|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2 17/29] Ovmf/Xen: refactor XenBusDxe hypercall implementation
On 01/27/15 14:10, Ard Biesheuvel wrote:
> On 27 January 2015 at 12:46, Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx> wrote:
>> On 27 January 2015 at 12:43, Stefano Stabellini
>> <stefano.stabellini@xxxxxxxxxxxxx> wrote:
>>> On Mon, 26 Jan 2015, Ard Biesheuvel wrote:
>>>> This refactors the Xen hypercall implementation that is part of the
>>>> XenBusDxe driver, in preparation of splitting it off entirely into
>>>> a XenHypercallLib library. This involves:
>>>> - removing the dependency on XENBUS_DEVICE* pointers in the XenHypercall()
>>>> prototypes
>>>> - moving the discovered hyperpage address to a global variable
>>>> - moving XenGetSharedInfoPage() to its only user XenBusDxe.c (the shared
>>>> info
>>>> page is not strictly part of the Xen hypercall interface, and is not used
>>>> by other expected users of XenHypercallLib such as the Xen console
>>>> version
>>>> of SerialPortLib
>>>> - reimplement XenHypercall2() in C and move the indexing of the hyperpage
>>>> there; the existing asm implementations are renamed to __XenHypercall2()
>>>> and
>>>> invoked from the new C implementation.
>>>>
>>>> Contributed-under: TianoCore Contribution Agreement 1.0
>>>> Signed-off-by: Ard Biesheuvel <ard.biesheuvel@xxxxxxxxxx>
>>>> ---
>>>> OvmfPkg/XenBusDxe/EventChannel.c | 11 +++--------
>>>> OvmfPkg/XenBusDxe/GrantTable.c | 4 ++--
>>>> OvmfPkg/XenBusDxe/Ia32/hypercall.nasm | 6 +++---
>>>> OvmfPkg/XenBusDxe/X64/hypercall.nasm | 6 +++---
>>>> OvmfPkg/XenBusDxe/XenBusDxe.c | 44
>>>> +++++++++++++++++++++++++++++++++++++++++++-
>>>> OvmfPkg/XenBusDxe/XenBusDxe.h | 1 -
>>>> OvmfPkg/XenBusDxe/XenHypercall.c | 50
>>>> ++++++++++++++------------------------------------
>>>> OvmfPkg/XenBusDxe/XenHypercall.h | 28 +++-------------------------
>>>> OvmfPkg/XenBusDxe/XenStore.c | 4 ++--
>>>> 9 files changed, 73 insertions(+), 81 deletions(-)
>>>>
>>>> diff --git a/OvmfPkg/XenBusDxe/EventChannel.c
>>>> b/OvmfPkg/XenBusDxe/EventChannel.c
>>>> index 03efaf9cb904..a86323e6adfd 100644
>>>> --- a/OvmfPkg/XenBusDxe/EventChannel.c
>>>> +++ b/OvmfPkg/XenBusDxe/EventChannel.c
>>>> @@ -28,7 +28,7 @@ XenEventChannelNotify (
>>>> evtchn_send_t Send;
>>>>
>>>> Send.port = Port;
>>>> - ReturnCode = XenHypercallEventChannelOp (Dev, EVTCHNOP_send, &Send);
>>>> + ReturnCode = XenHypercallEventChannelOp (EVTCHNOP_send, &Send);
>>>> return (UINT32)ReturnCode;
>>>> }
>>>>
>>>> @@ -40,15 +40,12 @@ XenBusEventChannelAllocate (
>>>> OUT evtchn_port_t *Port
>>>> )
>>>> {
>>>> - XENBUS_PRIVATE_DATA *Private;
>>>> evtchn_alloc_unbound_t Parameter;
