[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 17/29] Ovmf/Xen: refactor XenBusDxe hypercall implementation
On Thu, Feb 12, 2015 at 07:19:09PM +0800, Ard Biesheuvel wrote: > This refactors the Xen hypercall implementation that is part of the > XenBusDxe driver, in preparation of splitting it off entirely into > a XenHypercallLib library. This involves: > - removing the dependency on XENBUS_DEVICE* pointers in the XenHypercall() > prototypes > - moving the discovered hyperpage address to a global variable > - moving XenGetSharedInfoPage() to its only user XenBusDxe.c (the shared info > page is not strictly part of the Xen hypercall interface, and is not used > by other expected users of XenHypercallLib such as the Xen console version > of SerialPortLib > - reimplement XenHypercall2() in C and move the indexing of the hyperpage > there; the existing asm implementations are renamed to __XenHypercall2() and > invoked from the new C implementation. > > Contributed-under: TianoCore Contribution Agreement 1.0 > Acked-by: Laszlo Ersek <lersek@xxxxxxxxxx> > Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> > --- > OvmfPkg/XenBusDxe/EventChannel.c | 11 +++-------- > OvmfPkg/XenBusDxe/GrantTable.c | 4 ++-- > OvmfPkg/XenBusDxe/Ia32/hypercall.nasm | 6 +++--- > OvmfPkg/XenBusDxe/X64/hypercall.nasm | 6 +++--- > OvmfPkg/XenBusDxe/XenBusDxe.c | 44 > +++++++++++++++++++++++++++++++++++++++++++- > OvmfPkg/XenBusDxe/XenBusDxe.h | 1 - > OvmfPkg/XenBusDxe/XenHypercall.c | 61 > +++++++++++++++++++++++++------------------------------------ > OvmfPkg/XenBusDxe/XenHypercall.h | 28 +++------------------------- > OvmfPkg/XenBusDxe/XenStore.c | 4 ++-- > 9 files changed, 84 insertions(+), 81 deletions(-) > > diff --git a/OvmfPkg/XenBusDxe/XenHypercall.c > b/OvmfPkg/XenBusDxe/XenHypercall.c > index 34d92e76b7e3..19c34bdd0cec 100644 > --- a/OvmfPkg/XenBusDxe/XenHypercall.c > +++ b/OvmfPkg/XenBusDxe/XenHypercall.c > @@ -23,9 +23,21 @@ > #include <IndustryStandard/Xen/hvm/params.h> > #include <IndustryStandard/Xen/memory.h> > > +STATIC VOID *HyperPage; > + > +// > +// Interface exposed by the ASM implementation of the core hypercall > +// > +INTN > +EFIAPI > +__XenHypercall2 ( > + IN VOID *HypercallAddr, > + IN OUT INTN Arg1, > + IN OUT INTN Arg2 > + ); > + > EFI_STATUS > XenHyperpageInit ( > - IN OUT XENBUS_DEVICE *Dev > ) > { > EFI_HOB_GUID_TYPE *GuidHob; > @@ -36,24 +48,21 @@ XenHyperpageInit ( > return EFI_NOT_FOUND; > } > XenInfo = (EFI_XEN_INFO *) GET_GUID_HOB_DATA (GuidHob); > - Dev->Hyperpage = XenInfo->HyperPages; > + HyperPage = XenInfo->HyperPages; > return EFI_SUCCESS; > } > > UINT64 > XenHypercallHvmGetParam ( > - IN XENBUS_DEVICE *Dev, > IN UINT32 Index > ) > { > xen_hvm_param_t Parameter; > INTN Error; > > - ASSERT (Dev->Hyperpage != NULL); > - > Parameter.domid = DOMID_SELF; > Parameter.index = Index; > - Error = XenHypercall2 ((UINT8*)Dev->Hyperpage + __HYPERVISOR_hvm_op * 32, > + Error = XenHypercall2 (__HYPERVISOR_hvm_op, > HVMOP_get_param, (INTN) &Parameter); > if (Error != 0) { > DEBUG ((EFI_D_ERROR, > @@ -66,53 +75,33 @@ XenHypercallHvmGetParam ( > > INTN > XenHypercallMemoryOp ( > - IN XENBUS_DEVICE *Dev, > IN UINTN Operation, > IN OUT VOID *Arguments > ) > { > - ASSERT (Dev->Hyperpage != NULL); > - return XenHypercall2 ((UINT8*)Dev->Hyperpage + __HYPERVISOR_memory_op * 32, > + return XenHypercall2 (__HYPERVISOR_memory_op, > Operation, (INTN) Arguments); > } > > INTN > XenHypercallEventChannelOp ( > - IN XENBUS_DEVICE *Dev, > IN INTN Operation, > IN OUT VOID *Arguments > ) > { > - ASSERT (Dev->Hyperpage != NULL); > - return XenHypercall2 ((UINT8*)Dev->Hyperpage + > __HYPERVISOR_event_channel_op * 32, > + return XenHypercall2 (__HYPERVISOR_event_channel_op, > Operation, (INTN) Arguments); > } > > -EFI_STATUS > -XenGetSharedInfoPage ( > - IN OUT XENBUS_DEVICE *Dev > +INTN > +EFIAPI > +XenHypercall2 ( > + IN INTN HypercallID, This could be an unsigned since HypercallID should probably not be negative. Beside this comment, Reviewed-by: Anthony PERARD <anthony.perard@xxxxxxxxxx> > + IN OUT INTN Arg1, > + IN OUT INTN Arg2 > ) > { > - xen_add_to_physmap_t Parameter; > + ASSERT (HyperPage != NULL); > > - ASSERT (Dev->SharedInfo == NULL); > - > - Parameter.domid = DOMID_SELF; > - Parameter.space = XENMAPSPACE_shared_info; > - Parameter.idx = 0; > - > - // > - // using reserved page because the page is not released when Linux is > - // starting because of the add_to_physmap. QEMU might try to access the > - // page, and fail because it have no right to do so (segv). > - // > - Dev->SharedInfo = AllocateReservedPages (1); > - Parameter.gpfn = (UINTN) Dev->SharedInfo >> EFI_PAGE_SHIFT; > - if (XenHypercallMemoryOp (Dev, XENMEM_add_to_physmap, &Parameter) != 0) { > - FreePages (Dev->SharedInfo, 1); > - Dev->SharedInfo = NULL; > - return EFI_LOAD_ERROR; > - } > - > - return EFI_SUCCESS; > + return __XenHypercall2 ((UINT8*)HyperPage + HypercallID * 32, Arg1, Arg2); > } -- Anthony PERARD _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |