# HG changeset patch
# User Steven Smith <steven.smith@xxxxxxxxxxxxx>
# Date 1222085347 -3600
# Node ID 50e9196c995111491077834b7a3ff98d631df1f2
# Parent 2ffb577b2169147b09315d713a96326ef1349c95
Implement sub-page grant support.
Signed-off-by: Steven Smith <steven.smith@xxxxxxxxxx>
diff -r 2ffb577b2169 -r 50e9196c9951 xen/common/grant_table.c
--- a/xen/common/grant_table.c Mon Sep 22 12:23:28 2008 +0100
+++ b/xen/common/grant_table.c Mon Sep 22 13:09:07 2008 +0100
@@ -210,6 +210,7 @@
static int _set_status_v1(domid_t domid,
int readonly,
+ int mapflag,
grant_entry_header_t *shah,
struct active_grant_entry *act)
{
@@ -226,6 +227,11 @@
* so we allow a few retries before failing.
*/
int retries = 0;
+
+ /* if this is a grant mapping operation we should ensure GTF_sub_page
+ is not set */
+ if (mapflag)
+ mask |= GTF_sub_page;
scombo.word = *(u32 *)shah;
@@ -276,6 +282,7 @@
static int _set_status_v2(domid_t domid,
int readonly,
+ int mapflag,
grant_entry_header_t *shah,
struct active_grant_entry *act,
grant_status_t *status)
@@ -294,6 +301,11 @@
it back into two reads */
flags = scombo.shorts.flags;
id = scombo.shorts.domid;
+
+ /* if this is a grant mapping operation we should ensure GTF_sub_page
+ is not set */
+ if (mapflag)
+ mask |= GTF_sub_page;
/* If not already pinned, check the grant domid and type. */
if ( !act->pin &&
@@ -355,15 +367,16 @@
static int _set_status(unsigned gt_version,
domid_t domid,
int readonly,
+ int mapflag,
grant_entry_header_t *shah,
struct active_grant_entry *act,
grant_status_t *status)
{
if (gt_version == 1)
- return _set_status_v1(domid, readonly, shah, act);
+ return _set_status_v1(domid, readonly, mapflag, shah, act);
else
- return _set_status_v2(domid, readonly, shah, act, status);
+ return _set_status_v2(domid, readonly, mapflag, shah, act, status);
}
/*
@@ -460,10 +473,11 @@
/* If already pinned, check the active domid and avoid refcnt overflow. */
if ( act->pin &&
((act->domid != ld->domain_id) ||
- (act->pin & 0x80808080U) != 0) )
+ (act->pin & 0x80808080U) != 0 ||
+ (act->is_sub_page)) )
PIN_FAIL(unlock_out, GNTST_general_error,
- "Bad domain (%d != %d), or risk of counter overflow %08x\n",
- act->domid, ld->domain_id, act->pin);
+ "Bad domain (%d != %d), or risk of counter overflow %08x, or
subpage %d\n",
+ act->domid, ld->domain_id, act->pin, act->is_sub_page);
if ( !act->pin ||
(!(op->flags & GNTMAP_readonly) &&
@@ -471,7 +485,7 @@
{
if ( (rc = _set_status(rd->grant_table->gt_version,
ld->domain_id, op->flags & GNTMAP_readonly,
- shah, act, status) ) != GNTST_okay )
+ 1, shah, act, status) ) != GNTST_okay )
goto unlock_out;
if ( !act->pin )
@@ -482,6 +496,9 @@
else
act->gfn = sha2->frame;
act->frame = gmfn_to_mfn(rd, act->gfn);
+ act->start = 0;
+ act->length = PAGE_SIZE;
+ act->is_sub_page = 0;
}
}
@@ -1554,7 +1571,7 @@
static int
__acquire_grant_for_copy(
struct domain *rd, unsigned long gref, int readonly,
- unsigned long *frame)
+ unsigned long *frame, unsigned *page_off, unsigned *length)
{
grant_entry_v1_t *sha1;
grant_entry_v2_t *sha2;
@@ -1601,11 +1618,23 @@
{
if ( (rc = _set_status(rd->grant_table->gt_version,
current->domain->domain_id,
- readonly, shah, act, status) ) != GNTST_okay )
+ readonly, 0, shah, act, status) ) != GNTST_okay
)
goto unlock_out;
+
if ( !act->pin )
{
act->domid = current->domain->domain_id;
+ act->is_sub_page = 0;
+ act->start = 0;
+ act->length = PAGE_SIZE;
+
+ if ( sha2 && (shah->flags & GTF_sub_page) )
+ {
+ act->start = sha2->sub_page.page_off;
+ act->length = sha2->sub_page.length;
+ act->is_sub_page = 1;
+ }
+
if ( sha1 )
act->gfn = sha1->frame;
else
@@ -1616,6 +1645,8 @@
act->pin += readonly ? GNTPIN_hstr_inc : GNTPIN_hstw_inc;
+ *page_off = act->start;
+ *length = act->length;
*frame = act->frame;
unlock_out:
@@ -1667,10 +1698,18 @@
if ( src_is_gref )
{
- rc = __acquire_grant_for_copy(sd, op->source.u.ref, 1, &s_frame);
+ unsigned source_off, source_len;
+ rc = __acquire_grant_for_copy(sd, op->source.u.ref, 1, &s_frame,
+ &source_off, &source_len);
if ( rc != GNTST_okay )
goto error_out;
have_s_grant = 1;
+ if ( op->source.offset < source_off ||
+ op->len > source_len )
+ PIN_FAIL(error_out, GNTST_general_error,
+ "copy source out of bounds: %d < %d || %d > %d\n",
+ op->source.offset, source_off,
+ op->len, source_len);
}
else
{
@@ -1690,10 +1729,18 @@
if ( dest_is_gref )
{
- rc = __acquire_grant_for_copy(dd, op->dest.u.ref, 0, &d_frame);
+ unsigned dest_off, dest_len;
+ rc = __acquire_grant_for_copy(dd, op->dest.u.ref, 0, &d_frame,
+ &dest_off, &dest_len);
if ( rc != GNTST_okay )
goto error_out;
have_d_grant = 1;
+ if ( op->dest.offset < dest_off ||
+ op->len > dest_len )
+ PIN_FAIL(error_out, GNTST_general_error,
+ "copy dest out of bounds: %d < %d || %d > %d\n",
+ op->dest.offset, dest_off,
+ op->len, dest_len);
}
else
{
diff -r 2ffb577b2169 -r 50e9196c9951 xen/include/public/grant_table.h
--- a/xen/include/public/grant_table.h Mon Sep 22 12:23:28 2008 +0100
+++ b/xen/include/public/grant_table.h Mon Sep 22 13:09:07 2008 +0100
@@ -130,6 +130,9 @@
* GTF_reading: Grant entry is currently mapped for reading by @domid. [XEN]
* GTF_writing: Grant entry is currently mapped for writing by @domid. [XEN]
* GTF_PAT, GTF_PWT, GTF_PCD: (x86) cache attribute flags for the grant [GST]
+ * GTF_sub_page: Grant access to only a subrange of the page. @domid
+ * will only be allowed to copy from the grant, and not
+ * map it. [GST]
*/
#define _GTF_readonly (2)
#define GTF_readonly (1U<<_GTF_readonly)
@@ -143,6 +146,8 @@
#define GTF_PCD (1U<<_GTF_PCD)
#define _GTF_PAT (7)
#define GTF_PAT (1U<<_GTF_PAT)
+#define _GTF_sub_page (8)
+#define GTF_sub_page (1U<<_GTF_sub_page)
/*
* Subflags for GTF_accept_transfer:
@@ -192,6 +197,17 @@
* name.
*/
uint32_t frame;
+
+ /*
+ * If the grant type is GTF_grant_access and GTF_sub_page is
+ * set, @domid is allowed to access bytes
+ * [@page_off,@page_off+@length) in frame @frame.
+ */
+ struct {
+ uint32_t frame;
+ uint16_t page_off;
+ uint16_t length;
+ } sub_page;
uint32_t __spacer[3]; /* Pad to a power of two */
};
diff -r 2ffb577b2169 -r 50e9196c9951 xen/include/xen/grant_table.h
--- a/xen/include/xen/grant_table.h Mon Sep 22 12:23:28 2008 +0100
+++ b/xen/include/xen/grant_table.h Mon Sep 22 13:09:07 2008 +0100
@@ -30,10 +30,15 @@
/* Active grant entry - used for shadowing GTF_permit_access grants. */
struct active_grant_entry {
- u32 pin; /* Reference count information. */
- domid_t domid; /* Domain being granted access. */
+ u32 pin; /* Reference count information. */
+ domid_t domid; /* Domain being granted access. */
+ unsigned long frame; /* Frame being granted. */
unsigned long gfn; /* Guest's idea of the frame being granted. */
- unsigned long frame; /* Frame being granted. */
+ unsigned is_sub_page:1; /* True if this is a sub-page grant. */
+ unsigned start:15; /* For sub-page grants, the start offset
+ in the page. */
+ unsigned length:16; /* For sub-page grants, the length of the
+ grant. */
};
/* Count of writable host-CPU mappings. */
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel
|