From patchwork Tue Jul 12 13:59:26 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Julien Grall X-Patchwork-Id: 9225365 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 64DD560871 for ; Tue, 12 Jul 2016 14:03:35 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 52BC51FF29 for ; Tue, 12 Jul 2016 14:03:35 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id 4752C27C39; Tue, 12 Jul 2016 14:03:35 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-4.2 required=2.0 tests=BAYES_00, RCVD_IN_DNSWL_MED autolearn=ham version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 8AE1827D85 for ; Tue, 12 Jul 2016 14:03:34 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1bMyEB-00078m-7C; Tue, 12 Jul 2016 13:59:59 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1bMyEA-00077j-Cs for xen-devel@lists.xen.org; Tue, 12 Jul 2016 13:59:58 +0000 Received: from [85.158.139.211] by server-3.bemta-5.messagelabs.com id 7D/0C-12946-DD7F4875; Tue, 12 Jul 2016 13:59:57 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrKLMWRWlGSWpSXmKPExsVysyfVTffu95Z wgzfTmC2WfFzM4sDocXT3b6YAxijWzLyk/IoE1ox/U9UKep0q1rx+xNLA+NKoi5GLQ0hgE6PE 5wX/2bsYOYGc04wSj28Eg9hsApoSdz5/YgKxRQSkJa59vswIYjMLOEi8+XiPBcQWFkiSeNDbx gZiswioSvT8fAdWwyvgIrGg4QlYr4SAnMTJY5NZQWxOAVeJr9NPMkLscpG4sOwr6wRG7gWMDK sYNYpTi8pSi3SNjPWSijLTM0pyEzNzdA0NTPVyU4uLE9NTcxKTivWS83M3MQK9W8/AwLiDcUe 73yFGSQ4mJVHeZuaWcCG+pPyUyozE4oz4otKc1OJDjDIcHEoSvOe+AeUEi1LTUyvSMnOAYQaT luDgURLhfQ2S5i0uSMwtzkyHSJ1iVJQS550AkhAASWSU5sG1wUL7EqOslDAvIwMDgxBPQWpRb mYJqvwrRnEORiVh3maQKTyZeSVw018BLWYCWlzr0AyyuCQRISXVwNgd2zzxZOG8pdEGXv3bdk UFXk0KLz1Un3hcLe+LZdnr3klef1wmh1zPrhSu2/fDZq3jz0Pziz5IsM783copI5D6lFHcJii WuyvxvfYal/+Hsif5O6zNcm9T7ZjK53FVjnfv/MtrNld93e/gHKPJ1/5T7ffSJVKyXGeiY5PS LCQWN33P2vC/TomlOCPRUIu5qDgRAHeDywhoAgAA X-Env-Sender: julien.grall@arm.com X-Msg-Ref: server-12.tower-206.messagelabs.com!1468331996!13328066!1 X-Originating-IP: [217.140.101.70] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 8.77; banners=-,-,- X-VirusChecked: Checked Received: (qmail 21431 invoked from network); 12 Jul 2016 13:59:56 -0000 Received: from foss.arm.com (HELO foss.arm.com) (217.140.101.70) by server-12.tower-206.messagelabs.com with SMTP; 12 Jul 2016 13:59:56 -0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0F049AB4; Tue, 12 Jul 2016 07:01:00 -0700 (PDT) Received: from e108454-lin.cambridge.arm.com (e108454-lin.cambridge.arm.com [10.1.215.28]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id 85B7C3F213; Tue, 12 Jul 2016 06:59:55 -0700 (PDT) From: Julien Grall To: xen-devel@lists.xen.org Date: Tue, 12 Jul 2016 14:59:26 +0100 Message-Id: <1468331975-27331-6-git-send-email-julien.grall@arm.com> X-Mailer: git-send-email 1.9.1 In-Reply-To: <1468331975-27331-1-git-send-email-julien.grall@arm.com> References: <1468331975-27331-1-git-send-email-julien.grall@arm.com> Cc: Julien Grall , sstabellini@kernel.org Subject: [Xen-devel] [PATCH v7 05/14] xen/arm: Rework the interface of p2m_lookup and use typesafe gfn and mfn X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP The prototype and the declaration of p2m_lookup disagree on how the function should be used. One expect a frame number whilst the other an address. Thankfully, everyone is using with an address today. However, most of the callers have to convert a guest frame to an address. Modify the interface to take a guest physical frame in parameter and return a machine frame. Whilst modifying the interface, use typesafe gfn and mfn for clarity and catching possible