1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
|
/******************************************************************************
* mem_access.c
*
* Memory access support.
*
* Copyright (c) 2011 Virtuata, Inc.
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation; either version 2 of the License, or
* (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; If not, see <http://www.gnu.org/licenses/>.
*/
#include <xen/sched.h>
#include <xen/guest_access.h>
#include <xen/hypercall.h>
#include <xen/vm_event.h>
#include <xen/mem_access.h>
#include <public/memory.h>
#include <xsm/xsm.h>
int mem_access_memop(unsigned long cmd,
XEN_GUEST_HANDLE_PARAM(xen_mem_access_op_t) arg)
{
unsigned long start_iter = cmd & ~MEMOP_CMD_MASK;
long rc;
xen_mem_access_op_t mao;
struct domain *d;
if ( copy_from_guest(&mao, arg, 1) )
return -EFAULT;
rc = rcu_lock_live_remote_domain_by_id(mao.domid, &d);
if ( rc )
return rc;
rc = -EINVAL;
if ( !p2m_mem_access_sanity_check(d) )
goto out;
rc = xsm_mem_access(XSM_DM_PRIV, d);
if ( rc )
goto out;
rc = -ENODEV;
if ( unlikely(!vm_event_check_ring(d->vm_event_monitor)) )
goto out;
switch ( mao.op )
{
case XENMEM_access_op_set_access:
rc = -EINVAL;
if ( (mao.pfn != ~0ull) &&
(mao.nr < start_iter ||
((mao.pfn + mao.nr - 1) < mao.pfn) ||
((mao.pfn + mao.nr - 1) > domain_get_maximum_gpfn(d))) )
break;
rc = p2m_set_mem_access(d, _gfn(mao.pfn), mao.nr, start_iter,
MEMOP_CMD_MASK, mao.access, 0);
if ( rc > 0 )
{
ASSERT(!(rc & MEMOP_CMD_MASK));
rc = hypercall_create_continuation(__HYPERVISOR_memory_op, "lh",
XENMEM_access_op | rc, arg);
}
break;
case XENMEM_access_op_set_access_multi:
rc = p2m_set_mem_access_multi(d, mao.pfn_list, mao.access_list, mao.nr,
start_iter, MEMOP_CMD_MASK, 0);
if ( rc > 0 )
{
ASSERT(!(rc & MEMOP_CMD_MASK));
rc = hypercall_create_continuation(__HYPERVISOR_memory_op, "lh",
XENMEM_access_op | rc, arg);
}
break;
case XENMEM_access_op_get_access:
{
xenmem_access_t access;
rc = -ENOSYS;
if ( unlikely(start_iter) )
break;
rc = -EINVAL;
if ( (mao.pfn > domain_get_maximum_gpfn(d)) && mao.pfn != ~0ull )
break;
rc = p2m_get_mem_access(d, _gfn(mao.pfn), &access, 0);
if ( rc != 0 )
break;
mao.access = access;
rc = __copy_field_to_guest(arg, &mao, access) ? -EFAULT : 0;
break;
}
default:
rc = -ENOSYS;
break;
}
out:
rcu_unlock_domain(d);
return rc;
}
/*
* Local variables:
* mode: C
* c-file-style: "BSD"
* c-basic-offset: 4
* indent-tabs-mode: nil
* End:
*/
|