[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Xen-devel] [PATCH,RFC 16/17] 32-on-64 grant table ops



Index: 2006-10-04/xen/arch/x86/x86_64/compat/entry.S
===================================================================
--- 2006-10-04.orig/xen/arch/x86/x86_64/compat/entry.S  2006-10-04 
15:20:20.000000000 +0200
+++ 2006-10-04/xen/arch/x86/x86_64/compat/entry.S       2006-10-04 
15:20:41.000000000 +0200
@@ -286,7 +286,6 @@ compat_arch_sched_op:
 .section .rodata, "a", @progbits
 
 #define compat_platform_op domain_crash_synchronous
-#define compat_grant_table_op domain_crash_synchronous
 #define compat_acm_op domain_crash_synchronous
 #define compat_xenoprof_op domain_crash_synchronous
 #define compat_sysctl domain_crash_synchronous
Index: 2006-10-04/xen/common/Makefile
===================================================================
--- 2006-10-04.orig/xen/common/Makefile 2006-10-04 15:20:20.000000000 +0200
+++ 2006-10-04/xen/common/Makefile      2006-10-04 15:20:41.000000000 +0200
@@ -37,5 +37,6 @@ version.o: $(BASEDIR)/include/xen/compil
 
 ifeq ($(CONFIG_COMPAT),y)
 # extra dependencies
+grant_table.o: compat/grant_table.c
 schedule.o: compat/schedule.c
 endif
Index: 2006-10-04/xen/common/compat/grant_table.c
===================================================================
--- /dev/null   1970-01-01 00:00:00.000000000 +0000
+++ 2006-10-04/xen/common/compat/grant_table.c  2006-10-04 15:20:41.000000000 
+0200
@@ -0,0 +1,218 @@
+/******************************************************************************
+ * common/compat/grant_table.c
+ *
+ */
+
+#include <compat/grant_table.h>
+
+#define xen_grant_entry grant_entry
+CHECK_grant_entry
+#undef xen_grant_entry
+
+#define xen_gnttab_map_grant_ref gnttab_map_grant_ref
+CHECK_gnttab_map_grant_ref
+#undef xen_gnttab_map_grant_ref
+
+#define xen_gnttab_unmap_grant_ref gnttab_unmap_grant_ref
+CHECK_gnttab_unmap_grant_ref
+#undef xen_gnttab_unmap_grant_ref
+
+DEFINE_XEN_GUEST_HANDLE(gnttab_setup_table_compat_t);
+DEFINE_XEN_GUEST_HANDLE(gnttab_transfer_compat_t);
+DEFINE_XEN_GUEST_HANDLE(gnttab_copy_compat_t);
+
+#define xen_gnttab_dump_table gnttab_dump_table
+CHECK_gnttab_dump_table
+#undef xen_gnttab_dump_table
+
+int compat_grant_table_op(unsigned int cmd,
+                          XEN_GUEST_HANDLE(void) cmp_uop,
+                          unsigned int count)
+{
+    int rc = 0;
+    unsigned int i;
+
+    switch ( cmd )
+    {
+#define CASE(name) \
+    case GNTTABOP_##name: \
+        if ( unlikely(!guest_handle_okay(guest_handle_cast(cmp_uop, \
+                                                           
gnttab_##name##_compat_t), \
+                                         count)) ) \
+            rc = -EFAULT; \
+        break
+
+#ifndef CHECK_gnttab_map_grant_ref
+    CASE(map_grant_ref);
+#endif
+
+#ifndef CHECK_gnttab_unmap_grant_ref
+    CASE(unmap_grant_ref);
+#endif
+
+#ifndef CHECK_gnttab_setup_table
+    CASE(setup_table);
+#endif
+
+#ifndef CHECK_gnttab_transfer
+    CASE(transfer);
+#endif
+
+#ifndef CHECK_gnttab_copy
+    CASE(copy);
+#endif
+
+#ifndef CHECK_gnttab_dump_table
+    CASE(dump_table);
+#endif
+
+#undef CASE
+    default:
+        return do_grant_table_op(cmd, cmp_uop, count);
+    }
+
+    if ( count > 512 )
+        rc = -EINVAL;
+
+    for ( i = 0; i < count && rc == 0; )
+    {
+        unsigned int n;
+        union {
