[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 3/4] xen/arm: introduce XENMEM_cache_flush
Introduce a new hypercall to perform cache maintenance operation on behalf of the guest. The argument is a machine address and a size. The implementation checks that the memory range is owned by the guest or the guest has been granted access to it by another domain. Signed-off-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> --- xen/arch/arm/mm.c | 92 +++++++++++++++++++++++++++++++++++++++++++ xen/include/public/memory.h | 17 ++++++++ 2 files changed, 109 insertions(+) diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c index c5b48ef..f6139bd 100644 --- a/xen/arch/arm/mm.c +++ b/xen/arch/arm/mm.c @@ -1134,6 +1134,98 @@ long arch_memory_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg) case XENMEM_get_sharing_shared_pages: case XENMEM_get_sharing_freed_pages: return 0; + case XENMEM_cache_flush: + { + struct xen_cache_flush cflush; + struct domain *d, *owner; + struct page_info *page; + uint64_t mfn, end; + uint64_t offset, size; + void *v; + int ret = 0; + + if ( copy_from_guest(&cflush, arg, 1) ) + return -EFAULT; + + d = rcu_lock_current_domain(); + if ( d == NULL ) + return -ESRCH; + + if ( (cflush.size >> PAGE_SHIFT) > (1U<<MAX_ORDER) ) + { + printk(XENLOG_G_ERR "invalid size %llx\n", cflush.size); + ret = -EINVAL; + goto out; + } + + if ( cflush.size == 0 || cflush.op == 0 ) + { + ret = 0; + goto out; + } + + if ( cflush.op & ~(XENMEM_CACHE_INVAL|XENMEM_CACHE_CLEAN) ) + { + printk(XENLOG_G_ERR "invalid op %x\n", cflush.op); + ret = -EINVAL; + goto out; + } + + end = cflush.addr + cflush.size; + while ( cflush.addr < end ) + { + mfn = cflush.addr >> PAGE_SHIFT; + offset = cflush.addr & ~PAGE_MASK; + + if ( !mfn_valid(mfn) ) + { + printk(XENLOG_G_ERR "mfn=%llx is not valid\n", mfn); + ret = -EINVAL; + goto out; + } + + page = mfn_to_page(mfn); + if ( !page ) + { + printk(XENLOG_G_ERR "couldn't get page for mfn %llx\n", mfn); + ret = -EFAULT; + goto out; + } + + owner = page_get_owner(page); + if ( !owner ) + { + printk(XENLOG_G_ERR "couldn't get owner for mfn %llx\n", mfn); + ret = -EFAULT; + goto out; + } + + if ( owner != d && !grant_map_exists(d, owner->grant_table, mfn) ) + { + printk(XENLOG_G_ERR "mfn %llx hasn't been granted by %d to %d\n", mfn, owner->domain_id, d->domain_id); + ret = -EINVAL; + goto out; + } + + v = map_domain_page(mfn); + v += offset; + size = cflush.size - cflush.addr; + if ( size > PAGE_SIZE - offset ) + size = PAGE_SIZE - offset; + + if ( cflush.op & XENMEM_CACHE_INVAL ) + invalidate_xen_dcache_va_range(v, size); + if ( cflush.op & XENMEM_CACHE_CLEAN ) + clean_xen_dcache_va_range(v, size); + unmap_domain_page(v); + + cflush.addr += PAGE_SIZE - offset; + } + +out: + rcu_unlock_domain(d); + return ret; + } default: return -ENOSYS; diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h index db961ec..4a6641d 100644 --- a/xen/include/public/memory.h +++ b/xen/include/public/memory.h @@ -571,6 +571,23 @@ DEFINE_XEN_GUEST_HANDLE(vnuma_topology_info_t); */ #define XENMEM_get_vnumainfo 26 +/* + * Issue one or more cache maintenance operations on a memory range + * owned by the calling domain or granted to the calling domain by a + * foreign domain. + */ +#define XENMEM_cache_flush 27 +struct xen_cache_flush { + /* addr is the machine address at the start of the memory range */ + uint64_t addr; + uint64_t size; +#define XENMEM_CACHE_CLEAN (1<<0) +#define XENMEM_CACHE_INVAL (1<<1) + uint32_t op; +}; +typedef struct xen_cache_flush xen_cache_flush_t; +DEFINE_XEN_GUEST_HANDLE(xen_cache_flush_t); + #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */ /* Next available subop number is 27 */ -- 1.7.10.4 _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |