From: Andrew Cooper <andrew.cooper3@citrix.com>
To: Xen-devel <xen-devel@lists.xen.org>
Cc: Andrew Cooper <andrew.cooper3@citrix.com>,
Jan Beulich <JBeulich@suse.com>
Subject: [PATCH 5/6] x86/hvm: Break out __hvm_copy()'s translation logic
Date: Wed, 21 Jun 2017 16:12:31 +0100 [thread overview]
Message-ID: <1498057952-13556-6-git-send-email-andrew.cooper3@citrix.com> (raw)
In-Reply-To: <1498057952-13556-1-git-send-email-andrew.cooper3@citrix.com>
It will be reused by later changes.
Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com>
---
CC: Jan Beulich <JBeulich@suse.com>
---
xen/arch/x86/hvm/hvm.c | 141 ++++++++++++++++++++++----------------
xen/include/asm-x86/hvm/support.h | 12 ++++
2 files changed, 95 insertions(+), 58 deletions(-)
diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c
index c822d3b..0a5697a 100644
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -3072,6 +3072,80 @@ void hvm_task_switch(
hvm_unmap_entry(nptss_desc);
}
+enum hvm_translation_result hvm_translate_get_page(
+ struct vcpu *v, unsigned long addr, bool linear, uint32_t pfec,
+ pagefault_info_t *pfinfo, struct page_info **_page,
+ gfn_t *__gfn, p2m_type_t *_p2mt)
+{
+ struct page_info *page;
+ p2m_type_t p2mt;
+ gfn_t gfn;
+
+ if ( linear )
+ {
+ gfn = _gfn(paging_gva_to_gfn(v, addr, &pfec));
+
+ if ( gfn_eq(gfn, INVALID_GFN) )
+ {
+ if ( pfec & PFEC_page_paged )
+ return HVMTRANS_gfn_paged_out;
+
+ if ( pfec & PFEC_page_shared )
+ return HVMTRANS_gfn_shared;
+
+ if ( pfinfo )
+ {
+ pfinfo->linear = addr;
+ pfinfo->ec = pfec & ~PFEC_implicit;
+ }
+
+ return HVMTRANS_bad_linear_to_gfn;
+ }
+ }
+ else
+ gfn = _gfn(addr >> PAGE_SHIFT);
+
+ /*
+ * No need to do the P2M lookup for internally handled MMIO, benefiting
+ * - 32-bit WinXP (& older Windows) on AMD CPUs for LAPIC accesses,
+ * - newer Windows (like Server 2012) for HPET accesses.
+ */
+ if ( v == current && is_hvm_vcpu(v)
+ && !nestedhvm_vcpu_in_guestmode(v)
+ && hvm_mmio_internal(gfn_x(gfn) << PAGE_SHIFT) )
+ return HVMTRANS_bad_gfn_to_mfn;
+
+ page = get_page_from_gfn(v->domain, gfn_x(gfn), &p2mt, P2M_UNSHARE);
+
+ if ( !page )
+ return HVMTRANS_bad_gfn_to_mfn;
+
+ if ( p2m_is_paging(p2mt) )
+ {
+ put_page(page);
+ p2m_mem_paging_populate(v->domain, gfn_x(gfn));
+ return HVMTRANS_gfn_paged_out;
+ }
+ if ( p2m_is_shared(p2mt) )
+ {
+ put_page(page);
+ return HVMTRANS_gfn_shared;
+ }
+ if ( p2m_is_grant(p2mt) )
+ {
+ put_page(page);
+ return HVMTRANS_unhandleable;
+ }
+
+ *_page = page;
+ if ( __gfn )
+ *__gfn = gfn;
+ if ( _p2mt )
+ *_p2mt = p2mt;
+
+ return HVMTRANS_okay;
+}
+
#define HVMCOPY_from_guest (0u<<0)
#define HVMCOPY_to_guest (1u<<0)
#define HVMCOPY_phys (0u<<2)
@@ -3080,7 +3154,7 @@ static enum hvm_translation_result __hvm_copy(
void *buf, paddr_t addr, int size, struct vcpu *v, unsigned int flags,
uint32_t pfec, pagefault_info_t *pfinfo)
{
- unsigned long gfn;
+ gfn_t gfn;
struct page_info *page;
p2m_type_t p2mt;
char *p;
@@ -3106,65 +3180,15 @@ static enum hvm_translation_result __hvm_copy(
while ( todo > 0 )
{
+ enum hvm_translation_result res;
paddr_t gpa = addr & ~PAGE_MASK;
count = min_t(int, PAGE_SIZE - gpa, todo);
- if ( flags & HVMCOPY_linear )
- {
- gfn = paging_gva_to_gfn(v, addr, &pfec);
- if ( gfn == gfn_x(INVALID_GFN) )
- {
- if ( pfec & PFEC_page_paged )
- return HVMTRANS_gfn_paged_out;
- if ( pfec & PFEC_page_shared )
- return HVMTRANS_gfn_shared;
- if ( pfinfo )
- {
- pfinfo->linear = addr;
- pfinfo->ec = pfec & ~PFEC_implicit;
- }
- return HVMTRANS_bad_linear_to_gfn;
- }
- gpa |= (paddr_t)gfn << PAGE_SHIFT;
- }
- else
- {
- gfn = addr >> PAGE_SHIFT;
- gpa = addr;
- }
-
- /*
- * No need to do the P2M lookup for internally handled MMIO, benefiting
- * - 32-bit WinXP (& older Windows) on AMD CPUs for LAPIC accesses,
- * - newer Windows (like Server 2012) for HPET accesses.
- */
- if ( v == current && is_hvm_vcpu(v)
- && !nestedhvm_vcpu_in_guestmode(v)
- && hvm_mmio_internal(gpa) )
- return HVMTRANS_bad_gfn_to_mfn;
-
- page = get_page_from_gfn(v->domain, gfn, &p2mt, P2M_UNSHARE);
-
- if ( !page )
- return HVMTRANS_bad_gfn_to_mfn;
-
- if ( p2m_is_paging(p2mt) )
- {
- put_page(page);
- p2m_mem_paging_populate(v->domain, gfn);
- return HVMTRANS_gfn_paged_out;
- }
- if ( p2m_is_shared(p2mt) )
- {
- put_page(page);
- return HVMTRANS_gfn_shared;
- }
- if ( p2m_is_grant(p2mt) )
- {
- put_page(page);
- return HVMTRANS_unhandleable;
- }
+ res = hvm_translate_get_page(v, addr, flags & HVMCOPY_linear,
+ pfec, pfinfo, &page, &gfn, &p2mt);
+ if ( res != HVMTRANS_okay )
+ return res;
p = (char *)__map_domain_page(page) + (addr & ~PAGE_MASK);
@@ -3173,10 +3197,11 @@ static enum hvm_translation_result __hvm_copy(
if ( p2m_is_discard_write(p2mt) )
{
static unsigned long lastpage;
- if ( xchg(&lastpage, gfn) != gfn )
+
+ if ( xchg(&lastpage, gfn_x(gfn)) != gfn_x(gfn) )
dprintk(XENLOG_G_DEBUG,
"%pv attempted write to read-only gfn %#lx (mfn=%#lx)\n",
- v, gfn, page_to_mfn(page));
+ v, gfn_x(gfn), page_to_mfn(page));
}
else
{
diff --git a/xen/include/asm-x86/hvm/support.h b/xen/include/asm-x86/hvm/support.h
index a1799a3..42cccf0 100644
--- a/xen/include/asm-x86/hvm/support.h
+++ b/xen/include/asm-x86/hvm/support.h
@@ -24,6 +24,7 @@
#include <xen/sched.h>
#include <xen/hvm/save.h>
#include <asm/processor.h>
+#include <asm/p2m.h>
#ifndef NDEBUG
#define DBG_LEVEL_0 (1 << 0)
@@ -103,6 +104,17 @@ enum hvm_translation_result hvm_fetch_from_guest_linear(
void *buf, unsigned long addr, int size, uint32_t pfec,
pagefault_info_t *pfinfo);
+/*
+ * Get a reference on the page under an HVM physical or linear address. If
+ * linear, a pagewalk is performed using pfec (fault details optionally in
+ * pfinfo).
+ * On success, returns HVMTRANS_okay with a reference taken on **_page.
+ */
+enum hvm_translation_result hvm_translate_get_page(
+ struct vcpu *v, unsigned long addr, bool linear, uint32_t pfec,
+ pagefault_info_t *pfinfo, struct page_info **_page,
+ gfn_t *__gfn, p2m_type_t *_p2mt);
+
#define HVM_HCALL_completed 0 /* hypercall completed - no further action */
#define HVM_HCALL_preempted 1 /* hypercall preempted - re-execute VMCALL */
int hvm_hypercall(struct cpu_user_regs *regs);
--
2.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next prev parent reply other threads:[~2017-06-21 15:12 UTC|newest]
Thread overview: 28+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-06-21 15:12 [PATCH 0/6] Various XSA followups Andrew Cooper
2017-06-21 15:12 ` [PATCH 1/6] x86/hvm: Fixes to hvmemul_insn_fetch() Andrew Cooper
2017-06-21 16:04 ` Paul Durrant
2017-06-21 16:15 ` Andrew Cooper
2017-06-21 16:49 ` Paul Durrant
2017-06-22 8:05 ` Jan Beulich
2017-06-21 15:12 ` [PATCH 2/6] x86/shadow: Fixes to hvm_emulate_insn_fetch() Andrew Cooper
2017-06-22 8:09 ` Jan Beulich
2017-06-22 11:52 ` Tim Deegan
2017-06-21 15:12 ` [PATCH 3/6] x86/shadow: Use ERR_PTR infrastructure for sh_emulate_map_dest() Andrew Cooper
2017-06-22 8:14 ` Jan Beulich
2017-06-22 8:21 ` Andrew Cooper
2017-06-22 9:07 ` Jan Beulich
2017-07-03 14:22 ` Andrew Cooper
2017-07-03 14:30 ` Jan Beulich
2017-06-22 12:09 ` Tim Deegan
2017-06-22 12:46 ` Andrew Cooper
2017-06-21 15:12 ` [PATCH 4/6] [RFC] x86/hvm: Rename enum hvm_copy_result to hvm_translation_result Andrew Cooper
2017-06-22 8:19 ` Jan Beulich
2017-06-21 15:12 ` Andrew Cooper [this message]
2017-06-22 8:30 ` [PATCH 5/6] x86/hvm: Break out __hvm_copy()'s translation logic Jan Beulich
2017-06-21 15:12 ` [PATCH 6/6] x86/hvm: Implement hvmemul_write() using real mappings Andrew Cooper
2017-06-21 16:19 ` Paul Durrant
2017-06-22 9:06 ` Jan Beulich
2017-07-03 15:07 ` Andrew Cooper
2017-07-03 16:06 ` Jan Beulich
[not found] ` <594BA4A3?= =?UTF-8?Q?0200007800165AA5@prv=ef=bf=bdmh.provo.novell.com>
[not found] ` <b9e9b637-0755-?= =?UTF-8?Q?a1bd-99c7-44ad3f13b5a4@citrix.com>
[not found] ` <595A879202000078001680B7@prv-?= =?UTF-8?Q?mh.provo.novell.com>
2017-07-03 17:24 ` Andrew Cooper
2017-07-04 7:10 ` Jan Beulich
[not found] <1498057952-13556-1-git-send-email-andrew.cooper3@citr?= =?UTF-8?Q?ix.com>
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1498057952-13556-6-git-send-email-andrew.cooper3@citrix.com \
--to=andrew.cooper3@citrix.com \
--cc=JBeulich@suse.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).