|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 11/22] xen/arm: p2m: Find the memory attributes based on the p2m type
On Wed, 20 Jul 2016, Julien Grall wrote:
> Currently, mfn_to_p2m_entry is relying on the caller to provide the
> correct memory attribute and will deduce the sharability based on it.
>
> Some of the callers, such as p2m_create_table, are using same memory
> attribute regardless the underlying p2m type. For instance, this will
> lead to use change the memory attribute from MATTR_DEV to MATTR_MEM when
> a MMIO superpage is shattered.
>
> Furthermore, it makes more difficult to support different shareability
> with the same memory attribute.
>
> All the memory attributes could be deduced via the p2m type. This will
> simplify the code by dropping one parameter.
>
> ---
> I am not sure whether p2m_direct_mmio_c (cacheable MMIO) should use
> the outer-shareability or inner-shareability. Any opinions?
I think you did the right thing by setting it to outer. Good work.
Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx>
> ---
> xen/arch/arm/p2m.c | 55
> ++++++++++++++++++++++++------------------------------
> 1 file changed, 24 insertions(+), 31 deletions(-)
>
> diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
> index 999de2b..2f50b4f 100644
> --- a/xen/arch/arm/p2m.c
> +++ b/xen/arch/arm/p2m.c
> @@ -325,8 +325,7 @@ static void p2m_set_permission(lpae_t *e, p2m_type_t t,
> p2m_access_t a)
> }
> }
>
> -static lpae_t mfn_to_p2m_entry(mfn_t mfn, unsigned int mattr,
> - p2m_type_t t, p2m_access_t a)
> +static lpae_t mfn_to_p2m_entry(mfn_t mfn, p2m_type_t t, p2m_access_t a)
> {
> /*
> * sh, xn and write bit will be defined in the following switches
> @@ -335,7 +334,6 @@ static lpae_t mfn_to_p2m_entry(mfn_t mfn, unsigned int
> mattr,
> lpae_t e = (lpae_t) {
> .p2m.af = 1,
> .p2m.read = 1,
> - .p2m.mattr = mattr,
> .p2m.table = 1,
> .p2m.valid = 1,
> .p2m.type = t,
> @@ -343,18 +341,21 @@ static lpae_t mfn_to_p2m_entry(mfn_t mfn, unsigned int
> mattr,
>
> BUILD_BUG_ON(p2m_max_real_type > (1 << 4));
>
> - switch (mattr)
> + switch ( t )
> {
> - case MATTR_MEM:
> - e.p2m.sh = LPAE_SH_INNER;
> + case p2m_mmio_direct_nc:
> + e.p2m.mattr = MATTR_DEV;
> + e.p2m.sh = LPAE_SH_OUTER;
> break;
>
> - case MATTR_DEV:
> + case p2m_mmio_direct_c:
> + e.p2m.mattr = MATTR_MEM;
> e.p2m.sh = LPAE_SH_OUTER;
> break;
> +
> default:
> - BUG();
> - break;
> + e.p2m.mattr = MATTR_MEM;
> + e.p2m.sh = LPAE_SH_INNER;
> }
>
> p2m_set_permission(&e, t, a);
> @@ -421,7 +422,7 @@ static int p2m_create_table(struct domain *d, lpae_t
> *entry,
> */
> for ( i=0 ; i < LPAE_ENTRIES; i++ )
> {
> - pte = mfn_to_p2m_entry(mfn, MATTR_MEM, t, p2m->default_access);
> + pte = mfn_to_p2m_entry(mfn, t, p2m->default_access);
>
> mfn = mfn_add(mfn, 1UL << (level_shift - LPAE_SHIFT));
>
> @@ -445,7 +446,7 @@ static int p2m_create_table(struct domain *d, lpae_t
> *entry,
>
> unmap_domain_page(p);
>
> - pte = mfn_to_p2m_entry(_mfn(page_to_mfn(page)), MATTR_MEM, p2m_invalid,
> + pte = mfn_to_p2m_entry(_mfn(page_to_mfn(page)), p2m_invalid,
> p2m->default_access);
>
> p2m_write_pte(entry, pte, flush_cache);
> @@ -666,7 +667,6 @@ static int apply_one_level(struct domain *d,
> paddr_t *addr,
> paddr_t *maddr,
> bool_t *flush,
> - int mattr,
> p2m_type_t t,
> p2m_access_t a)
> {
> @@ -695,7 +695,7 @@ static int apply_one_level(struct domain *d,
> return rc;
>
> /* New mapping is superpage aligned, make it */
> - pte = mfn_to_p2m_entry(_mfn(*maddr >> PAGE_SHIFT), mattr, t, a);
> + pte = mfn_to_p2m_entry(_mfn(*maddr >> PAGE_SHIFT), t, a);
> if ( level < 3 )
> pte.p2m.table = 0; /* Superpage entry */
>
> @@ -915,7 +915,6 @@ static int apply_p2m_changes(struct domain *d,
> gfn_t sgfn,
> unsigned long nr,
> mfn_t smfn,
> - int mattr,
> uint32_t mask,
> p2m_type_t t,
> p2m_access_t a)
> @@ -1054,7 +1053,7 @@ static int apply_p2m_changes(struct domain *d,
> level, flush_pt, op,
> start_gpaddr, end_gpaddr,
> &addr, &maddr, &flush,
> - mattr, t, a);
> + t, a);
> if ( ret < 0 ) { rc = ret ; goto out; }
> count += ret;
>
> @@ -1163,7 +1162,7 @@ out:
> * mapping.
> */
> apply_p2m_changes(d, REMOVE, sgfn, gfn - gfn_x(sgfn), smfn,
> - mattr, 0, p2m_invalid, d->arch.p2m.default_access);
> + 0, p2m_invalid, d->arch.p2m.default_access);
> }
>
> return rc;
> @@ -1173,10 +1172,10 @@ static inline int p2m_insert_mapping(struct domain *d,
> gfn_t start_gfn,
> unsigned long nr,
> mfn_t mfn,
> - int mattr, p2m_type_t t)
> + p2m_type_t t)
> {
> return apply_p2m_changes(d, INSERT, start_gfn, nr, mfn,
> - mattr, 0, t, d->arch.p2m.default_access);
> + 0, t, d->arch.p2m.default_access);
> }
>
> static inline int p2m_remove_mapping(struct domain *d,
> @@ -1186,8 +1185,7 @@ static inline int p2m_remove_mapping(struct domain *d,
> {
> return apply_p2m_changes(d, REMOVE, start_gfn, nr, mfn,
> /* arguments below not used when removing
> mapping */
> - MATTR_MEM, 0, p2m_invalid,
> - d->arch.p2m.default_access);
> + 0, p2m_invalid, d->arch.p2m.default_access);
> }
>
> int map_regions_rw_cache(struct domain *d,
> @@ -1195,8 +1193,7 @@ int map_regions_rw_cache(struct domain *d,
> unsigned long nr,
> mfn_t mfn)
> {
> - return p2m_insert_mapping(d, gfn, nr, mfn,
> - MATTR_MEM, p2m_mmio_direct_c);
> + return p2m_insert_mapping(d, gfn, nr, mfn, p2m_mmio_direct_c);
> }
>
> int unmap_regions_rw_cache(struct domain *d,
> @@ -1212,8 +1209,7 @@ int map_mmio_regions(struct domain *d,
> unsigned long nr,
> mfn_t mfn)
> {
> - return p2m_insert_mapping(d, start_gfn, nr, mfn,
> - MATTR_DEV, p2m_mmio_direct_nc);
> + return p2m_insert_mapping(d, start_gfn, nr, mfn, p2m_mmio_direct_nc);
> }
>
> int unmap_mmio_regions(struct domain *d,
> @@ -1251,8 +1247,7 @@ int guest_physmap_add_entry(struct domain *d,
> unsigned long page_order,
> p2m_type_t t)
> {
> - return p2m_insert_mapping(d, gfn, (1 << page_order), mfn,
> - MATTR_MEM, t);
> + return p2m_insert_mapping(d, gfn, (1 << page_order), mfn, t);
> }
>
> void guest_physmap_remove_page(struct domain *d,
> @@ -1412,7 +1407,7 @@ int relinquish_p2m_mapping(struct domain *d)
> nr = gfn_x(p2m->max_mapped_gfn) - gfn_x(p2m->lowest_mapped_gfn);
>
> return apply_p2m_changes(d, RELINQUISH, p2m->lowest_mapped_gfn, nr,
> - INVALID_MFN, MATTR_MEM, 0, p2m_invalid,
> + INVALID_MFN, 0, p2m_invalid,
> d->arch.p2m.default_access);
> }
>
> @@ -1425,8 +1420,7 @@ int p2m_cache_flush(struct domain *d, gfn_t start,
> unsigned long nr)
> end = gfn_min(end, p2m->max_mapped_gfn);
>
> return apply_p2m_changes(d, CACHEFLUSH, start, nr, INVALID_MFN,
> - MATTR_MEM, 0, p2m_invalid,
> - d->arch.p2m.default_access);
> + 0, p2m_invalid, d->arch.p2m.default_access);
> }
>
> mfn_t gfn_to_mfn(struct domain *d, gfn_t gfn)
> @@ -1827,8 +1821,7 @@ long p2m_set_mem_access(struct domain *d, gfn_t gfn,
> uint32_t nr,
> }
>
> rc = apply_p2m_changes(d, MEMACCESS, gfn_add(gfn, start),
> - (nr - start), INVALID_MFN,
> - MATTR_MEM, mask, 0, a);
> + (nr - start), INVALID_MFN, mask, 0, a);
> if ( rc < 0 )
> return rc;
> else if ( rc > 0 )
> --
> 1.9.1
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |