]> git.proxmox.com Git - mirror_edk2.git/blame - OvmfPkg/XenBusDxe/GrantTable.c
OvmfPkg/XenBusDxe: fix VS2010 build failures
[mirror_edk2.git] / OvmfPkg / XenBusDxe / GrantTable.c
CommitLineData
0fd14246
SS
1/** @file\r
2 Grant Table function implementation.\r
3\r
4 Grant Table are used to grant access to certain page of the current\r
5 VM to an other VM.\r
6\r
7 Author: Steven Smith (sos22@cam.ac.uk)\r
8 Changes: Grzegorz Milos (gm281@cam.ac.uk)\r
9 Copyright (C) 2006, Cambridge University\r
10 Copyright (C) 2014, Citrix Ltd.\r
11\r
12 Redistribution and use in source and binary forms, with or without\r
13 modification, are permitted provided that the following conditions\r
14 are met:\r
15 1. Redistributions of source code must retain the above copyright\r
16 notice, this list of conditions and the following disclaimer.\r
17 2. Redistributions in binary form must reproduce the above copyright\r
18 notice, this list of conditions and the following disclaimer in the\r
19 documentation and/or other materials provided with the distribution.\r
20\r
21 THIS SOFTWARE IS PROVIDED BY AUTHOR AND CONTRIBUTORS ``AS IS'' AND\r
22 ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE\r
23 IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE\r
24 ARE DISCLAIMED. IN NO EVENT SHALL AUTHOR OR CONTRIBUTORS BE LIABLE\r
25 FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL\r
26 DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS\r
27 OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)\r
28 HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT\r
29 LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY\r
30 OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF\r
31 SUCH DAMAGE.\r
32**/\r
33#include "XenBusDxe.h"\r
34\r
35#include <IndustryStandard/Xen/memory.h>\r
36\r
37#include "XenHypercall.h"\r
38\r
39#include "GrantTable.h"\r
40#include "InterlockedCompareExchange16.h"\r
41\r
42#define NR_RESERVED_ENTRIES 8\r
43\r
44/* NR_GRANT_FRAMES must be less than or equal to that configured in Xen */\r
45#define NR_GRANT_FRAMES 4\r
46#define NR_GRANT_ENTRIES (NR_GRANT_FRAMES * EFI_PAGE_SIZE / sizeof(grant_entry_v1_t))\r
47\r
48STATIC grant_entry_v1_t *GrantTable = NULL;\r
49STATIC grant_ref_t GrantList[NR_GRANT_ENTRIES];\r
50STATIC EFI_LOCK mGrantListLock;\r
51#ifdef GNT_DEBUG\r
52STATIC BOOLEAN GrantInUseList[NR_GRANT_ENTRIES];\r
53#endif\r
54\r
55STATIC\r
56VOID\r
57XenGrantTablePutFreeEntry (\r
58 grant_ref_t Ref\r
59 )\r
60{\r
61 EfiAcquireLock (&mGrantListLock);\r
62#ifdef GNT_DEBUG\r
63 ASSERT (GrantInUseList[Ref]);\r
64 GrantInUseList[Ref] = FALSE;\r
65#endif\r
66 GrantList[Ref] = GrantList[0];\r
67 GrantList[0] = Ref;\r
68 EfiReleaseLock (&mGrantListLock);\r
69}\r
70\r
71STATIC\r
72grant_ref_t\r
73XenGrantTableGetFreeEntry (\r
74 VOID\r
75 )\r
76{\r
cec6ad0a 77 grant_ref_t Ref;\r
0fd14246
SS
78\r
79 EfiAcquireLock (&mGrantListLock);\r
80 Ref = GrantList[0];\r
81 ASSERT (Ref >= NR_RESERVED_ENTRIES && Ref < NR_GRANT_ENTRIES);\r
82 GrantList[0] = GrantList[Ref];\r
83#ifdef GNT_DEBUG\r
84 ASSERT (!GrantInUseList[Ref]);\r
85 GrantInUseList[Ref] = TRUE;\r
86#endif\r
87 EfiReleaseLock (&mGrantListLock);\r
88 return Ref;\r
89}\r
90\r
91STATIC\r
92grant_ref_t\r
93XenGrantTableGrantAccess (\r
94 IN domid_t DomainId,\r
95 IN UINTN Frame,\r
96 IN BOOLEAN ReadOnly\r
97 )\r
98{\r
99 grant_ref_t Ref;\r
cec6ad0a 100 UINT16 Flags;\r
0fd14246
SS
101\r
102 ASSERT (GrantTable != NULL);\r
103 Ref = XenGrantTableGetFreeEntry ();\r
017a4866 104 GrantTable[Ref].frame = (UINT32)Frame;\r
0fd14246
SS
105 GrantTable[Ref].domid = DomainId;\r
106 MemoryFence ();\r
107 Flags = GTF_permit_access;\r
108 if (ReadOnly) {\r
109 Flags |= GTF_readonly;\r
110 }\r
111 GrantTable[Ref].flags = Flags;\r
112\r
113 return Ref;\r
114}\r
115\r
116STATIC\r
117EFI_STATUS\r
118XenGrantTableEndAccess (\r
119 grant_ref_t Ref\r
120 )\r
121{\r
122 UINT16 Flags, OldFlags;\r
123\r
124 ASSERT (GrantTable != NULL);\r
125 ASSERT (Ref >= NR_RESERVED_ENTRIES && Ref < NR_GRANT_ENTRIES);\r
126\r
127 OldFlags = GrantTable[Ref].flags;\r
128 do {\r
129 if ((Flags = OldFlags) & (GTF_reading | GTF_writing)) {\r
130 DEBUG ((EFI_D_WARN, "WARNING: g.e. still in use! (%x)\n", Flags));\r
131 return EFI_NOT_READY;\r
132 }\r
133 OldFlags = InterlockedCompareExchange16 (&GrantTable[Ref].flags, Flags, 0);\r
134 } while (OldFlags != Flags);\r
135\r
136 XenGrantTablePutFreeEntry (Ref);\r
137 return EFI_SUCCESS;\r
138}\r
139\r
140VOID\r
141XenGrantTableInit (\r
142 IN XENBUS_DEVICE *Dev,\r
143 IN UINT64 MmioAddr\r
144 )\r
145{\r
146 xen_add_to_physmap_t Parameters;\r
147 INTN Index;\r
148 INTN ReturnCode;\r
149\r
150#ifdef GNT_DEBUG\r
151 SetMem(GrantInUseList, sizeof (GrantInUseList), 1);\r
152#endif\r
153 EfiInitializeLock (&mGrantListLock, TPL_NOTIFY);\r
154 for (Index = NR_RESERVED_ENTRIES; Index < NR_GRANT_ENTRIES; Index++) {\r
017a4866 155 XenGrantTablePutFreeEntry ((grant_ref_t)Index);\r
0fd14246
SS
156 }\r
157\r
158 GrantTable = (VOID*)(UINTN) MmioAddr;\r
159 for (Index = 0; Index < NR_GRANT_FRAMES; Index++) {\r
160 Parameters.domid = DOMID_SELF;\r
161 Parameters.idx = Index;\r
162 Parameters.space = XENMAPSPACE_grant_table;\r
163 Parameters.gpfn = (((xen_pfn_t) GrantTable) >> EFI_PAGE_SHIFT) + Index;\r
164 ReturnCode = XenHypercallMemoryOp (Dev, XENMEM_add_to_physmap, &Parameters);\r
165 if (ReturnCode != 0) {\r
166 DEBUG ((EFI_D_ERROR, "Xen GrantTable, add_to_physmap hypercall error: %d\n", ReturnCode));\r
167 }\r
168 }\r
169}\r
170\r
171VOID\r
172XenGrantTableDeinit (\r
173 XENBUS_DEVICE *Dev\r
174 )\r
175{\r
176 INTN ReturnCode, Index;\r
177 xen_remove_from_physmap_t Parameters;\r
178\r
179 if (GrantTable == NULL) {\r
180 return;\r
181 }\r
182\r
183 for (Index = NR_GRANT_FRAMES - 1; Index >= 0; Index--) {\r
184 Parameters.domid = DOMID_SELF;\r
185 Parameters.gpfn = (((xen_pfn_t) GrantTable) >> EFI_PAGE_SHIFT) + Index;\r
186 DEBUG ((EFI_D_INFO, "Xen GrantTable, removing %X\n", Parameters.gpfn));\r
187 ReturnCode = XenHypercallMemoryOp (Dev, XENMEM_remove_from_physmap, &Parameters);\r
188 if (ReturnCode != 0) {\r
189 DEBUG ((EFI_D_ERROR, "Xen GrantTable, remove_from_physmap hypercall error: %d\n", ReturnCode));\r
190 }\r
191 }\r
192 GrantTable = NULL;\r
193}\r
194\r
195EFI_STATUS\r
196EFIAPI\r
197XenBusGrantAccess (\r
198 IN XENBUS_PROTOCOL *This,\r
199 IN domid_t DomainId,\r
200 IN UINTN Frame, // MFN\r
201 IN BOOLEAN ReadOnly,\r
202 OUT grant_ref_t *RefPtr\r
203 )\r
204{\r
205 *RefPtr = XenGrantTableGrantAccess (DomainId, Frame, ReadOnly);\r
206 return EFI_SUCCESS;\r
207}\r
208\r
209EFI_STATUS\r
210EFIAPI\r
211XenBusGrantEndAccess (\r
212 IN XENBUS_PROTOCOL *This,\r
213 IN grant_ref_t Ref\r
214 )\r
215{\r
216 return XenGrantTableEndAccess (Ref);\r
217}\r