misusage. Signed-off-by: Julien Grall Acked-by: Stefano Stabellini --- Changes in v6: - Add Stefano's acked-by Changes in v4: - Use INVALID_MFN_T when possible --- xen/arch/arm/p2m.c | 43 +++++++++++++++++++++++-------------------- xen/arch/arm/traps.c | 21 +++++++++++---------- xen/include/asm-arm/p2m.h | 7 +++---- 3 files changed, 37 insertions(+), 34 deletions(-) diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c index c938dde..54a363a 100644 --- a/xen/arch/arm/p2m.c +++ b/xen/arch/arm/p2m.c @@ -140,14 +140,15 @@ void flush_tlb_domain(struct domain *d) } /* - * Lookup the MFN corresponding to a domain's PFN. + * Lookup the MFN corresponding to a domain's GFN. * * There are no processor functions to do a stage 2 only lookup therefore we * do a a software walk. */ -static paddr_t __p2m_lookup(struct domain *d, paddr_t paddr, p2m_type_t *t) +static mfn_t __p2m_lookup(struct domain *d, gfn_t gfn, p2m_type_t *t) { struct p2m_domain *p2m = &d->arch.p2m; + const paddr_t paddr = pfn_to_paddr(gfn_x(gfn)); const unsigned int offsets[4] = { zeroeth_table_offset(paddr), first_table_offset(paddr), @@ -158,7 +159,7 @@ static paddr_t __p2m_lookup(struct domain *d, paddr_t paddr, p2m_type_t *t) ZEROETH_MASK, FIRST_MASK, SECOND_MASK, THIRD_MASK }; lpae_t pte, *map; - paddr_t maddr = INVALID_PADDR; + mfn_t mfn = INVALID_MFN; paddr_t mask = 0; p2m_type_t _t; unsigned int level, root_table; @@ -216,21 +217,22 @@ static paddr_t __p2m_lookup(struct domain *d, paddr_t paddr, p2m_type_t *t) { ASSERT(mask); ASSERT(pte.p2m.type != p2m_invalid); - maddr = (pte.bits & PADDR_MASK & mask) | (paddr & ~mask); + mfn = _mfn(paddr_to_pfn((pte.bits & PADDR_MASK & mask) | + (paddr & ~mask))); *t = pte.p2m.type; } err: - return maddr; + return mfn; } -paddr_t p2m_lookup(struct domain *d, paddr_t paddr, p2m_type_t *t) +mfn_t p2m_lookup(struct domain *d, gfn_t gfn, p2m_type_t *t) { - paddr_t ret; + mfn_t ret; struct p2m_domain *p2m = &d->arch.p2m; spin_lock(&p2m->lock); - ret = __p2m_lookup(d, paddr, t); + ret = __p2m_lookup(d, gfn, t); spin_unlock(&p2m->lock); return ret; @@ -493,8 +495,9 @@ static int __p2m_get_mem_access(struct domain *d, gfn_t gfn, * No setting was found in the Radix tree. Check if the * entry exists in the page-tables. */ - paddr_t maddr = __p2m_lookup(d, gfn_x(gfn) << PAGE_SHIFT, NULL); - if ( INVALID_PADDR == maddr ) + mfn_t mfn = __p2m_lookup(d, gfn, NULL); + + if ( mfn_eq(mfn, INVALID_MFN) ) return -ESRCH; /* If entry exists then its rwx. */ @@ -1483,8 +1486,7 @@ int p2m_cache_flush(struct domain *d, xen_pfn_t start_mfn, xen_pfn_t end_mfn) mfn_t gfn_to_mfn(struct domain *d, gfn_t gfn) { - paddr_t p = p2m_lookup(d, pfn_to_paddr(gfn_x(gfn)), NULL); - return _mfn(p >> PAGE_SHIFT); + return p2m_lookup(d, gfn, NULL); } /* @@ -1498,8 +1500,8 @@ p2m_mem_access_check_and_get_page(vaddr_t gva, unsigned long flag) { long rc; paddr_t ipa; - unsigned long maddr; - unsigned long mfn; + gfn_t gfn; + mfn_t mfn; xenmem_access_t xma; p2m_type_t t; struct page_info *page = NULL; @@ -1508,11 +1510,13 @@ p2m_mem_access_check_and_get_page(vaddr_t gva, unsigned long flag) if ( rc < 0 ) goto err; + gfn = _gfn(paddr_to_pfn(ipa)); + /* * We do this first as this is faster in the default case when no * permission is set on the page. */ - rc = __p2m_get_mem_access(current->domain, _gfn(paddr_to_pfn(ipa)), &xma); + rc = __p2m_get_mem_access(current->domain, gfn, &xma); if ( rc < 0 ) goto err; @@ -1561,12 +1565,11 @@ p2m_mem_access_check_and_get_page(vaddr_t gva, unsigned long flag) * We had a mem_access permission limiting the access, but the page type * could also be limiting, so we need to check that as well. */ - maddr = __p2m_lookup(current->domain, ipa, &t); - if ( maddr == INVALID_PADDR ) + mfn = __p2m_lookup(current->domain, gfn, &t); + if ( mfn_eq(mfn, INVALID_MFN) ) goto err; - mfn = maddr >> PAGE_SHIFT; - if ( !mfn_valid(mfn) ) + if ( !mfn_valid(mfn_x(mfn)) ) goto err; /* @@ -1575,7 +1578,7 @@ p2m_mem_access_check_and_get_page(vaddr_t gva, unsigned long flag) if ( t != p2m_ram_rw ) goto err; - page = mfn_to_page(mfn); + page = mfn_to_page(mfn_x(mfn)); if ( unlikely(!get_page(page, current->domain)) ) page = NULL; diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index fb01703..185f7a5 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -2318,14 +2318,16 @@ void dump_guest_s1_walk(struct domain *d, vaddr_t addr) { register_t ttbcr = READ_SYSREG(TCR_EL1); uint64_t ttbr0 = READ_SYSREG64(TTBR0_EL1); - paddr_t paddr; uint32_t offset; uint32_t *first = NULL, *second = NULL; + mfn_t mfn; + + mfn = p2m_lookup(d, _gfn(paddr_to_pfn(ttbr0)), NULL); printk("dom%d VA 0x%08"PRIvaddr"\n", d->domain_id, addr); printk(" TTBCR: 0x%08"PRIregister"\n", ttbcr); printk(" TTBR0: 0x%016"PRIx64" = 0x%"PRIpaddr"\n", - ttbr0, p2m_lookup(d, ttbr0 & PAGE_MASK, NULL)); + ttbr0, pfn_to_paddr(mfn_x(mfn))); if ( ttbcr & TTBCR_EAE ) { @@ -2338,32 +2340,31 @@ void dump_guest_s1_walk(struct domain *d, vaddr_t addr) return; } - paddr = p2m_lookup(d, ttbr0 & PAGE_MASK, NULL); - if ( paddr == INVALID_PADDR ) + if ( mfn_eq(mfn, INVALID_MFN) ) { printk("Failed TTBR0 maddr lookup\n"); goto done; } - first = map_domain_page(_mfn(paddr_to_pfn(paddr))); + first = map_domain_page(mfn); offset = addr >> (12+10); printk("1ST[0x%"PRIx32"] (0x%"PRIpaddr") = 0x%08"PRIx32"\n", - offset, paddr, first[offset]); + offset, pfn_to_paddr(mfn_x(mfn)), first[offset]); if ( !(first[offset] & 0x1) || !(first[offset] & 0x2) ) goto done; - paddr = p2m_lookup(d, first[offset] & PAGE_MASK, NULL); + mfn = p2m_lookup(d, _gfn(paddr_to_pfn(first[offset])), NULL); - if ( paddr == INVALID_PADDR ) + if ( mfn_eq(mfn, INVALID_MFN) ) { printk("Failed L1 entry maddr lookup\n"); goto done; } - second = map_domain_page(_mfn(paddr_to_pfn(paddr))); + second = map_domain_page(mfn); offset = (addr >> 12) & 0x3FF; printk("2ND[0x%"PRIx32"] (0x%"PRIpaddr") = 0x%08"PRIx32"\n", - offset, paddr, second[offset]); + offset, pfn_to_paddr(mfn_x(mfn)), second[offset]); done: if (second) unmap_domain_page(second); diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h index 0d1e61e..f204482 100644 --- a/xen/include/asm-arm/p2m.h +++ b/xen/include/asm-arm/p2m.h @@ -135,8 +135,8 @@ void p2m_restore_state(struct vcpu *n); /* Print debugging/statistial info about a domain's p2m */ void p2m_dump_info(struct domain *d); -/* Look up the MFN corresponding to a domain's PFN. */ -paddr_t p2m_lookup(struct domain *d, paddr_t gpfn, p2m_type_t *t); +/* Look up the MFN corresponding to a domain's GFN. */ +mfn_t p2m_lookup(struct domain *d, gfn_t gfn, p2m_type_t *t); /* Clean & invalidate caches corresponding to a region of guest address space */ int p2m_cache_flush(struct domain *d, xen_pfn_t start_mfn, xen_pfn_t end_mfn); @@ -201,8 +201,7 @@ static inline struct page_info *get_page_from_gfn( { struct page_info *page; p2m_type_t p2mt; - paddr_t maddr = p2m_lookup(d, pfn_to_paddr(gfn), &p2mt); - unsigned long mfn = maddr >> PAGE_SHIFT; + unsigned long mfn = mfn_x(p2m_lookup(d, _gfn(gfn), &p2mt)); if (t) *t = p2mt;