|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH v3 2/5] xentrace: Memory/Page Mapping support for DOMID_XEN on ARM
Modified ARM arch specific p2m.c and mm.c files to provide support for
xentrace. Case for DOMID_XEN added xenmem_add_to_physmap_one() when
XENMAPSPACE_gmfn_foreign domain requested via get_pg_owner. This
provides correct calls to rcu_lock_domain() when DOMID_XEN is
requested.
Check for DOMID_XEN added to p2m_lookup() which skips PFN to MFN
translation. DOMID_XEN is considered a PV guest on x86 (i.e MFN ==
GFN), but on ARM there is no such concept. Thus requests to DOMID_XEN
on ARM use a MFN address directly and do not need translation from
PFN.
Check added to p2m_lookup() to determine read/write or read-only page
type when requesting DOMID_XEN. This is done by checking the
u.inuse.type_info parameter of the requested page. The page rw/ro
paddr_t type is then set accordingly.
---
Changed since v2:
* Combined v2 patches 2 and 8 into one patch for v3. No code changes.
---
Changed since v1:
* Moved get_pg_owner() from the arch specific mm.c source files into
the common page_alloc.c source. This was done as get_pg_owner() is
now needed by both architectures and is essentially identical in
both.
* Moved put_pg_owner from the arch specific mm.c source files into
the common page_alloc.c source to make available to all platforms.
* Removed DOMID_XEN check from page_to_mfn(page) call in
xenmem_add_to_physmap_one() per review comment (check considered
to be in excess of need).
* Removed forward declare of get_pg_owner from mm.c (arm) as it is
now in the mm.h common header.
* Added check to determine page rw/ro type to correctly set the
paddr_t to p2m_ram_rw or p2m_ram_ro instead of assuming p2m_ram_rw
* Corrected block comment format to conform to Xen coding standard
Signed-off-by: Benjamin Sanda <ben.sanda@xxxxxxxxxxxxxxx>
---
xen/arch/arm/mm.c | 3 ++-
xen/arch/arm/p2m.c | 35 +++++++++++++++++++++++++++++++----
2 files changed, 33 insertions(+), 5 deletions(-)
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index 81f9e2e..19d6c2c 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -1099,7 +1099,8 @@ int xenmem_add_to_physmap_one(
{
struct domain *od;
p2m_type_t p2mt;
- od = rcu_lock_domain_by_any_id(foreign_domid);
+ od = get_pg_owner(foreign_domid);
+
if ( od == NULL )
return -ESRCH;
diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
index a2a9c4b..a99b670 100644
--- a/xen/arch/arm/p2m.c
+++ b/xen/arch/arm/p2m.c
@@ -227,11 +227,38 @@ paddr_t p2m_lookup(struct domain *d, paddr_t paddr,
p2m_type_t *t)
{
paddr_t ret;
struct p2m_domain *p2m = &d->arch.p2m;
+ struct page_info *page;
+ unsigned long mfn;
- spin_lock(&p2m->lock);
- ret = __p2m_lookup(d, paddr, t);
- spin_unlock(&p2m->lock);
-
+ /*
+ * DOMID_XEN is considered a PV guest on x86 (i.e MFN == GFN), but
+ * on ARM there is no such concept. Thus requests to DOMID_XEN
+ * on ARM use a MFN address directly and do not need translation
+ * from PFN.
+ */
+ if(DOMID_XEN != d->domain_id)
+ {
+ spin_lock(&p2m->lock);
+ ret = __p2m_lookup(d, paddr, t);
+ spin_unlock(&p2m->lock);
+ }
+ else
+ {
+ /* retrieve the page to determine read/write or read only mapping */
+ mfn = paddr >> PAGE_SHIFT;
+ if (mfn_valid(mfn))
+ {
+ page = mfn_to_page(mfn);
+ *t = (page->u.inuse.type_info == PGT_writable_page ?
+ p2m_ram_rw : p2m_ram_ro);
+ }
+ else
+ {
+ *t = p2m_invalid;
+ }
+ ret = paddr;
+ }
+
return ret;
}
--
2.5.0
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |