From: Razvan Cojocaru <rcojocaru@bitdefender.com>
To: Jan Beulich <JBeulich@suse.com>, aisaila@bitdefender.com
Cc: Tamas K Lengyel <tamas@tklengyel.com>,
Wei Liu <wei.liu2@citrix.com>,
George Dunlap <George.Dunlap@eu.citrix.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
george.dunlap@citrix.com,
xen-devel <xen-devel@lists.xenproject.org>,
Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [PATCH v6] x86/altp2m: Aggregate get entry and populate into common funcs
Date: Tue, 14 May 2019 19:16:05 +0300 [thread overview]
Message-ID: <ee178e36-bf47-1a1c-cfa0-a8122782ea60@bitdefender.com> (raw)
In-Reply-To: <5CDAE1D2020000780022ED04@prv1-mh.provo.novell.com>
On 5/14/19 6:42 PM, Jan Beulich wrote:
>>>> On 23.04.19 at 16:30, <aisaila@bitdefender.com> wrote:
>> --- a/xen/arch/x86/mm/p2m.c
>> +++ b/xen/arch/x86/mm/p2m.c
>> @@ -478,6 +478,43 @@ void p2m_unlock_and_tlb_flush(struct p2m_domain *p2m)
>> mm_write_unlock(&p2m->lock);
>> }
>>
>> +int altp2m_get_effective_entry(struct p2m_domain *ap2m, gfn_t gfn, mfn_t *mfn,
>> + p2m_type_t *t, p2m_access_t *a,
>> + bool prepopulate)
>> +{
>> + *mfn = ap2m->get_entry(ap2m, gfn, t, a, 0, NULL, NULL);
>> +
>> + /* Check host p2m if no valid entry in alternate */
>> + if ( !mfn_valid(*mfn) && !p2m_is_hostp2m(ap2m) )
>> + {
>> + struct p2m_domain *hp2m = p2m_get_hostp2m(ap2m->domain);
>> + unsigned int page_order;
>> + int rc;
>> +
>> + *mfn = __get_gfn_type_access(hp2m, gfn_x(gfn), t, a,
>> + P2M_ALLOC | P2M_UNSHARE, &page_order, 0);
>> +
>> + rc = -ESRCH;
>> + if ( !mfn_valid(*mfn) || *t != p2m_ram_rw )
>> + return rc;
>> +
>> + /* If this is a superpage, copy that first */
>> + if ( prepopulate && page_order != PAGE_ORDER_4K )
>> + {
>> + unsigned long mask = ~((1UL << page_order) - 1);
>> + gfn_t gfn_aligned = _gfn(gfn_x(gfn) & mask);
>> + mfn_t mfn_aligned = _mfn(mfn_x(*mfn) & mask);
>> +
>> + rc = ap2m->set_entry(ap2m, gfn_aligned, mfn_aligned, page_order, *t, *a, 1);
>> + if ( rc )
>> + return rc;
>> + }
>> + }
>> +
>> + return 0;
>> +}
>> +
>> +
>> mfn_t __get_gfn_type_access(struct p2m_domain *p2m, unsigned long gfn_l,
>> p2m_type_t *t, p2m_access_t *a, p2m_query_t q,
>> unsigned int *page_order, bool_t locked)
>
> May I ask how the placement of this function was chosen? It looks
> as if all its callers live inside #ifdef CONFIG_HVM sections, just this
> function doesn't (reportedly causing build issues together with
> later changes).
I believe it's just an oversight. I've sent out a patch that hopefully
fixes this in a satisfactory manner.
Thanks,
Razvan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
WARNING: multiple messages have this Message-ID (diff)
From: Razvan Cojocaru <rcojocaru@bitdefender.com>
To: Jan Beulich <JBeulich@suse.com>, aisaila@bitdefender.com
Cc: Tamas K Lengyel <tamas@tklengyel.com>,
Wei Liu <wei.liu2@citrix.com>,
George Dunlap <George.Dunlap@eu.citrix.com>,
Andrew Cooper <andrew.cooper3@citrix.com>,
george.dunlap@citrix.com,
xen-devel <xen-devel@lists.xenproject.org>,
Roger Pau Monne <roger.pau@citrix.com>
Subject: Re: [Xen-devel] [PATCH v6] x86/altp2m: Aggregate get entry and populate into common funcs
Date: Tue, 14 May 2019 19:16:05 +0300 [thread overview]
Message-ID: <ee178e36-bf47-1a1c-cfa0-a8122782ea60@bitdefender.com> (raw)
Message-ID: <20190514161605.bBonh8uUwoRu-Bi7kivcmWwVQjxHonhxvz4MbEirp-A@z> (raw)
In-Reply-To: <5CDAE1D2020000780022ED04@prv1-mh.provo.novell.com>
On 5/14/19 6:42 PM, Jan Beulich wrote:
>>>> On 23.04.19 at 16:30, <aisaila@bitdefender.com> wrote:
>> --- a/xen/arch/x86/mm/p2m.c
>> +++ b/xen/arch/x86/mm/p2m.c
>> @@ -478,6 +478,43 @@ void p2m_unlock_and_tlb_flush(struct p2m_domain *p2m)
>> mm_write_unlock(&p2m->lock);
>> }
>>
>> +int altp2m_get_effective_entry(struct p2m_domain *ap2m, gfn_t gfn, mfn_t *mfn,
>> + p2m_type_t *t, p2m_access_t *a,
>> + bool prepopulate)
>> +{
>> + *mfn = ap2m->get_entry(ap2m, gfn, t, a, 0, NULL, NULL);
>> +
>> + /* Check host p2m if no valid entry in alternate */
>> + if ( !mfn_valid(*mfn) && !p2m_is_hostp2m(ap2m) )
>> + {
>> + struct p2m_domain *hp2m = p2m_get_hostp2m(ap2m->domain);
>> + unsigned int page_order;
>> + int rc;
>> +
>> + *mfn = __get_gfn_type_access(hp2m, gfn_x(gfn), t, a,
>> + P2M_ALLOC | P2M_UNSHARE, &page_order, 0);
>> +
>> + rc = -ESRCH;
>> + if ( !mfn_valid(*mfn) || *t != p2m_ram_rw )
>> + return rc;
>> +
>> + /* If this is a superpage, copy that first */
>> + if ( prepopulate && page_order != PAGE_ORDER_4K )
>> + {
>> + unsigned long mask = ~((1UL << page_order) - 1);
>> + gfn_t gfn_aligned = _gfn(gfn_x(gfn) & mask);
>> + mfn_t mfn_aligned = _mfn(mfn_x(*mfn) & mask);
>> +
>> + rc = ap2m->set_entry(ap2m, gfn_aligned, mfn_aligned, page_order, *t, *a, 1);
>> + if ( rc )
>> + return rc;
>> + }
>> + }
>> +
>> + return 0;
>> +}
>> +
>> +
>> mfn_t __get_gfn_type_access(struct p2m_domain *p2m, unsigned long gfn_l,
>> p2m_type_t *t, p2m_access_t *a, p2m_query_t q,
>> unsigned int *page_order, bool_t locked)
>
> May I ask how the placement of this function was chosen? It looks
> as if all its callers live inside #ifdef CONFIG_HVM sections, just this
> function doesn't (reportedly causing build issues together with
> later changes).
I believe it's just an oversight. I've sent out a patch that hopefully
fixes this in a satisfactory manner.
Thanks,
Razvan
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
next prev parent reply other threads:[~2019-05-14 16:16 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-04-23 14:30 [PATCH v6] x86/altp2m: Aggregate get entry and populate into common funcs Alexandru Stefan ISAILA
2019-04-23 14:30 ` [Xen-devel] " Alexandru Stefan ISAILA
2019-04-23 18:15 ` Tamas K Lengyel
2019-04-23 18:15 ` [Xen-devel] " Tamas K Lengyel
2019-04-29 14:53 ` Jan Beulich
2019-04-29 14:53 ` [Xen-devel] " Jan Beulich
2019-04-30 10:22 ` Andrew Cooper
2019-04-30 10:22 ` [Xen-devel] " Andrew Cooper
2019-05-14 15:42 ` Jan Beulich
2019-05-14 15:42 ` [Xen-devel] " Jan Beulich
2019-05-14 16:16 ` Razvan Cojocaru [this message]
2019-05-14 16:16 ` Razvan Cojocaru
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=ee178e36-bf47-1a1c-cfa0-a8122782ea60@bitdefender.com \
--to=rcojocaru@bitdefender.com \
--cc=George.Dunlap@eu.citrix.com \
--cc=JBeulich@suse.com \
--cc=aisaila@bitdefender.com \
--cc=andrew.cooper3@citrix.com \
--cc=george.dunlap@citrix.com \
--cc=roger.pau@citrix.com \
--cc=tamas@tklengyel.com \
--cc=wei.liu2@citrix.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).