[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 07/30] xen/x86: split the setup of Dom0 permissions to a function
On Thu, Sep 29, 2016 at 07:47:22AM -0600, Jan Beulich wrote: > >>> On 27.09.16 at 17:57, <roger.pau@xxxxxxxxxx> wrote: > > So that it can also be used by the PVH-specific domain builder. This is just > > code motion, it should not introduce any functional change. > > > > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> > > Looks generally okay, but please do minor style corrections as you > move code: > > > --- a/xen/arch/x86/domain_build.c > > +++ b/xen/arch/x86/domain_build.c > > @@ -869,6 +869,89 @@ static __init void setup_pv_physmap(struct domain *d, > > unsigned long pgtbl_pfn, > > unmap_domain_page(l4start); > > } > > > > +static int __init setup_permissions(struct domain *d) > > +{ > > + unsigned long mfn; > > + int i, rc = 0; > > i should be unsigned int, and the initializer of rc could be avoided. Done (I've also converted the first assignment to rc below from |= to =). > > + /* The hardware domain is initially permitted full I/O capabilities. */ > > + rc |= ioports_permit_access(d, 0, 0xFFFF); > > + rc |= iomem_permit_access(d, 0UL, (1UL << (paddr_bits - PAGE_SHIFT)) - > > 1); > > + rc |= irqs_permit_access(d, 1, nr_irqs_gsi - 1); > > + > > + /* > > + * Modify I/O port access permissions. > > + */ > > This is a single line comment - I understand it's trying to be more of a > separator than the others, but I'd prefer for it to do so by being > followed by a blank line. > > > + /* Master Interrupt Controller (PIC). */ > > + rc |= ioports_deny_access(d, 0x20, 0x21); > > + /* Slave Interrupt Controller (PIC). */ > > + rc |= ioports_deny_access(d, 0xA0, 0xA1); > > + /* Interval Timer (PIT). */ > > + rc |= ioports_deny_access(d, 0x40, 0x43); > > + /* PIT Channel 2 / PC Speaker Control. */ > > + rc |= ioports_deny_access(d, 0x61, 0x61); > > + /* ACPI PM Timer. */ > > + if ( pmtmr_ioport ) > > + rc |= ioports_deny_access(d, pmtmr_ioport, pmtmr_ioport + 3); > > + /* PCI configuration space (NB. 0xcf8 has special treatment). */ > > + rc |= ioports_deny_access(d, 0xcfc, 0xcff); > > + /* Command-line I/O ranges. */ > > + process_dom0_ioports_disable(d); > > + > > + /* > > + * Modify I/O memory access permissions. > > + */ > > Dito. > > > - BUG_ON(rc != 0); > > + rc = setup_permissions(d); > > + if ( rc != 0 ) > > + panic("Failed to setup Dom0 permissions"); > > To be honest, I'm not sure of this BUG_ON() -> panic() conversion. > I think I'd prefer it to stay the way it was. We're not really expecting > for any of this to fail anyway. > > Jan Done, fixed all the above, thanks. Roger. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |