[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2 04/17] x86/hvm: unify dpci portio intercept with standard portio intercept



>>> On 11.06.15 at 17:42, <paul.durrant@xxxxxxxxxx> wrote:
> --- a/xen/arch/x86/hvm/io.c
> +++ b/xen/arch/x86/hvm/io.c
> @@ -208,185 +208,113 @@ void hvm_io_assist(ioreq_t *p)
>      }
>  }
>  
> -static int dpci_ioport_read(uint32_t mport, ioreq_t *p)
> +static bool_t dpci_portio_accept(struct hvm_io_handler *io_handler,
> +                                 struct vcpu *v,
> +                                 uint64_t addr,
> +                                 uint32_t size)
>  {
> -    struct hvm_vcpu_io *vio = &current->arch.hvm_vcpu.hvm_io;
> -    int rc = X86EMUL_OKAY, i, step = p->df ? -p->size : p->size;
> -    uint32_t data = 0;
> -
> -    for ( i = 0; i < p->count; i++ )
> -    {
> -        if ( vio->mmio_retrying )
> -        {
> -            if ( vio->mmio_large_read_bytes != p->size )
> -                return X86EMUL_UNHANDLEABLE;
> -            memcpy(&data, vio->mmio_large_read, p->size);
> -            vio->mmio_large_read_bytes = 0;
> -            vio->mmio_retrying = 0;
> -        }
> -        else switch ( p->size )
> -        {
> -        case 1:
> -            data = inb(mport);
> -            break;
> -        case 2:
> -            data = inw(mport);
> -            break;
> -        case 4:
> -            data = inl(mport);
> -            break;
> -        default:
> -            BUG();
> -        }
> +    struct hvm_iommu *hd = domain_hvm_iommu(v->domain);
> +    struct hvm_vcpu_io *vio = &v->arch.hvm_vcpu.hvm_io;
> +    struct g2m_ioport *g2m_ioport;
> +    uint32_t start, end;
> +    uint32_t gport = addr, mport;
>  
> -        if ( p->data_is_ptr )
> -        {
> -            switch ( hvm_copy_to_guest_phys(p->data + step * i,
> -                                            &data, p->size) )
> -            {
> -            case HVMCOPY_okay:
> -                break;
> -            case HVMCOPY_gfn_paged_out:
> -            case HVMCOPY_gfn_shared:
> -                rc = X86EMUL_RETRY;
> -                break;
> -            case HVMCOPY_bad_gfn_to_mfn:
> -                /* Drop the write as real hardware would. */
> -                continue;
> -            case HVMCOPY_bad_gva_to_gfn:
> -                ASSERT(0);
> -                /* fall through */
> -            default:
> -                rc = X86EMUL_UNHANDLEABLE;
> -                break;
> -            }
> -            if ( rc != X86EMUL_OKAY)
> -                break;
> -        }
> -        else
> -            p->data = data;
> -    }
>  
> -    if ( rc == X86EMUL_RETRY )
> +    list_for_each_entry( g2m_ioport, &hd->arch.g2m_ioport_list, list )
>      {
> -        vio->mmio_retry = 1;
> -        vio->mmio_large_read_bytes = p->size;
> -        memcpy(vio->mmio_large_read, &data, p->size);
> +        start = g2m_ioport->gport;
> +        end = start + g2m_ioport->np;
> +        if ( (gport >= start) && (gport < end) )
> +            goto found;
>      }
>  
> -    if ( i != 0 )
> +    return 0;
> +
> + found:
> +    mport = (gport - start) + g2m_ioport->mport;
> +
> +    if ( !ioports_access_permitted(current->domain, mport,

Isn't v == current here (which of course should be made obvious
again by naming it curr)? And then - is this check needed here at
all? I realize you just move it, but the permission check should be
(and is being) done in the XEN_DOMCTL_ioport_mapping handler.

> +void register_dpci_portio_handler(struct domain *d)
> +{
> +    struct hvm_io_handler *handler = &d->arch.hvm_domain.dpci_handler;
>  
> -    switch ( p->dir )
> -    {
> -    case IOREQ_READ:
> -        rc = dpci_ioport_read(mport, p);
> -        break;
> -    case IOREQ_WRITE:
> -        rc = dpci_ioport_write(mport, p);
> -        break;
> -    default:
> -        gdprintk(XENLOG_ERR, "Error: couldn't handle p->dir = %d", p->dir);
> -        rc = X86EMUL_UNHANDLEABLE;
> -    }
> +    handler->type = IOREQ_TYPE_PIO;
> +    handler->ops = &dpci_portio_ops;
>  
> -    return rc;
> +    hvm_register_io_handler(d, handler, 1);

Again registering a pointer into struct domain, with invariant
initialization.

Jan

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.