+            XEN_GUEST_HANDLE(void) uop;
+            struct gnttab_setup_table *setup;
+            struct gnttab_transfer *xfer;
+            struct gnttab_copy *copy;
+        } nat;
+        union {
+            struct compat_gnttab_setup_table setup;
+            struct compat_gnttab_transfer xfer;
+            struct compat_gnttab_copy copy;
+        } cmp;
+
+        set_xen_guest_handle(nat.uop, (void 
*)COMPAT_ARG_XLAT_VIRT_START(current->vcpu_id));
+        switch ( cmd )
+        {
+        case GNTTABOP_setup_table:
+            if ( unlikely(count > 1) )
+                rc = -EINVAL;
+            else if ( unlikely(__copy_from_guest(&cmp.setup, cmp_uop, 1)) )
+                rc = -EFAULT;
+            else if ( unlikely(!compat_handle_okay(cmp.setup.frame_list, 
cmp.setup.nr_frames)) )
+                rc = -EFAULT;
+            else
+            {
+                BUILD_BUG_ON((COMPAT_ARG_XLAT_SIZE - sizeof(*nat.setup)) / 
sizeof(*nat.setup->frame_list.p) <
NR_GRANT_FRAMES);
+#define XLAT_gnttab_setup_table_HNDL_frame_list(_d_, _s_) \
+                set_xen_guest_handle((_d_)->frame_list, (unsigned long 
*)(nat.setup + 1))
+                XLAT_gnttab_setup_table(nat.setup, &cmp.setup);
+#undef XLAT_gnttab_setup_table_HNDL_frame_list
+                rc = gnttab_setup_table(guest_handle_cast(nat.uop, 
gnttab_setup_table_t), 1);
+            }
+            if ( rc == 0 )
+            {
+                BUG_ON(nat.setup->nr_frames > NR_GRANT_FRAMES);
+#define XLAT_gnttab_setup_table_HNDL_frame_list(_d_, _s_) \
+                do \
+                { \
+                    if ( (_s_)->status == GNTST_okay ) \
+                    { \
+                        for ( i = 0; i < (_s_)->nr_frames; ++i ) \
+                        { \
+                            unsigned int frame = (_s_)->frame_list.p[i]; \
+                            BUG_ON(frame != (_s_)->frame_list.p[i]); \
+                            (void)__copy_to_compat_offset((_d_)->frame_list, 
i, &frame, 1); \
+                        } \
+                    } \
+                } while (0)
+                XLAT_gnttab_setup_table(&cmp.setup, nat.setup);
+#undef XLAT_gnttab_setup_table_HNDL_frame_list
+                if ( unlikely(__copy_to_guest(cmp_uop, &cmp.setup, 1)) )
+                    rc = -EFAULT;
+                else
+                    i = 1;
+            }
+            break;
+
+        case GNTTABOP_transfer:
+            for ( n = 0; i < COMPAT_ARG_XLAT_SIZE / sizeof(*nat.xfer) && i < 
count && rc == 0; ++i, ++n )
+            {
+                if ( unlikely(__copy_from_guest_offset(&cmp.xfer, cmp_uop, i, 
1)) )
+                    rc = -EFAULT;
+                else
+                {
+                    XLAT_gnttab_transfer(nat.xfer + n, &cmp.xfer);
+                }
+            }
+            if ( rc == 0 )
+                rc = gnttab_transfer(guest_handle_cast(nat.uop, 
gnttab_transfer_t), n);
+            if ( rc == 0 )
+            {
+                XEN_GUEST_HANDLE(gnttab_transfer_compat_t) xfer;
+
+                xfer = guest_handle_cast(cmp_uop, gnttab_transfer_compat_t);
+                guest_handle_add_offset(xfer, i);
+                while ( n-- )
+                {
+                    guest_handle_add_offset(xfer, -1);
+                    if ( __copy_field_to_guest(xfer, nat.xfer, status) )
+                        rc = -EFAULT;
+                }
+            }
+            break;
+
+        case GNTTABOP_copy:
+            for ( n = 0; i < COMPAT_ARG_XLAT_SIZE / sizeof(*nat.copy) && i < 
count && rc == 0; ++i, ++n )
+            {
+                if ( unlikely(__copy_from_guest_offset(&cmp.copy, cmp_uop, i, 
1)) )
+                    rc = -EFAULT;
+                else
+                {
+                    enum XLAT_gnttab_copy_source_u source_u;
+                    enum XLAT_gnttab_copy_dest_u dest_u;
+
+                    if ( cmp.copy.flags & GNTCOPY_source_gref )
+                        source_u = XLAT_gnttab_copy_source_u_ref;
+                    else
+                        source_u = XLAT_gnttab_copy_source_u_gmfn;
+                    if ( cmp.copy.flags & GNTCOPY_dest_gref )
+                        dest_u = XLAT_gnttab_copy_dest_u_ref;
+                    else
+                        dest_u = XLAT_gnttab_copy_dest_u_gmfn;
+                    XLAT_gnttab_copy(nat.copy + n, &cmp.copy);
+                }
+            }
+            if ( rc == 0 )
+                rc = gnttab_copy(guest_handle_cast(nat.uop, gnttab_copy_t), n);
+            if ( rc == 0 )
+            {
+                XEN_GUEST_HANDLE(gnttab_copy_compat_t) copy;
+
+                copy = guest_handle_cast(cmp_uop, gnttab_copy_compat_t);
+                guest_handle_add_offset(copy, i);
+                while ( n-- )
+                {
+                    guest_handle_add_offset(copy, -1);
+                    if ( __copy_field_to_guest(copy, nat.copy, status) )
+                        rc = -EFAULT;
+                }
+            }
+            break;
+
+        default:
+            domain_crash_synchronous();
+            break;
+        }
+    }
+
+    return rc;
+}
+
+/*
+ * Local variables:
+ * mode: C
+ * c-set-style: "BSD"
+ * c-basic-offset: 4
+ * tab-width: 4
+ * indent-tabs-mode: nil
+ * End:
+ */
Index: 2006-10-04/xen/common/grant_table.c
===================================================================
--- 2006-10-04.orig/xen/common/grant_table.c    2006-10-04 08:49:30.000000000 
+0200
+++ 2006-10-04/xen/common/grant_table.c 2006-10-04 15:20:41.000000000 +0200
@@ -1014,6 +1014,10 @@ do_grant_table_op(
     return rc;
 }
 
+#ifdef CONFIG_COMPAT
+#include "compat/grant_table.c"
+#endif
+
 int 
 grant_table_create(
     struct domain *d)
Index: 2006-10-04/xen/include/xlat.lst
===================================================================
--- 2006-10-04.orig/xen/include/xlat.lst        2006-10-04 15:20:20.000000000 
+0200
+++ 2006-10-04/xen/include/xlat.lst     2006-10-04 15:20:41.000000000 +0200
@@ -20,6 +20,13 @@
 ?      evtchn_send                     event_channel.h
 ?      evtchn_status                   event_channel.h
 ?      evtchn_unmask                   event_channel.h
+!      gnttab_copy                     grant_table.h
+?      gnttab_dump_table               grant_table.h
+?      gnttab_map_grant_ref            grant_table.h
+!      gnttab_setup_table              grant_table.h
+!      gnttab_transfer                 grant_table.h
+?      gnttab_unmap_grant_ref          grant_table.h
+?      grant_entry                     grant_table.h
 !      add_to_physmap                  memory.h
 !      memory_exchange                 memory.h
 !      memory_map                      memory.h


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.