>>>> UINT32 ReturnCode;
>>>>
>>>> - Private = XENBUS_PRIVATE_DATA_FROM_THIS (This);
>>>> -
>>>> Parameter.dom = DOMID_SELF;
>>>> Parameter.remote_dom = DomainId;
>>>> - ReturnCode = (UINT32)XenHypercallEventChannelOp (Private->Dev,
>>>> + ReturnCode = (UINT32)XenHypercallEventChannelOp (
>>>> EVTCHNOP_alloc_unbound,
>>>> &Parameter);
>>>> if (ReturnCode != 0) {
>>>> @@ -79,10 +76,8 @@ XenBusEventChannelClose (
>>>> IN evtchn_port_t Port
>>>> )
>>>> {
>>>> - XENBUS_PRIVATE_DATA *Private;
>>>> evtchn_close_t Close;
>>>>
>>>> - Private = XENBUS_PRIVATE_DATA_FROM_THIS (This);
>>>> Close.port = Port;
>>>> - return (UINT32)XenHypercallEventChannelOp (Private->Dev,
>>>> EVTCHNOP_close, &Close);
>>>> + return (UINT32)XenHypercallEventChannelOp (EVTCHNOP_close, &Close);
>>>> }
>>>> diff --git a/OvmfPkg/XenBusDxe/GrantTable.c
>>>> b/OvmfPkg/XenBusDxe/GrantTable.c
>>>> index 8405edc51bc4..53cb99f0e004 100644
>>>> --- a/OvmfPkg/XenBusDxe/GrantTable.c
>>>> +++ b/OvmfPkg/XenBusDxe/GrantTable.c
>>>> @@ -161,7 +161,7 @@ XenGrantTableInit (
>>>> Parameters.idx = Index;
>>>> Parameters.space = XENMAPSPACE_grant_table;
>>>> Parameters.gpfn = (xen_pfn_t) ((UINTN) GrantTable >> EFI_PAGE_SHIFT)
>>>> + Index;
>>>> - ReturnCode = XenHypercallMemoryOp (Dev, XENMEM_add_to_physmap,
>>>> &Parameters);
>>>> + ReturnCode = XenHypercallMemoryOp (XENMEM_add_to_physmap,
>>>> &Parameters);
>>>> if (ReturnCode != 0) {
>>>> DEBUG ((EFI_D_ERROR, "Xen GrantTable, add_to_physmap hypercall
>>>> error: %d\n", ReturnCode));
>>>> }
>>>> @@ -184,7 +184,7 @@ XenGrantTableDeinit (
>>>> Parameters.domid = DOMID_SELF;
>>>> Parameters.gpfn = (xen_pfn_t) ((UINTN) GrantTable >> EFI_PAGE_SHIFT)
>>>> + Index;
>>>> DEBUG ((EFI_D_INFO, "Xen GrantTable, removing %X\n",
>>>> Parameters.gpfn));
>>>> - ReturnCode = XenHypercallMemoryOp (Dev, XENMEM_remove_from_physmap,
>>>> &Parameters);
>>>> + ReturnCode = XenHypercallMemoryOp (XENMEM_remove_from_physmap,
>>>> &Parameters);
>>>> if (ReturnCode != 0) {
>>>> DEBUG ((EFI_D_ERROR, "Xen GrantTable, remove_from_physmap hypercall
>>>> error: %d\n", ReturnCode));
>>>> }
>>>> diff --git a/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm
>>>> b/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm
>>>> index 8547c30b81ee..e0fa71bb5ba8 100644
>>>> --- a/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm
>>>> +++ b/OvmfPkg/XenBusDxe/Ia32/hypercall.nasm
>>>> @@ -2,13 +2,13 @@ SECTION .text
>>>>
>>>> ; INTN
>>>> ; EFIAPI
>>>> -; XenHypercall2 (
>>>> +; __XenHypercall2 (
>>>> ; IN VOID *HypercallAddr,
>>>> ; IN OUT INTN Arg1,
>>>> ; IN OUT INTN Arg2
>>>> ; );
>>>> -global ASM_PFX(XenHypercall2)
>>>> -ASM_PFX(XenHypercall2):
>>>> +global ASM_PFX(__XenHypercall2)
>>>> +ASM_PFX(__XenHypercall2):
>>>> ; Save only ebx, ecx is supposed to be a scratch register and needs to
>>>> be
>>>> ; saved by the caller
>>>> push ebx
>>>> diff --git a/OvmfPkg/XenBusDxe/X64/hypercall.nasm
>>>> b/OvmfPkg/XenBusDxe/X64/hypercall.nasm
>>>> index 177f271ef094..5e6a0c05c5c4 100644
>>>> --- a/OvmfPkg/XenBusDxe/X64/hypercall.nasm
>>>> +++ b/OvmfPkg/XenBusDxe/X64/hypercall.nasm
>>>> @@ -3,13 +3,13 @@ SECTION .text
>>>>
>>>> ; INTN
>>>> ; EFIAPI
>>>> -; XenHypercall2 (
>>>> +; __XenHypercall2 (
>>>> ; IN VOID *HypercallAddr,
>>>> ; IN OUT INTN Arg1,
>>>> ; IN OUT INTN Arg2
>>>> ; );
>>>> -global ASM_PFX(XenHypercall2)
>>>> -ASM_PFX(XenHypercall2):
>>>> +global ASM_PFX(__XenHypercall2)
>>>> +ASM_PFX(__XenHypercall2):
>>>> push rdi
>>>> push rsi
>>>> ; Copy HypercallAddr to rax
>>>> diff --git a/OvmfPkg/XenBusDxe/XenBusDxe.c b/OvmfPkg/XenBusDxe/XenBusDxe.c
>>>> index 7a7fd82d559d..d333b331b6db 100644
>>>> --- a/OvmfPkg/XenBusDxe/XenBusDxe.c
>>>> +++ b/OvmfPkg/XenBusDxe/XenBusDxe.c
>>>> @@ -34,6 +34,8 @@
>>>> #include "XenStore.h"
>>>> #include "XenBus.h"
>>>>
>>>> +#include <IndustryStandard/Xen/hvm/params.h>
>>>> +#include <IndustryStandard/Xen/memory.h>
>>>>
>>>> ///
>>>> /// Driver Binding Protocol instance
>>>> @@ -52,6 +54,46 @@ STATIC EFI_LOCK mMyDeviceLock =
>>>> EFI_INITIALIZE_LOCK_VARIABLE (TPL_CALLBACK
>>>> STATIC XENBUS_DEVICE *mMyDevice = NULL;
>>>>
>>>> /**
>>>> + Map the shared_info_t page into memory.
>>>> +
>>>> + @param Dev A XENBUS_DEVICE instance.
>>>> +
>>>> + @retval EFI_SUCCESS Dev->SharedInfo whill contain a pointer to
>>>> + the shared info page
>>>> + @retval EFI_LOAD_ERROR The shared info page could not be mapped. The
>>>> + hypercall returned an error.
>>>> +**/
>>>> +STATIC
>>>> +EFI_STATUS
>>>> +XenGetSharedInfoPage (
>>>> + IN OUT XENBUS_DEVICE *Dev
>>>> + )
>>>> +{
>>>> + xen_add_to_physmap_t Parameter;
>>>> +
>>>> + ASSERT (Dev->SharedInfo == NULL);
>>>> +
>>>> + Parameter.domid = DOMID_SELF;
>>>> + Parameter.space = XENMAPSPACE_shared_info;
>>>> + Parameter.idx = 0;
>>>> +
>>>> + //
>>>> + // using reserved page because the page is not released when Linux is
>>>> + // starting because of the add_to_physmap. QEMU might try to access the
>>>> + // page, and fail because it have no right to do so (segv).
>>>> + //
>>>> + Dev->SharedInfo = AllocateReservedPages (1);
>>>> + Parameter.gpfn = (UINTN) Dev->SharedInfo >> EFI_PAGE_SHIFT;
>>>> + if (XenHypercallMemoryOp (XENMEM_add_to_physmap, &Parameter) != 0) {
>>>> + FreePages (Dev->SharedInfo, 1);
>>>> + Dev->SharedInfo = NULL;
>>>> + return EFI_LOAD_ERROR;
>>>> + }
>>>> +
>>>> + return EFI_SUCCESS;
>>>> +}
>>>> +
>>>> +/**
>>>> Unloads an image.
>>>>
>>>> @param ImageHandle Handle that identifies the image to be
>>>> unloaded.
>>>> @@ -348,7 +390,7 @@ XenBusDxeDriverBindingStart (
>>>> MmioAddr = BarDesc->AddrRangeMin;
>>>> FreePool (BarDesc);
>>>>
>>>> - Status = XenHyperpageInit (Dev);
>>>> + Status = XenHyperpageInit ();
>>>> if (EFI_ERROR (Status)) {
>>>> DEBUG ((EFI_D_ERROR, "XenBus: Unable to retrieve the hyperpage.\n"));
>>>> Status = EFI_UNSUPPORTED;
>>>> diff --git a/OvmfPkg/XenBusDxe/XenBusDxe.h b/OvmfPkg/XenBusDxe/XenBusDxe.h
>>>> index 80253b7d1ca9..9b7219906a69 100644
>>>> --- a/OvmfPkg/XenBusDxe/XenBusDxe.h
>>>> +++ b/OvmfPkg/XenBusDxe/XenBusDxe.h
>>>> @@ -91,7 +91,6 @@ struct _XENBUS_DEVICE {
>>>> EFI_DEVICE_PATH_PROTOCOL *DevicePath;
>>>> LIST_ENTRY ChildList;
>>>>
>>>> - VOID *Hyperpage;
>>>> shared_info_t *SharedInfo;
>>>> };
>>>>
>>>> diff --git a/OvmfPkg/XenBusDxe/XenHypercall.c
>>>> b/OvmfPkg/XenBusDxe/XenHypercall.c
>>>> index 34d92e76b7e3..9bcf3197633e 100644
>>>> --- a/OvmfPkg/XenBusDxe/XenHypercall.c
>>>> +++ b/OvmfPkg/XenBusDxe/XenHypercall.c
>>>> @@ -23,9 +23,10 @@
>>>> #include <IndustryStandard/Xen/hvm/params.h>
>>>> #include <IndustryStandard/Xen/memory.h>
>>>>
>>>> +STATIC VOID *Hyperpage;
>>>> +
>>>> EFI_STATUS
>>>> XenHyperpageInit (
>>>> - IN OUT XENBUS_DEVICE *Dev
>>>> )
>>>> {
>>>> EFI_HOB_GUID_TYPE *GuidHob;
>>>> @@ -36,24 +37,21 @@ XenHyperpageInit (
>>>> return EFI_NOT_FOUND;
>>>> }
>>>> XenInfo = (EFI_XEN_INFO *) GET_GUID_HOB_DATA (GuidHob);
>>>> - Dev->Hyperpage = XenInfo->HyperPages;
>>>> + Hyperpage = XenInfo->HyperPages;
>>>> return EFI_SUCCESS;
>>>> }
>>>>
>>>> UINT64
>>>> XenHypercallHvmGetParam (
>>>> - IN XENBUS_DEVICE *Dev,
>>>> IN UINT32 Index
>>>> )
>>>> {
>>>> xen_hvm_param_t Parameter;
>>>> INTN Error;
>>>>
>>>> - ASSERT (Dev->Hyperpage != NULL);
>>>> -
>>>> Parameter.domid = DOMID_SELF;
>>>> Parameter.index = Index;
>>>> - Error = XenHypercall2 ((UINT8*)Dev->Hyperpage + __HYPERVISOR_hvm_op *
>>>> 32,
>>>> + Error = XenHypercall2 (__HYPERVISOR_hvm_op,
>>>> HVMOP_get_param, (INTN) &Parameter);
>>>> if (Error != 0) {
>>>> DEBUG ((EFI_D_ERROR,
>>>> @@ -66,53 +64,33 @@ XenHypercallHvmGetParam (
>>>>
>>>> INTN
>>>> XenHypercallMemoryOp (
>>>> - IN XENBUS_DEVICE *Dev,
>>>> IN UINTN Operation,
>>>> IN OUT VOID *Arguments
>>>> )
>>>> {
>>>> - ASSERT (Dev->Hyperpage != NULL);
>>>> - return XenHypercall2 ((UINT8*)Dev->Hyperpage + __HYPERVISOR_memory_op *
>>>> 32,
>>>> + return XenHypercall2 (__HYPERVISOR_memory_op,
>>>> Operation, (INTN) Arguments);
>>>> }
>>>>
>>>> INTN
>>>> XenHypercallEventChannelOp (
>>>> - IN XENBUS_DEVICE *Dev,
>>>> IN INTN Operation,
>>>> IN OUT VOID *Arguments
>>>> )
>>>> {
>>>> - ASSERT (Dev->Hyperpage != NULL);
>>>> - return XenHypercall2 ((UINT8*)Dev->Hyperpage +
>>>> __HYPERVISOR_event_channel_op * 32,
>>>> + return XenHypercall2 (__HYPERVISOR_event_channel_op,
>>>> Operation, (INTN) Arguments);
>>>> }
>>>>
>>>> -EFI_STATUS
>>>> -XenGetSharedInfoPage (
>>>> - IN OUT XENBUS_DEVICE *Dev
>>>> +INTN
>>>> +EFIAPI
>>>> +XenHypercall2 (
>>>> + IN INTN HypercallID,
>>>> + IN OUT INTN Arg1,
>>>> + IN OUT INTN Arg2
>>>> )
>>>> {
>>>> - xen_add_to_physmap_t Parameter;
>>>> -
>>>> - ASSERT (Dev->SharedInfo == NULL);
>>>> + ASSERT (HyperPage != NULL);
>>>>
>>>> - Parameter.domid = DOMID_SELF;
>>>> - Parameter.space = XENMAPSPACE_shared_info;
>>>> - Parameter.idx = 0;
>>>> -
>>>> - //
>>>> - // using reserved page because the page is not released when Linux is
>>>> - // starting because of the add_to_physmap. QEMU might try to access the
>>>> - // page, and fail because it have no right to do so (segv).
>>>> - //
>>>> - Dev->SharedInfo = AllocateReservedPages (1);
>>>> - Parameter.gpfn = (UINTN) Dev->SharedInfo >> EFI_PAGE_SHIFT;
>>>> - if (XenHypercallMemoryOp (Dev, XENMEM_add_to_physmap, &Parameter) != 0)
>>>> {
>>>> - FreePages (Dev->SharedInfo, 1);
>>>> - Dev->SharedInfo = NULL;
>>>> - return EFI_LOAD_ERROR;
>>>> - }
>>>> -
>>>> - return EFI_SUCCESS;
>>>> + return __XenHypercall2 ((UINT8*)HyperPage + HypercallID * 32, Arg1,
>>>> Arg2);
>>> ^ shouldn't it be Hyperpage?
>>>
>>
>> Yes, you are quite right. My build test on x86 should have spotted
>> this, so apparently I screwed that up in some way as well.
>>
>
> Turns out this was a refactoring error that got cleaned up by the next
> patch, and I did not perform the x86 build test on each patch in
> isolation.
> Will be fixed in v3
>
I skimmed this patch. It makes sense to me as preparation for
librarizing the hypercall machinery (as you say in the commit message),
if the Xen guys don't have any objections.
I peeked forward at patch 18. The librarization is certainly possible
given that the origin of your info is the GUID HOB with gEfiXenInfoGuid.
So, I got curious about the data pointed-to by the gEfiXenInfoGuid
HOB... It's set up in OvmfPkg/PlatformPei/Xen.c. I froze for a second,
but then I noticed it uses BuildGuidDataHob(), *not* BuildGuidHob(); ie.
it *copies* mXenInfo into the HOB. Good.
I think this patch (and the next one) improve OVMF/Xen even in isolation
(== without thinking of ARM at all).
For v3:
Acked-by: Laszlo Ersek <lersek@xxxxxxxxxx>
Thanks
Laszlo
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |