Re: [Xen-devel] [PATCH for-next 06/16] xen/arm: Extend copy_to_guest to support copying from/to guest physical address
Hi Stefano, On 07/12/17 23:01, Stefano Stabellini wrote: On Wed, 6 Dec 2017, Julien Grall wrote: Hi Stefano, On 12/06/2017 01:22 AM, Stefano Stabellini wrote: On Thu, 23 Nov 2017, Julien Grall wrote: The only differences between copy_to_guest and access_guest_memory_by_ipa are: - The latter does not support copying data crossing page boundary - The former is copying from/to guest VA whilst the latter from guest PA copy_to_guest can easily be extended to support copying from/to guest physical address. For that a new bit is used to tell whether linear address or ipa is been used. Lastly access_guest_memory_by_ipa is reimplemented using copy_to_guest. This also has the benefits to extend the use of it, it is now possible to copy data crossing page boundary. Signed-off-by: Julien GrallAh! This is the reason why previous patches were not using vaddr_t. It makes sense now. May I suggest we use something different from paddr_t in copy_guest for addr type? I don't think is correct to specify addr as paddr_t when it could be vaddr_t; in the future we could have type checks on them. I suggest we specify it as u64, but if you have a better idea go for it. We should not use more u64 in the code. uint64_t could be a solution but even that, I don't see the reason. How are you sure the physical address will always fit in 64-bit? On the other side, very likely vaddr_t will fit in paddr_t. So paddr_t is the right way to go for me. What about introducing xaddr_t? I would prefer uint64_t in that case. xaddr_t is quite confusing to read and could be misused. Or at least: static struct page_info *translate_get_page(struct vcpu *v, paddr_t /*or vaddr_t */ addr I can do that as well. What's your preference? Cheers, -- Julien Grall ___ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel
Re: [Xen-devel] [PATCH for-next 06/16] xen/arm: Extend copy_to_guest to support copying from/to guest physical address
On Wed, 6 Dec 2017, Julien Grall wrote: > Hi Stefano, > > On 12/06/2017 01:22 AM, Stefano Stabellini wrote: > > On Thu, 23 Nov 2017, Julien Grall wrote: > > > The only differences between copy_to_guest and access_guest_memory_by_ipa > > > are: > > > - The latter does not support copying data crossing page boundary > > > - The former is copying from/to guest VA whilst the latter from > > > guest PA > > > > > > copy_to_guest can easily be extended to support copying from/to guest > > > physical address. For that a new bit is used to tell whether linear > > > address or ipa is been used. > > > > > > Lastly access_guest_memory_by_ipa is reimplemented using copy_to_guest. > > > This also has the benefits to extend the use of it, it is now possible > > > to copy data crossing page boundary. > > > > > > Signed-off-by: Julien Grall> > > > Ah! This is the reason why previous patches were not using vaddr_t. It > > makes sense now. May I suggest we use something different from paddr_t > > in copy_guest for addr type? I don't think is correct to specify addr as > > paddr_t when it could be vaddr_t; in the future we could have type > > checks on them. > > > > I suggest we specify it as u64, but if you have a better idea go for it. > > We should not use more u64 in the code. uint64_t could be a solution but even > that, I don't see the reason. How are you sure the physical address will > always fit in 64-bit? > > On the other side, very likely vaddr_t will fit in paddr_t. So paddr_t is the > right way to go for me. What about introducing xaddr_t? Or at least: static struct page_info *translate_get_page(struct vcpu *v, paddr_t /*or vaddr_t */ addr > > > > > --- > > > xen/arch/arm/guestcopy.c | 86 > > > ++-- > > > 1 file changed, 39 insertions(+), 47 deletions(-) > > > > > > diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c > > > index 487f5ab82d..be53bee559 100644 > > > --- a/xen/arch/arm/guestcopy.c > > > +++ b/xen/arch/arm/guestcopy.c > > > @@ -8,6 +8,31 @@ > > > #define COPY_flush_dcache (1U << 0) > > > #define COPY_from_guest (0U << 1) > > > #define COPY_to_guest (1U << 1) > > > +#define COPY_ipa(0U << 2) > > > +#define COPY_linear (1U << 2) > > > + > > > +static struct page_info *translate_get_page(struct vcpu *v, paddr_t addr, > > > +bool linear, bool write) > > > +{ > > > +p2m_type_t p2mt; > > > +struct page_info *page; > > > + > > > +if ( linear ) > > > +return get_page_from_gva(v, addr, write ? GV2M_WRITE : > > > GV2M_READ); > > > + > > > +page = get_page_from_gfn(v->domain, paddr_to_pfn(addr), , > > > P2M_ALLOC); > > > + > > > +if ( !page ) > > > +return NULL; > > > + > > > +if ( !p2m_is_ram(p2mt) ) > > > +{ > > > +put_page(page); > > > +return NULL; > > > +} > > > + > > > +return page; > > > +} > > > static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int > > > len, > > > struct vcpu *v, unsigned int flags) > > > @@ -21,8 +46,8 @@ static unsigned long copy_guest(void *buf, paddr_t addr, > > > unsigned int len, > > > unsigned size = min(len, (unsigned)PAGE_SIZE - offset); > > > struct page_info *page; > > > -page = get_page_from_gva(v, addr, > > > - (flags & COPY_to_guest) ? GV2M_WRITE : > > > GV2M_READ); > > > +page = translate_get_page(v, addr, flags & COPY_linear, > > > + flags & COPY_to_guest); > > > if ( page == NULL ) > > > return len; > > > @@ -63,73 +88,40 @@ static unsigned long copy_guest(void *buf, paddr_t > > > addr, unsigned int len, > > > unsigned long raw_copy_to_guest(void *to, const void *from, unsigned > > > len) > > > { > > > return copy_guest((void *)from, (unsigned long)to, len, > > > - current, COPY_to_guest); > > > + current, COPY_to_guest | COPY_linear); > > > } > > > unsigned long raw_copy_to_guest_flush_dcache(void *to, const void > > > *from, > > >unsigned len) > > > { > > > return copy_guest((void *)from, (unsigned long)to, len, > > > - current, COPY_to_guest | COPY_flush_dcache); > > > + current, COPY_to_guest | COPY_flush_dcache | > > > COPY_linear); > > > } > > > unsigned long raw_clear_guest(void *to, unsigned len) > > > { > > > -return copy_guest(NULL, (unsigned long)to, len, current, > > > COPY_to_guest); > > > +return copy_guest(NULL, (unsigned long)to, len, current, > > > + COPY_to_guest | COPY_linear); > > > } > > > unsigned long raw_copy_from_guest(void *to, const void __user *from, > > > unsigned len) > > > { > > > -return
Re: [Xen-devel] [PATCH for-next 06/16] xen/arm: Extend copy_to_guest to support copying from/to guest physical address
Hi Stefano, On 12/06/2017 01:22 AM, Stefano Stabellini wrote: On Thu, 23 Nov 2017, Julien Grall wrote: The only differences between copy_to_guest and access_guest_memory_by_ipa are: - The latter does not support copying data crossing page boundary - The former is copying from/to guest VA whilst the latter from guest PA copy_to_guest can easily be extended to support copying from/to guest physical address. For that a new bit is used to tell whether linear address or ipa is been used. Lastly access_guest_memory_by_ipa is reimplemented using copy_to_guest. This also has the benefits to extend the use of it, it is now possible to copy data crossing page boundary. Signed-off-by: Julien GrallAh! This is the reason why previous patches were not using vaddr_t. It makes sense now. May I suggest we use something different from paddr_t in copy_guest for addr type? I don't think is correct to specify addr as paddr_t when it could be vaddr_t; in the future we could have type checks on them. I suggest we specify it as u64, but if you have a better idea go for it. We should not use more u64 in the code. uint64_t could be a solution but even that, I don't see the reason. How are you sure the physical address will always fit in 64-bit? On the other side, very likely vaddr_t will fit in paddr_t. So paddr_t is the right way to go for me. --- xen/arch/arm/guestcopy.c | 86 ++-- 1 file changed, 39 insertions(+), 47 deletions(-) diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c index 487f5ab82d..be53bee559 100644 --- a/xen/arch/arm/guestcopy.c +++ b/xen/arch/arm/guestcopy.c @@ -8,6 +8,31 @@ #define COPY_flush_dcache (1U << 0) #define COPY_from_guest (0U << 1) #define COPY_to_guest (1U << 1) +#define COPY_ipa(0U << 2) +#define COPY_linear (1U << 2) + +static struct page_info *translate_get_page(struct vcpu *v, paddr_t addr, +bool linear, bool write) +{ +p2m_type_t p2mt; +struct page_info *page; + +if ( linear ) +return get_page_from_gva(v, addr, write ? GV2M_WRITE : GV2M_READ); + +page = get_page_from_gfn(v->domain, paddr_to_pfn(addr), , P2M_ALLOC); + +if ( !page ) +return NULL; + +if ( !p2m_is_ram(p2mt) ) +{ +put_page(page); +return NULL; +} + +return page; +} static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, struct vcpu *v, unsigned int flags) @@ -21,8 +46,8 @@ static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, unsigned size = min(len, (unsigned)PAGE_SIZE - offset); struct page_info *page; -page = get_page_from_gva(v, addr, - (flags & COPY_to_guest) ? GV2M_WRITE : GV2M_READ); +page = translate_get_page(v, addr, flags & COPY_linear, + flags & COPY_to_guest); if ( page == NULL ) return len; @@ -63,73 +88,40 @@ static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) { return copy_guest((void *)from, (unsigned long)to, len, - current, COPY_to_guest); + current, COPY_to_guest | COPY_linear); } unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, unsigned len) { return copy_guest((void *)from, (unsigned long)to, len, - current, COPY_to_guest | COPY_flush_dcache); + current, COPY_to_guest | COPY_flush_dcache | COPY_linear); } unsigned long raw_clear_guest(void *to, unsigned len) { -return copy_guest(NULL, (unsigned long)to, len, current, COPY_to_guest); +return copy_guest(NULL, (unsigned long)to, len, current, + COPY_to_guest | COPY_linear); } unsigned long raw_copy_from_guest(void *to, const void __user *from, unsigned len) { -return copy_guest(to, (unsigned long)from, len, current, COPY_from_guest); +return copy_guest(to, (unsigned long)from, len, current, + COPY_from_guest | COPY_linear); } -/* - * Temporarily map one physical guest page and copy data to or from it. - * The data to be copied cannot cross a page boundary. - */ int access_guest_memory_by_ipa(struct domain *d, paddr_t gpa, void *buf, uint32_t size, bool is_write) { -struct page_info *page; -uint64_t offset = gpa & ~PAGE_MASK; /* Offset within the mapped page */ -p2m_type_t p2mt; -void *p; - -/* Do not cross a page boundary. */ -if ( size > (PAGE_SIZE - offset) ) -{ -printk(XENLOG_G_ERR "d%d: guestcopy: memory access crosses page boundary.\n", -
Re: [Xen-devel] [PATCH for-next 06/16] xen/arm: Extend copy_to_guest to support copying from/to guest physical address
On Tue, 5 Dec 2017, Stefano Stabellini wrote: > On Thu, 23 Nov 2017, Julien Grall wrote: > > The only differences between copy_to_guest and access_guest_memory_by_ipa > > are: > > - The latter does not support copying data crossing page boundary > > - The former is copying from/to guest VA whilst the latter from > > guest PA > > > > copy_to_guest can easily be extended to support copying from/to guest > > physical address. For that a new bit is used to tell whether linear > > address or ipa is been used. > > > > Lastly access_guest_memory_by_ipa is reimplemented using copy_to_guest. > > This also has the benefits to extend the use of it, it is now possible > > to copy data crossing page boundary. > > > > Signed-off-by: Julien Grall> > Ah! This is the reason why previous patches were not using vaddr_t. It > makes sense now. May I suggest we use something different from paddr_t > in copy_guest for addr type? I don't think is correct to specify addr as > paddr_t when it could be vaddr_t; in the future we could have type > checks on them. > > I suggest we specify it as u64, but if you have a better idea go for it. > > > > --- > > xen/arch/arm/guestcopy.c | 86 > > ++-- > > 1 file changed, 39 insertions(+), 47 deletions(-) > > > > diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c > > index 487f5ab82d..be53bee559 100644 > > --- a/xen/arch/arm/guestcopy.c > > +++ b/xen/arch/arm/guestcopy.c > > @@ -8,6 +8,31 @@ > > #define COPY_flush_dcache (1U << 0) > > #define COPY_from_guest (0U << 1) > > #define COPY_to_guest (1U << 1) > > +#define COPY_ipa(0U << 2) > > +#define COPY_linear (1U << 2) > > + > > +static struct page_info *translate_get_page(struct vcpu *v, paddr_t addr, > > +bool linear, bool write) > > +{ > > +p2m_type_t p2mt; > > +struct page_info *page; > > + > > +if ( linear ) > > +return get_page_from_gva(v, addr, write ? GV2M_WRITE : GV2M_READ); > > + > > +page = get_page_from_gfn(v->domain, paddr_to_pfn(addr), , > > P2M_ALLOC); > > + > > +if ( !page ) > > +return NULL; > > + > > +if ( !p2m_is_ram(p2mt) ) > > +{ > > +put_page(page); > > +return NULL; > > +} > > + > > +return page; > > +} > > > > static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, > > struct vcpu *v, unsigned int flags) > > @@ -21,8 +46,8 @@ static unsigned long copy_guest(void *buf, paddr_t addr, > > unsigned int len, > > unsigned size = min(len, (unsigned)PAGE_SIZE - offset); > > struct page_info *page; > > > > -page = get_page_from_gva(v, addr, > > - (flags & COPY_to_guest) ? GV2M_WRITE : > > GV2M_READ); > > +page = translate_get_page(v, addr, flags & COPY_linear, > > + flags & COPY_to_guest); > > if ( page == NULL ) > > return len; > > > > @@ -63,73 +88,40 @@ static unsigned long copy_guest(void *buf, paddr_t > > addr, unsigned int len, > > unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) > > { > > return copy_guest((void *)from, (unsigned long)to, len, > > - current, COPY_to_guest); > > + current, COPY_to_guest | COPY_linear); > > } > > > > unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, > > unsigned len) > > { > > return copy_guest((void *)from, (unsigned long)to, len, > > - current, COPY_to_guest | COPY_flush_dcache); > > + current, COPY_to_guest | COPY_flush_dcache | > > COPY_linear); > > } > > > > unsigned long raw_clear_guest(void *to, unsigned len) > > { > > -return copy_guest(NULL, (unsigned long)to, len, current, > > COPY_to_guest); > > +return copy_guest(NULL, (unsigned long)to, len, current, > > + COPY_to_guest | COPY_linear); > > } > > > > unsigned long raw_copy_from_guest(void *to, const void __user *from, > > unsigned len) > > { > > -return copy_guest(to, (unsigned long)from, len, current, > > COPY_from_guest); > > +return copy_guest(to, (unsigned long)from, len, current, > > + COPY_from_guest | COPY_linear); > > } > > > > -/* > > - * Temporarily map one physical guest page and copy data to or from it. > > - * The data to be copied cannot cross a page boundary. > > - */ > > int access_guest_memory_by_ipa(struct domain *d, paddr_t gpa, void *buf, > > uint32_t size, bool is_write) > > { > > -struct page_info *page; > > -uint64_t offset = gpa & ~PAGE_MASK; /* Offset within the mapped page > > */ > > -p2m_type_t p2mt; > > -void *p; > > - > > -/* Do not cross a page
Re: [Xen-devel] [PATCH for-next 06/16] xen/arm: Extend copy_to_guest to support copying from/to guest physical address
On Thu, 23 Nov 2017, Julien Grall wrote: > The only differences between copy_to_guest and access_guest_memory_by_ipa are: > - The latter does not support copying data crossing page boundary > - The former is copying from/to guest VA whilst the latter from > guest PA > > copy_to_guest can easily be extended to support copying from/to guest > physical address. For that a new bit is used to tell whether linear > address or ipa is been used. > > Lastly access_guest_memory_by_ipa is reimplemented using copy_to_guest. > This also has the benefits to extend the use of it, it is now possible > to copy data crossing page boundary. > > Signed-off-by: Julien GrallAh! This is the reason why previous patches were not using vaddr_t. It makes sense now. May I suggest we use something different from paddr_t in copy_guest for addr type? I don't think is correct to specify addr as paddr_t when it could be vaddr_t; in the future we could have type checks on them. I suggest we specify it as u64, but if you have a better idea go for it. > --- > xen/arch/arm/guestcopy.c | 86 > ++-- > 1 file changed, 39 insertions(+), 47 deletions(-) > > diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c > index 487f5ab82d..be53bee559 100644 > --- a/xen/arch/arm/guestcopy.c > +++ b/xen/arch/arm/guestcopy.c > @@ -8,6 +8,31 @@ > #define COPY_flush_dcache (1U << 0) > #define COPY_from_guest (0U << 1) > #define COPY_to_guest (1U << 1) > +#define COPY_ipa(0U << 2) > +#define COPY_linear (1U << 2) > + > +static struct page_info *translate_get_page(struct vcpu *v, paddr_t addr, > +bool linear, bool write) > +{ > +p2m_type_t p2mt; > +struct page_info *page; > + > +if ( linear ) > +return get_page_from_gva(v, addr, write ? GV2M_WRITE : GV2M_READ); > + > +page = get_page_from_gfn(v->domain, paddr_to_pfn(addr), , > P2M_ALLOC); > + > +if ( !page ) > +return NULL; > + > +if ( !p2m_is_ram(p2mt) ) > +{ > +put_page(page); > +return NULL; > +} > + > +return page; > +} > > static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, > struct vcpu *v, unsigned int flags) > @@ -21,8 +46,8 @@ static unsigned long copy_guest(void *buf, paddr_t addr, > unsigned int len, > unsigned size = min(len, (unsigned)PAGE_SIZE - offset); > struct page_info *page; > > -page = get_page_from_gva(v, addr, > - (flags & COPY_to_guest) ? GV2M_WRITE : > GV2M_READ); > +page = translate_get_page(v, addr, flags & COPY_linear, > + flags & COPY_to_guest); > if ( page == NULL ) > return len; > > @@ -63,73 +88,40 @@ static unsigned long copy_guest(void *buf, paddr_t addr, > unsigned int len, > unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) > { > return copy_guest((void *)from, (unsigned long)to, len, > - current, COPY_to_guest); > + current, COPY_to_guest | COPY_linear); > } > > unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, > unsigned len) > { > return copy_guest((void *)from, (unsigned long)to, len, > - current, COPY_to_guest | COPY_flush_dcache); > + current, COPY_to_guest | COPY_flush_dcache | > COPY_linear); > } > > unsigned long raw_clear_guest(void *to, unsigned len) > { > -return copy_guest(NULL, (unsigned long)to, len, current, COPY_to_guest); > +return copy_guest(NULL, (unsigned long)to, len, current, > + COPY_to_guest | COPY_linear); > } > > unsigned long raw_copy_from_guest(void *to, const void __user *from, > unsigned len) > { > -return copy_guest(to, (unsigned long)from, len, current, > COPY_from_guest); > +return copy_guest(to, (unsigned long)from, len, current, > + COPY_from_guest | COPY_linear); > } > > -/* > - * Temporarily map one physical guest page and copy data to or from it. > - * The data to be copied cannot cross a page boundary. > - */ > int access_guest_memory_by_ipa(struct domain *d, paddr_t gpa, void *buf, > uint32_t size, bool is_write) > { > -struct page_info *page; > -uint64_t offset = gpa & ~PAGE_MASK; /* Offset within the mapped page */ > -p2m_type_t p2mt; > -void *p; > - > -/* Do not cross a page boundary. */ > -if ( size > (PAGE_SIZE - offset) ) > -{ > -printk(XENLOG_G_ERR "d%d: guestcopy: memory access crosses page > boundary.\n", > - d->domain_id); > -return -EINVAL; > -} I don't know if we necessarely care about this, but with this change this error path goes
[Xen-devel] [PATCH for-next 06/16] xen/arm: Extend copy_to_guest to support copying from/to guest physical address
The only differences between copy_to_guest and access_guest_memory_by_ipa are: - The latter does not support copying data crossing page boundary - The former is copying from/to guest VA whilst the latter from guest PA copy_to_guest can easily be extended to support copying from/to guest physical address. For that a new bit is used to tell whether linear address or ipa is been used. Lastly access_guest_memory_by_ipa is reimplemented using copy_to_guest. This also has the benefits to extend the use of it, it is now possible to copy data crossing page boundary. Signed-off-by: Julien Grall--- xen/arch/arm/guestcopy.c | 86 ++-- 1 file changed, 39 insertions(+), 47 deletions(-) diff --git a/xen/arch/arm/guestcopy.c b/xen/arch/arm/guestcopy.c index 487f5ab82d..be53bee559 100644 --- a/xen/arch/arm/guestcopy.c +++ b/xen/arch/arm/guestcopy.c @@ -8,6 +8,31 @@ #define COPY_flush_dcache (1U << 0) #define COPY_from_guest (0U << 1) #define COPY_to_guest (1U << 1) +#define COPY_ipa(0U << 2) +#define COPY_linear (1U << 2) + +static struct page_info *translate_get_page(struct vcpu *v, paddr_t addr, +bool linear, bool write) +{ +p2m_type_t p2mt; +struct page_info *page; + +if ( linear ) +return get_page_from_gva(v, addr, write ? GV2M_WRITE : GV2M_READ); + +page = get_page_from_gfn(v->domain, paddr_to_pfn(addr), , P2M_ALLOC); + +if ( !page ) +return NULL; + +if ( !p2m_is_ram(p2mt) ) +{ +put_page(page); +return NULL; +} + +return page; +} static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, struct vcpu *v, unsigned int flags) @@ -21,8 +46,8 @@ static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, unsigned size = min(len, (unsigned)PAGE_SIZE - offset); struct page_info *page; -page = get_page_from_gva(v, addr, - (flags & COPY_to_guest) ? GV2M_WRITE : GV2M_READ); +page = translate_get_page(v, addr, flags & COPY_linear, + flags & COPY_to_guest); if ( page == NULL ) return len; @@ -63,73 +88,40 @@ static unsigned long copy_guest(void *buf, paddr_t addr, unsigned int len, unsigned long raw_copy_to_guest(void *to, const void *from, unsigned len) { return copy_guest((void *)from, (unsigned long)to, len, - current, COPY_to_guest); + current, COPY_to_guest | COPY_linear); } unsigned long raw_copy_to_guest_flush_dcache(void *to, const void *from, unsigned len) { return copy_guest((void *)from, (unsigned long)to, len, - current, COPY_to_guest | COPY_flush_dcache); + current, COPY_to_guest | COPY_flush_dcache | COPY_linear); } unsigned long raw_clear_guest(void *to, unsigned len) { -return copy_guest(NULL, (unsigned long)to, len, current, COPY_to_guest); +return copy_guest(NULL, (unsigned long)to, len, current, + COPY_to_guest | COPY_linear); } unsigned long raw_copy_from_guest(void *to, const void __user *from, unsigned len) { -return copy_guest(to, (unsigned long)from, len, current, COPY_from_guest); +return copy_guest(to, (unsigned long)from, len, current, + COPY_from_guest | COPY_linear); } -/* - * Temporarily map one physical guest page and copy data to or from it. - * The data to be copied cannot cross a page boundary. - */ int access_guest_memory_by_ipa(struct domain *d, paddr_t gpa, void *buf, uint32_t size, bool is_write) { -struct page_info *page; -uint64_t offset = gpa & ~PAGE_MASK; /* Offset within the mapped page */ -p2m_type_t p2mt; -void *p; - -/* Do not cross a page boundary. */ -if ( size > (PAGE_SIZE - offset) ) -{ -printk(XENLOG_G_ERR "d%d: guestcopy: memory access crosses page boundary.\n", - d->domain_id); -return -EINVAL; -} - -page = get_page_from_gfn(d, paddr_to_pfn(gpa), , P2M_ALLOC); -if ( !page ) -{ -printk(XENLOG_G_ERR "d%d: guestcopy: failed to get table entry.\n", - d->domain_id); -return -EINVAL; -} - -if ( !p2m_is_ram(p2mt) ) -{ -put_page(page); -printk(XENLOG_G_ERR "d%d: guestcopy: guest memory should be RAM.\n", - d->domain_id); -return -EINVAL; -} +unsigned long left; +int flags = COPY_ipa; -p = __map_domain_page(page); +flags |= is_write ? COPY_to_guest : COPY_from_guest; -if ( is_write ) -memcpy(p + offset, buf, size); -else -memcpy(buf, p + offset, size); +/* P2M is shared between all vCPUs, so the vcpu used does