[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC 14/16] xen/arm: p2m: Extend p2m_get_entry to return the value of bit[0] (valid bit)
On Mon, 8 Oct 2018, Julien Grall wrote: > With the recent changes, a P2M entry may be populated but may as not > valid. In some situation, it would be useful to know whether the entry > has been marked available to guest in order to perform a specific > action. So extend p2m_get_entry to return the value of bit[0] (valid bit). > > Signed-off-by: Julien Grall <julien.grall@xxxxxxx> > --- > xen/arch/arm/mem_access.c | 6 +++--- > xen/arch/arm/p2m.c | 20 ++++++++++++++++---- > xen/include/asm-arm/p2m.h | 3 ++- > 3 files changed, 21 insertions(+), 8 deletions(-) > > diff --git a/xen/arch/arm/mem_access.c b/xen/arch/arm/mem_access.c > index 9239bdf323..f434510b2a 100644 > --- a/xen/arch/arm/mem_access.c > +++ b/xen/arch/arm/mem_access.c > @@ -70,7 +70,7 @@ static int __p2m_get_mem_access(struct domain *d, gfn_t gfn, > * No setting was found in the Radix tree. Check if the > * entry exists in the page-tables. > */ > - mfn_t mfn = p2m_get_entry(p2m, gfn, NULL, NULL, NULL); > + mfn_t mfn = p2m_get_entry(p2m, gfn, NULL, NULL, NULL, NULL); > > if ( mfn_eq(mfn, INVALID_MFN) ) > return -ESRCH; > @@ -199,7 +199,7 @@ p2m_mem_access_check_and_get_page(vaddr_t gva, unsigned > long flag, > * We had a mem_access permission limiting the access, but the page type > * could also be limiting, so we need to check that as well. > */ > - mfn = p2m_get_entry(p2m, gfn, &t, NULL, NULL); > + mfn = p2m_get_entry(p2m, gfn, &t, NULL, NULL, NULL); > if ( mfn_eq(mfn, INVALID_MFN) ) > goto err; > > @@ -405,7 +405,7 @@ long p2m_set_mem_access(struct domain *d, gfn_t gfn, > uint32_t nr, > gfn = gfn_next_boundary(gfn, order) ) > { > p2m_type_t t; > - mfn_t mfn = p2m_get_entry(p2m, gfn, &t, NULL, &order); > + mfn_t mfn = p2m_get_entry(p2m, gfn, &t, NULL, &order, NULL); > > > if ( !mfn_eq(mfn, INVALID_MFN) ) > diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c > index 12b459924b..df6b48d73b 100644 > --- a/xen/arch/arm/p2m.c > +++ b/xen/arch/arm/p2m.c > @@ -306,10 +306,14 @@ static int p2m_next_level(struct p2m_domain *p2m, bool > read_only, > * > * If the entry is not present, INVALID_MFN will be returned and the > * page_order will be set according to the order of the invalid range. > + * > + * valid will contain the value of bit[0] (e.g valid bit) of the > + * entry. > */ > mfn_t p2m_get_entry(struct p2m_domain *p2m, gfn_t gfn, > p2m_type_t *t, p2m_access_t *a, > - unsigned int *page_order) > + unsigned int *page_order, > + bool *valid) > { > paddr_t addr = gfn_to_gaddr(gfn); > unsigned int level = 0; > @@ -317,6 +321,7 @@ mfn_t p2m_get_entry(struct p2m_domain *p2m, gfn_t gfn, > int rc; > mfn_t mfn = INVALID_MFN; > p2m_type_t _t; > + bool _valid; > > /* Convenience aliases */ > const unsigned int offsets[4] = { > @@ -334,6 +339,10 @@ mfn_t p2m_get_entry(struct p2m_domain *p2m, gfn_t gfn, > > *t = p2m_invalid; > > + /* Allow valid to be NULL */ > + valid = valid?: &_valid; > + *valid = false; Why not a simple: if ( valid ) *valid = false; especially given that you do the same if ( valid ) check below. In fact, it doesn' look like we need _valid? > /* XXX: Check if the mapping is lower than the mapped gfn */ > > /* This gfn is higher than the highest the p2m map currently holds */ > @@ -379,6 +388,9 @@ mfn_t p2m_get_entry(struct p2m_domain *p2m, gfn_t gfn, > * to the GFN. > */ > mfn = mfn_add(mfn, gfn_x(gfn) & ((1UL << level_orders[level]) - 1)); > + > + if ( valid ) > + *valid = lpae_is_valid(entry); > } > > out_unmap: > @@ -397,7 +409,7 @@ mfn_t p2m_lookup(struct domain *d, gfn_t gfn, p2m_type_t > *t) > struct p2m_domain *p2m = p2m_get_hostp2m(d); > > p2m_read_lock(p2m); > - mfn = p2m_get_entry(p2m, gfn, t, NULL, NULL); > + mfn = p2m_get_entry(p2m, gfn, t, NULL, NULL, NULL); > p2m_read_unlock(p2m); > > return mfn; > @@ -1464,7 +1476,7 @@ int relinquish_p2m_mapping(struct domain *d) > for ( ; gfn_x(start) < gfn_x(end); > start = gfn_next_boundary(start, order) ) > { > - mfn_t mfn = p2m_get_entry(p2m, start, &t, NULL, &order); > + mfn_t mfn = p2m_get_entry(p2m, start, &t, NULL, &order, NULL); > > count++; > /* > @@ -1527,7 +1539,7 @@ int p2m_cache_flush_range(struct domain *d, gfn_t > start, gfn_t end) > > for ( ; gfn_x(start) < gfn_x(end); start = next_gfn ) > { > - mfn_t mfn = p2m_get_entry(p2m, start, &t, NULL, &order); > + mfn_t mfn = p2m_get_entry(p2m, start, &t, NULL, &order, NULL); > > next_gfn = gfn_next_boundary(start, order); > > diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h > index d7afa2bbe8..92213dd1ab 100644 > --- a/xen/include/asm-arm/p2m.h > +++ b/xen/include/asm-arm/p2m.h > @@ -211,7 +211,8 @@ mfn_t p2m_lookup(struct domain *d, gfn_t gfn, p2m_type_t > *t); > */ > mfn_t p2m_get_entry(struct p2m_domain *p2m, gfn_t gfn, > p2m_type_t *t, p2m_access_t *a, > - unsigned int *page_order); > + unsigned int *page_order, > + bool *valid); > > /* > * Direct set a p2m entry: only for use by the P2M code. > -- > 2.11.0 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |