|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v7 17/22] arm/gic: Add a new callback to deny Dom0 access to GIC regions
On Fri, 25 Mar 2016, Shannon Zhao wrote:
> Add a new member in gic_hw_operations which is used to deny Dom0 access
> to GIC regions.
>
> Signed-off-by: Shannon Zhao <shannon.zhao@xxxxxxxxxx>
Reviewed-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
> v7: move them out of CONFIG_ACPI
> ---
> xen/arch/arm/gic-v2.c | 27 +++++++++++++++++++++++++++
> xen/arch/arm/gic-v3.c | 41 +++++++++++++++++++++++++++++++++++++++++
> xen/arch/arm/gic.c | 5 +++++
> xen/include/asm-arm/gic.h | 3 +++
> 4 files changed, 76 insertions(+)
>
> diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c
> index 38e3216..450755f 100644
> --- a/xen/arch/arm/gic-v2.c
> +++ b/xen/arch/arm/gic-v2.c
> @@ -22,6 +22,7 @@
> #include <xen/init.h>
> #include <xen/mm.h>
> #include <xen/irq.h>
> +#include <xen/iocap.h>
> #include <xen/sched.h>
> #include <xen/errno.h>
> #include <xen/softirq.h>
> @@ -684,6 +685,31 @@ static void __init gicv2_dt_init(void)
> csize, vsize);
> }
>
> +static int gicv2_iomem_deny_access(const struct domain *d)
> +{
> + int rc;
> + unsigned long gfn, nr;
> +
> + gfn = dbase >> PAGE_SHIFT;
> + rc = iomem_deny_access(d, gfn, gfn + 1);
> + if ( rc )
> + return rc;
> +
> + gfn = hbase >> PAGE_SHIFT;
> + rc = iomem_deny_access(d, gfn, gfn + 1);
> + if ( rc )
> + return rc;
> +
> + gfn = cbase >> PAGE_SHIFT;
> + nr = DIV_ROUND_UP(csize, PAGE_SIZE);
> + rc = iomem_deny_access(d, gfn, gfn + nr);
> + if ( rc )
> + return rc;
> +
> + gfn = vbase >> PAGE_SHIFT;
> + return iomem_deny_access(d, gfn, gfn + nr);
> +}
> +
> #ifdef CONFIG_ACPI
> static int gicv2_make_hwdom_madt(const struct domain *d, u32 offset)
> {
> @@ -910,6 +936,7 @@ const static struct gic_hw_operations gicv2_ops = {
> .read_apr = gicv2_read_apr,
> .make_hwdom_dt_node = gicv2_make_hwdom_dt_node,
> .make_hwdom_madt = gicv2_make_hwdom_madt,
> + .iomem_deny_access = gicv2_iomem_deny_access,
> };
>
> /* Set up the GIC */
> diff --git a/xen/arch/arm/gic-v3.c b/xen/arch/arm/gic-v3.c
> index 52ee23c..a095064 100644
> --- a/xen/arch/arm/gic-v3.c
> +++ b/xen/arch/arm/gic-v3.c
> @@ -27,6 +27,7 @@
> #include <xen/cpu.h>
> #include <xen/mm.h>
> #include <xen/irq.h>
> +#include <xen/iocap.h>
> #include <xen/sched.h>
> #include <xen/errno.h>
> #include <xen/delay.h>
> @@ -1235,6 +1236,45 @@ static void __init gicv3_dt_init(void)
> &vbase, &vsize);
> }
>
> +static int gicv3_iomem_deny_access(const struct domain *d)
> +{
> + int rc, i;
> + unsigned long gfn, nr;
> +
> + gfn = dbase >> PAGE_SHIFT;
> + nr = DIV_ROUND_UP(SZ_64K, PAGE_SIZE);
> + rc = iomem_deny_access(d, gfn, gfn + nr);
> + if ( rc )
> + return rc;
> +
> + for ( i = 0; i < gicv3.rdist_count; i++ )
> + {
> + gfn = gicv3.rdist_regions[i].base >> PAGE_SHIFT;
> + nr = DIV_ROUND_UP(gicv3.rdist_regions[i].size, PAGE_SIZE);
> + rc = iomem_deny_access(d, gfn, gfn + nr);
> + if ( rc )
> + return rc;
> + }
> +
> + if ( cbase != INVALID_PADDR )
> + {
> + gfn = cbase >> PAGE_SHIFT;
> + nr = DIV_ROUND_UP(csize, PAGE_SIZE);
> + rc = iomem_deny_access(d, gfn, gfn + nr);
> + if ( rc )
> + return rc;
> + }
> +
> + if ( vbase != INVALID_PADDR )
> + {
> + gfn = vbase >> PAGE_SHIFT;
> + nr = DIV_ROUND_UP(csize, PAGE_SIZE);
> + return iomem_deny_access(d, gfn, gfn + nr);
> + }
> +
> + return 0;
> +}
> +
> #ifdef CONFIG_ACPI
> static int gicv3_make_hwdom_madt(const struct domain *d, u32 offset)
> {
> @@ -1530,6 +1570,7 @@ static const struct gic_hw_operations gicv3_ops = {
> .secondary_init = gicv3_secondary_cpu_init,
> .make_hwdom_dt_node = gicv3_make_hwdom_dt_node,
> .make_hwdom_madt = gicv3_make_hwdom_madt,
> + .iomem_deny_access = gicv3_iomem_deny_access,
> };
>
> static int __init gicv3_dt_preinit(struct dt_device_node *node, const void
> *data)
> diff --git a/xen/arch/arm/gic.c b/xen/arch/arm/gic.c
> index b3c1eb3..2bfe4de 100644
> --- a/xen/arch/arm/gic.c
> +++ b/xen/arch/arm/gic.c
> @@ -744,6 +744,11 @@ int gic_make_hwdom_madt(const struct domain *d, u32
> offset)
> return gic_hw_ops->make_hwdom_madt(d, offset);
> }
>
> +int gic_iomem_deny_access(const struct domain *d)
> +{
> + return gic_hw_ops->iomem_deny_access(d);
> +}
> +
> /*
> * Local variables:
> * mode: C
> diff --git a/xen/include/asm-arm/gic.h b/xen/include/asm-arm/gic.h
> index 8130136..cd97bb2 100644
> --- a/xen/include/asm-arm/gic.h
> +++ b/xen/include/asm-arm/gic.h
> @@ -360,6 +360,8 @@ struct gic_hw_operations {
> const struct dt_device_node *gic, void *fdt);
> /* Create MADT table for the hardware domain */
> int (*make_hwdom_madt)(const struct domain *d, u32 offset);
> + /* Deny access to GIC regions */
> + int (*iomem_deny_access)(const struct domain *d);
> };
>
> void register_gic_ops(const struct gic_hw_operations *ops);
> @@ -367,6 +369,7 @@ int gic_make_hwdom_dt_node(const struct domain *d,
> const struct dt_device_node *gic,
> void *fdt);
> int gic_make_hwdom_madt(const struct domain *d, u32 offset);
> +int gic_iomem_deny_access(const struct domain *d);
>
> #endif /* __ASSEMBLY__ */
> #endif
> --
> 2.1.4
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |