - call HypercallAddr, which correspond to an entry in the hypercall pages. > + invoke the hypercall identified by HypercallID. > > - @param HypercallAddr A memory address where the hypercall to call is. > + @param HypercallID The symbolic ID of the hypercall to be invoked > @param Arg1 First argument. > @param Arg2 Second argument. > > @@ -29,7 +29,7 @@ > INTN > EFIAPI > XenHypercall2 ( > - IN VOID *HypercallAddr, > + IN INTN HypercallID, > IN OUT INTN Arg1, > IN OUT INTN Arg2 > ); > @@ -44,27 +44,23 @@ XenHypercall2 ( > **/ > EFI_STATUS > XenHyperpageInit ( > - XENBUS_DEVICE *Dev > ); > > /** > Return the value of the HVM parameter Index. > > - @param Dev A XENBUS_DEVICE instance. > @param Index The parameter to get, e.g. HVM_PARAM_STORE_EVTCHN. > > @return The value of the asked parameter or 0 in case of error. > **/ > UINT64 > XenHypercallHvmGetParam ( > - XENBUS_DEVICE *Dev, > UINT32 Index > ); > > /** > Hypercall to do different operation on the memory. > > - @param Dev A XENBUS_DEVICE instance. > @param Operation The operation number, e.g. XENMEM_add_to_physmap. > @param Arguments The arguments associated to the operation. > > @@ -73,7 +69,6 @@ XenHypercallHvmGetParam ( > **/ > INTN > XenHypercallMemoryOp ( > - IN XENBUS_DEVICE *Dev, > IN UINTN Operation, > IN OUT VOID *Arguments > ); > @@ -81,7 +76,6 @@ XenHypercallMemoryOp ( > /** > Do an operation on the event channels. > > - @param Dev A XENBUS_DEVICE instance. > @param Operation The operation number, e.g. EVTCHNOP_send. > @param Arguments The argument associated to the operation. > > @@ -90,24 +84,8 @@ XenHypercallMemoryOp ( > **/ > INTN > XenHypercallEventChannelOp ( > - IN XENBUS_DEVICE *Dev, > IN INTN Operation, > IN OUT VOID *Arguments > ); > > -/** > - Map the shared_info_t page into memory. > - > - @param Dev A XENBUS_DEVICE instance. > - > - @retval EFI_SUCCESS Dev->SharedInfo whill contain a pointer to > - the shared info page > - @retval EFI_LOAD_ERROR The shared info page could not be mapped. The > - hypercall returned an error. > -**/ > -EFI_STATUS > -XenGetSharedInfoPage ( > - IN OUT XENBUS_DEVICE *Dev > - ); > - > #endif > diff --git a/OvmfPkg/XenBusDxe/XenStore.c b/OvmfPkg/XenBusDxe/XenStore.c > index 2df8f5348585..7ec1e634bc5c 100644 > --- a/OvmfPkg/XenBusDxe/XenStore.c > +++ b/OvmfPkg/XenBusDxe/XenStore.c > @@ -1057,8 +1057,8 @@ XenStoreInit ( > > xs.Dev = Dev; > > - xs.EventChannel = (evtchn_port_t)XenHypercallHvmGetParam (Dev, > HVM_PARAM_STORE_EVTCHN); > - XenStoreGpfn = (UINTN)XenHypercallHvmGetParam (Dev, HVM_PARAM_STORE_PFN); > + xs.EventChannel = (evtchn_port_t)XenHypercallHvmGetParam > (HVM_PARAM_STORE_EVTCHN); > + XenStoreGpfn = (UINTN)XenHypercallHvmGetParam (HVM_PARAM_STORE_PFN); > xs.XenStore = (VOID *) (XenStoreGpfn << EFI_PAGE_SHIFT); > DEBUG ((EFI_D_INFO, "XenBusInit: XenBus rings @%p, event channel %x\n", > xs.XenStore, xs.EventChannel)); > -- > 1.8.3.2 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |