From nobody Fri Oct 31 09:50:36 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1748962214; cv=none; d=zohomail.com; s=zohoarc; b=UVAVeMjceLIhUAe8HIf6yACmg9RPnrxVWX14MinQAvOcxJv+Hq3eYu+8jo/fonFpt3hHqcYaT9VKVxAp3iFwO84Aidof535VK6a62JzBas7qY2Fq41d2eSMK41f6lcXjKJ0kj6c4DL6lP+3+K7l7ymoEQgqIEGzRkyImSgONE7c= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748962214; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=Ob3NsRzu/zCymMrGjnHAxZ8pg1NKaHtYVDfNAqbwUHM=; b=JdlosyaphUjiSnWVxlC/SokOSs9R52n0woRiDpORJTJeAlscBs1LIAzOg6yXdxJenXCFzAess8KTH4oFgZeLg/BjVJ1nrFN/j3NWM9USIZvfB05TwSgOw8a4nQw3vjCxe3pAvAv4ZTQrVpN5dowFw2hW+rT+FRTCGkbNStbVpJU= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748962214121955.8617283543391; Tue, 3 Jun 2025 07:50:14 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1004558.1384287 (Exim 4.92) (envelope-from ) id 1uMSxg-0006FB-CH; Tue, 03 Jun 2025 14:49:56 +0000 Received: by outflank-mailman (output) from mailman id 1004558.1384287; Tue, 03 Jun 2025 14:49:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxg-0006F4-9g; Tue, 03 Jun 2025 14:49:56 +0000 Received: by outflank-mailman (input) for mailman id 1004558; Tue, 03 Jun 2025 14:49:54 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxe-00060n-Ew for xen-devel@lists.xenproject.org; Tue, 03 Jun 2025 14:49:54 +0000 Received: from mail-lf1-x132.google.com (mail-lf1-x132.google.com [2a00:1450:4864:20::132]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 026192d2-408a-11f0-a300-13f23c93f187; Tue, 03 Jun 2025 16:49:54 +0200 (CEST) Received: by mail-lf1-x132.google.com with SMTP id 2adb3069b0e04-5532f9ac219so6451492e87.1 for ; Tue, 03 Jun 2025 07:49:53 -0700 (PDT) Received: from gmail.com (213-67-3-247-no600.tbcn.telia.com. [213.67.3.247]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55350cab690sm450194e87.53.2025.06.03.07.49.51 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Jun 2025 07:49:51 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 026192d2-408a-11f0-a300-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1748962192; x=1749566992; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=Ob3NsRzu/zCymMrGjnHAxZ8pg1NKaHtYVDfNAqbwUHM=; b=hTaRQz4yfHvsrf2w+aDot75LJs2aMl93grs+cPErncdF2GeEyF7V87fqtS1Rm2t+BA 8UhEkdcUzASB5rxzbKxaBUq7bnMpcFtxRRBor3om0cCW/PEu9XaQM9ro5ZRc/sfnMyPC /0MgBJjhKf1S4daNNEPTBsCkhzaQFb1sic8R8zZt+B3flDVqtLtUF97ov0R2aa1VQZiN zHqkGfgE5lqhOs73vsX68Sr6uEEGFKJECwmJWg/oI+Z/nCP/o2dUwniHKUsAVg96xWtv N2eo0scE/LQlvjNVJJoS4mFYLSjvQ2MYMcj+oaG67zYIhSWjZDnXQDeEwD17BcN5vFcc mkPA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1748962192; x=1749566992; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=Ob3NsRzu/zCymMrGjnHAxZ8pg1NKaHtYVDfNAqbwUHM=; b=PSbrK/rYao85pApEvv8gJ5k5PLqb1btZ0bN4LyJqBvapD8eqCaOvVLfPgmQpatuZiD CMrnZ+dL7R3mPFwmpc5IHvDMhjYt8xhwmh2umjJFaDMknNAp2n8qCtIpXNll1SV/jT5S 8BhYQuKhEf34IfxTcvYnMr7Wsbq04ihS6W/xG2wx6oJL6LhuK8TPv0v45HmO4fgCdox0 2uNsREYwmCTodYWZTujjYsF5QPBQgMFB52ZuL4qp4ecbyD/8P9tG7kecH0HBOJDWL2xh WMXFWeiGhq7zo+X3hAMFX5NP90z27HutmCNRYCA6eLd6/Kdrg4LUQldvzERKlEMP1FaQ Tlkw== X-Gm-Message-State: AOJu0Ywt/3viN6ia6scl3RxnC3bJZXsENHaqUi8qIfmqHXtODYripqj1 +dJV+QZwBnQV4vclmILDRxs/0mrQl6KydPGNfPVIfWLrovDDpacUcx9lUyJvkssiDb0= X-Gm-Gg: ASbGncveeiH5xL9l7DRiKa584SUxZpHUaT3DLGydpD6m7UcLL63y5ENeFPKwIMMgOrL CN0ai1m/8bKg72qe9bWAP+KHSGyHfrtUz6UGX9q0Ex6QqCZDxxmW66FORi3u2DXBfb+QeIyPWbv qdj3lYLMCNA+r+j6fDY6fNod8zPsKmHkj7JfFS/YaYbQeutNIVTJuGzqzf0qXerxHW4ekJzNQRO YKJNKu6m6wg0FMJSoo8GbNWT/l9ftyRFWJOCGNSD8i46qAWDaSGpX7BvLVY/kinTbHR/ooFkHm0 Lnyh7Pji8kzyyYnVfTaUNNJjqhkNsfhrtLQ/MVsfGuJ4NySkSa9T6+y1/otlc6Fyk7+vHjVNYVT 7XUWpb6TXd/Ij4QXSaAEUr02ZC9ZsS+3WJw== X-Google-Smtp-Source: AGHT+IHxB3yc+PX4HInj97eKzz3f2laol/ruQa1wNgVYs/4yCuKsO7cr4MEEkK4HJzdxdQQodqiLvw== X-Received: by 2002:ac2:4c4a:0:b0:553:2418:8c0c with SMTP id 2adb3069b0e04-5533b93b8e2mr5131186e87.57.1748962192301; Tue, 03 Jun 2025 07:49:52 -0700 (PDT) From: "Edgar E. Iglesias" To: xen-devel@lists.xenproject.org Cc: sstabellini@kernel.org, julien@xen.org, bertrand.marquis@arm.com, michal.orzel@amd.com, Volodymyr_Babchuk@epam.com, andrew.cooper3@citrix.com, edgar.iglesias@amd.com, Anthony PERARD , Juergen Gross , Jan Beulich , =?UTF-8?q?Roger=20Pau=20Monn=C3=A9?= Subject: [PATCH v4 1/5] xen/arm: Add way to disable traps on accesses to unmapped addresses Date: Tue, 3 Jun 2025 16:49:44 +0200 Message-ID: <20250603144948.1685047-2-edgar.iglesias@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250603144948.1685047-1-edgar.iglesias@gmail.com> References: <20250603144948.1685047-1-edgar.iglesias@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1748962216003116600 Content-Type: text/plain; charset="utf-8" From: "Edgar E. Iglesias" Add a per-domain way to optionally disable traps for accesses to unmapped addresses. The domain flag is general but it's only implemented for Arm for now. Reviewed-by: Stefano Stabellini Signed-off-by: Edgar E. Iglesias --- tools/libs/light/libxl_arm.c | 3 +++ xen/arch/arm/dom0less-build.c | 3 +++ xen/arch/arm/domain.c | 3 ++- xen/arch/arm/domain_build.c | 3 ++- xen/arch/arm/io.c | 37 +++++++++++++++++++++++++++++++++-- xen/arch/x86/domain.c | 7 +++++++ xen/common/domain.c | 3 ++- xen/include/public/domctl.h | 4 +++- 8 files changed, 57 insertions(+), 6 deletions(-) diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c index 75c811053c..9530996e72 100644 --- a/tools/libs/light/libxl_arm.c +++ b/tools/libs/light/libxl_arm.c @@ -233,6 +233,9 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, config->arch.sve_vl =3D d_config->b_info.arch_arm.sve_vl / 128U; } =20 + /* Trap accesses to unmapped areas. */ + config->flags |=3D XEN_DOMCTL_CDF_trap_unmapped_accesses; + return 0; } =20 diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c index a49764f0ad..a4e0a33632 100644 --- a/xen/arch/arm/dom0less-build.c +++ b/xen/arch/arm/dom0less-build.c @@ -343,6 +343,9 @@ void __init arch_create_domUs(struct dt_device_node *no= de, panic("'sve' property found, but CONFIG_ARM64_SVE not selected\n"); #endif } + + /* Trap accesses to unmapped areas. */ + d_cfg->flags |=3D XEN_DOMCTL_CDF_trap_unmapped_accesses; } =20 int __init init_intc_phandle(struct kernel_info *kinfo, const char *name, diff --git a/xen/arch/arm/domain.c b/xen/arch/arm/domain.c index 45aeb8bddc..be58a23dd7 100644 --- a/xen/arch/arm/domain.c +++ b/xen/arch/arm/domain.c @@ -612,7 +612,8 @@ int arch_sanitise_domain_config(struct xen_domctl_creat= edomain *config) unsigned int max_vcpus; unsigned int flags_required =3D (XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_h= ap); unsigned int flags_optional =3D (XEN_DOMCTL_CDF_iommu | XEN_DOMCTL_CDF= _vpmu | - XEN_DOMCTL_CDF_xs_domain ); + XEN_DOMCTL_CDF_xs_domain | + XEN_DOMCTL_CDF_trap_unmapped_accesses ); unsigned int sve_vl_bits =3D sve_decode_vl(config->arch.sve_vl); =20 if ( (config->flags & ~flags_optional) !=3D flags_required ) diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index b189a7cfae..7ff9c1b584 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -2003,7 +2003,8 @@ void __init create_dom0(void) { struct domain *dom0; struct xen_domctl_createdomain dom0_cfg =3D { - .flags =3D XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap, + .flags =3D XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap | + XEN_DOMCTL_CDF_trap_unmapped_accesses, .max_evtchn_port =3D -1, .max_grant_frames =3D gnttab_dom0_frames(), .max_maptrack_frames =3D -1, diff --git a/xen/arch/arm/io.c b/xen/arch/arm/io.c index 5a4b0e8f25..e599bbe043 100644 --- a/xen/arch/arm/io.c +++ b/xen/arch/arm/io.c @@ -21,6 +21,32 @@ =20 #include "decode.h" =20 +/* Handler for unmapped ranges. Writes ignored, reads return all ones. */ +static int unmapped_read(struct vcpu *v, mmio_info_t *info, register_t *r, + void *priv) +{ + uint64_t mask =3D GENMASK((1U << info->dabt.size) * 8 - 1, 0); + + /* Mask off upper bits. */ + *r =3D UINT64_MAX & mask; + return 1; +} + +static int unmapped_write(struct vcpu *v, mmio_info_t *info, register_t r, + void *priv) +{ + return 1; +} + +static const struct mmio_handler_ops unmapped_ops =3D { + .read =3D unmapped_read, + .write =3D unmapped_write +}; + +static const struct mmio_handler unmapped_handler =3D { + .ops =3D &unmapped_ops +}; + static enum io_state handle_read(const struct mmio_handler *handler, struct vcpu *v, mmio_info_t *info) @@ -175,11 +201,18 @@ enum io_state try_handle_mmio(struct cpu_user_regs *r= egs, handler =3D find_mmio_handler(v->domain, info->gpa); if ( !handler ) { + bool trap_unmapped =3D v->domain->options & + XEN_DOMCTL_CDF_trap_unmapped_acce= sses; rc =3D try_fwd_ioserv(regs, v, info); if ( rc =3D=3D IO_HANDLED ) return handle_ioserv(regs, v); - - return rc; + else if ( rc =3D=3D IO_UNHANDLED && !trap_unmapped ) + { + /* Fallback to the unmapped handler. */ + handler =3D &unmapped_handler; + } else { + return rc; + } } =20 /* diff --git a/xen/arch/x86/domain.c b/xen/arch/x86/domain.c index 7536b6c871..fb7aea9168 100644 --- a/xen/arch/x86/domain.c +++ b/xen/arch/x86/domain.c @@ -713,6 +713,13 @@ int arch_sanitise_domain_config(struct xen_domctl_crea= tedomain *config) } } =20 + if ( config->flags & XEN_DOMCTL_CDF_trap_unmapped_accesses ) + { + dprintk(XENLOG_INFO, "Unsupported trap_unmapped_accesses flag %#x\= n", + config->flags); + return -EINVAL; + } + if ( config->arch.misc_flags & ~XEN_X86_MSR_RELAXED ) { dprintk(XENLOG_INFO, "Invalid arch misc flags %#x\n", diff --git a/xen/common/domain.c b/xen/common/domain.c index abf1969e60..ac4f58f638 100644 --- a/xen/common/domain.c +++ b/xen/common/domain.c @@ -721,7 +721,8 @@ static int sanitise_domain_config(struct xen_domctl_cre= atedomain *config) ~(XEN_DOMCTL_CDF_hvm | XEN_DOMCTL_CDF_hap | XEN_DOMCTL_CDF_s3_integrity | XEN_DOMCTL_CDF_oos_off | XEN_DOMCTL_CDF_xs_domain | XEN_DOMCTL_CDF_iommu | - XEN_DOMCTL_CDF_nested_virt | XEN_DOMCTL_CDF_vpmu) ) + XEN_DOMCTL_CDF_nested_virt | XEN_DOMCTL_CDF_vpmu | + XEN_DOMCTL_CDF_trap_unmapped_accesses) ) { dprintk(XENLOG_INFO, "Unknown CDF flags %#x\n", config->flags); return -EINVAL; diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h index 5b2063eed9..be19ab5e26 100644 --- a/xen/include/public/domctl.h +++ b/xen/include/public/domctl.h @@ -66,9 +66,11 @@ struct xen_domctl_createdomain { #define XEN_DOMCTL_CDF_nested_virt (1U << _XEN_DOMCTL_CDF_nested_virt) /* Should we expose the vPMU to the guest? */ #define XEN_DOMCTL_CDF_vpmu (1U << 7) +/* Should we trap guest accesses to unmapped addresses? */ +#define XEN_DOMCTL_CDF_trap_unmapped_accesses (1U << 8) =20 /* Max XEN_DOMCTL_CDF_* constant. Used for ABI checking. */ -#define XEN_DOMCTL_CDF_MAX XEN_DOMCTL_CDF_vpmu +#define XEN_DOMCTL_CDF_MAX XEN_DOMCTL_CDF_trap_unmapped_accesses =20 uint32_t flags; =20 --=20 2.43.0 From nobody Fri Oct 31 09:50:36 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1748962219; cv=none; d=zohomail.com; s=zohoarc; b=RO800SCphKfXVyKgdFNMdmjMncFAPHAOYD2xh2Q5hi3Xs9ZAXK7qo0pOl0VSRCJI+xNKAbNs/U/Ur1BYHD049Zdg7h8oubBrvH8X1mxmmeIWfYkDnXXRJKrKjwPfRWLsUEMsd52kna/KtSqZGWRmIYTpBGToOI5bu885jM4yk/g= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748962219; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=cxkHOzjLuIxbnoSdUszUdCQGbRM0T87LtQfXfGg3nVA=; b=ajnkn3zHMzGo6kXAgWP3dgvfTLFKCZij2+zMvD+Jiw4GsMiQKPmQ1n/1IIIFjAqQW5zOXBIRpUdauPW+koZ6cD/CxCx/znXO9t2iAmuHF1Xj7W7hf2me9xiaO4/655N1lFXJysSwFbtGYwZpzd9IPIFiYlen2f73OuSwYLYjkOc= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748962219860342.2073745742716; Tue, 3 Jun 2025 07:50:19 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1004559.1384291 (Exim 4.92) (envelope-from ) id 1uMSxg-0006Hx-KV; Tue, 03 Jun 2025 14:49:56 +0000 Received: by outflank-mailman (output) from mailman id 1004559.1384291; Tue, 03 Jun 2025 14:49:56 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxg-0006H4-Gp; Tue, 03 Jun 2025 14:49:56 +0000 Received: by outflank-mailman (input) for mailman id 1004559; Tue, 03 Jun 2025 14:49:54 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxe-00060n-SC for xen-devel@lists.xenproject.org; Tue, 03 Jun 2025 14:49:54 +0000 Received: from mail-lf1-x12a.google.com (mail-lf1-x12a.google.com [2a00:1450:4864:20::12a]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 02b64404-408a-11f0-a300-13f23c93f187; Tue, 03 Jun 2025 16:49:54 +0200 (CEST) Received: by mail-lf1-x12a.google.com with SMTP id 2adb3069b0e04-55350d0eedeso1947244e87.2 for ; Tue, 03 Jun 2025 07:49:54 -0700 (PDT) Received: from gmail.com (213-67-3-247-no600.tbcn.telia.com. [213.67.3.247]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-5533791cdcesm1955678e87.164.2025.06.03.07.49.52 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Jun 2025 07:49:52 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 02b64404-408a-11f0-a300-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1748962193; x=1749566993; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=cxkHOzjLuIxbnoSdUszUdCQGbRM0T87LtQfXfGg3nVA=; b=k4D8wJOydaAPhxrctAl973D/05HHpBl/OC+U8O/2fsiafUYtZLC/hTyB8GIImtSHQq QXW+7vihgD12Res8y4MOPG4HMjvWxmlsqnH32/riWfko970IZQCEwftIMzlXiU5BvomW z4a7gq5BmOQt0OREjJSWbQZ0PTEihJI+26dd+hRjoxywtWUN+MCKV5rG3CFodzGjt3eD oNcGekvudHpde4MToFG4s1VLEYr6QnHVl0cO37AQpThaexhkEqnNKNEW+8DfVlBWj492 J05Zya8Z/Om9mHq+wC7ZJ9efc1aEZgV4ZCXoDXDXkgUeSqboY4PSrUzIH87ZAsPHNYWh d8RQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1748962193; x=1749566993; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=cxkHOzjLuIxbnoSdUszUdCQGbRM0T87LtQfXfGg3nVA=; b=hkTkOGGSMO55XrFWXL5Inv6Rq7xbSDC4dbAGxJmfqcPMXrSDu+aDcg3432/CGizIDm C/5gJWeoAVZ8Nb4QSHPJuu8l46J6THzQsAvXSIrRmeEnUIN49qCQXtq8uJJ2rNA2suXM eSZxYsUT2pv8UFUlUbssbp/I9YPMMD1kjASTPOQWloBFV5bhxMY+80rO083SvKnR9SmX FmqhPQgezTR79V9subOh9eF91osIzEvr8TdgRQLoRyw9BOUkPaUA3sYduDRGKBIXfkA5 hPQ/rtxZ/PzNTFxo0MgAg57HjyhCnOrIvsaJ3Z2/eXzAj/mDVz4cxC9Wwb1PxM1gujOA iq8A== X-Gm-Message-State: AOJu0YziWGgRsKH7OXkCX/pkPOPvPN3+rqKiFotCS3FYsTH7nfg3Zo8A asYdH9bFNvDZxj+mOVpfeVJiniPHVlMDPhchFIKPL+WcVZJdFcJG0PJgMcU3qcwP8pc= X-Gm-Gg: ASbGncsZKEYYovnW2v9KPModUob1klVjAXNJT+seT/lv/SI0zJ5G8F/3PxxWngM2+LY OZrBm/8fpVYD4qdwCzdyoDCLp3Vsc6p0d2QQM56twX5+P01iLEfmSF9EvxyH2LtWwz6FkBDQstI ry69FwSg35tuqzbFoAXRfaXDZeRbwxIWSwtKrixqsXr+12jFPEAaKv5rGC3WhFoGCiynsMnXUoo 0MPRTNmAzhomlQmLxCiOd56nrw4FVm7ElSa0YkhLNC7rvTF4pO0fsYTqV4H2sRYxrIiePsDusBz SIr4LDmZ08dfbZiOSgHhIpCJRExrYNfOccNdjPw6HOxd/3l6CUbJmDuC3eZDAUgxxKeUkaj9gJG rYq7tAJXhUuBPYX6+XztUHOA= X-Google-Smtp-Source: AGHT+IEDspcf46WZ+GLaDfcXnfwzoPQcZkL/NMs2D0E3d1fP1/tTD2EkdEVG0kCXUGd8ka7U1V4KBA== X-Received: by 2002:a05:6512:6cc:b0:553:35bd:d2eb with SMTP id 2adb3069b0e04-5533d16d8fbmr4922174e87.13.1748962193286; Tue, 03 Jun 2025 07:49:53 -0700 (PDT) From: "Edgar E. Iglesias" To: xen-devel@lists.xenproject.org Cc: sstabellini@kernel.org, julien@xen.org, bertrand.marquis@arm.com, michal.orzel@amd.com, Volodymyr_Babchuk@epam.com, andrew.cooper3@citrix.com, edgar.iglesias@amd.com Subject: [PATCH v4 2/5] xen/arm: dom0less: Add trap-unmapped-accesses Date: Tue, 3 Jun 2025 16:49:45 +0200 Message-ID: <20250603144948.1685047-3-edgar.iglesias@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250603144948.1685047-1-edgar.iglesias@gmail.com> References: <20250603144948.1685047-1-edgar.iglesias@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1748962221480116600 Content-Type: text/plain; charset="utf-8" From: "Edgar E. Iglesias" Add the trap-unmapped-accesses per-domain fdt property. Reviewed-by: Stefano Stabellini Signed-off-by: Edgar E. Iglesias --- docs/misc/arm/device-tree/booting.txt | 10 ++++++++++ xen/arch/arm/dom0less-build.c | 9 ++++++++- 2 files changed, 18 insertions(+), 1 deletion(-) diff --git a/docs/misc/arm/device-tree/booting.txt b/docs/misc/arm/device-t= ree/booting.txt index 59fa96a82e..07acc7ba64 100644 --- a/docs/misc/arm/device-tree/booting.txt +++ b/docs/misc/arm/device-tree/booting.txt @@ -225,6 +225,16 @@ with the following properties: option is provided with a non zero value, but the platform doesn't sup= port SVE. =20 +- trap-unmapped-accesses + + Optional. An integer that configures handling of accesses to unmapped + address ranges. + If set to 0, guest accesses will read all bits as ones, e.g 0xFFFFFFFF + for a 32bit access and writes will be ignored. + If set to 1, guest accesses will trap. + + The default is 1 when trap-unmapped-accesses is absent. + - xen,enhanced =20 A string property. Possible property values are: diff --git a/xen/arch/arm/dom0less-build.c b/xen/arch/arm/dom0less-build.c index a4e0a33632..69324aa597 100644 --- a/xen/arch/arm/dom0less-build.c +++ b/xen/arch/arm/dom0less-build.c @@ -344,8 +344,15 @@ void __init arch_create_domUs(struct dt_device_node *n= ode, #endif } =20 - /* Trap accesses to unmapped areas. */ + /* Trap unmapped accesses by default. */ d_cfg->flags |=3D XEN_DOMCTL_CDF_trap_unmapped_accesses; + if ( dt_property_read_u32(node, "trap-unmapped-accesses", &val) ) + { + if ( val > 1 ) + panic("trap-unmapped-accesses: supported values are 0 or 1"); + if ( !val ) + d_cfg->flags &=3D ~XEN_DOMCTL_CDF_trap_unmapped_accesses; + } } =20 int __init init_intc_phandle(struct kernel_info *kinfo, const char *name, --=20 2.43.0 From nobody Fri Oct 31 09:50:36 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1748962216; cv=none; d=zohomail.com; s=zohoarc; b=Nb52PThTSBZTOOwqkluMc/aQaDtTnHULBWKQZUPV8xt+2Zt/BCAaJjWuo1yTb+fEyj6o/qUCQaGb8YFQFw0c5PwGQIY/bT2dBAIsk6vcsPOOMjtwPlw1r2hSAtqHB+5L1QstXA1DU/beffA2HPo1bATXYTb//y7rs9IsRUhzPqU= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748962216; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=8/P4JJfVyXfBWOJOwxQ63tEugbkZDcheuT5ZnHfj61Q=; b=WgDVzvc4bXU6dN/Hfq1EAcg1t2QPitgbn1HOxP5F1+0kE0hEz0eb72pqY/FyMUyYB/G2VR+dymA2P+PWTJWwrjY/swv0olYb7BgdjlO9GFtekV6OucpXl1WOxSXOR5xyyIeOBWIkdJKSpjU3NlgYSRxTOTT7aXldT/baqO6ieT4= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748962216853888.9051883899797; Tue, 3 Jun 2025 07:50:16 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1004560.1384308 (Exim 4.92) (envelope-from ) id 1uMSxi-0006iJ-SI; Tue, 03 Jun 2025 14:49:58 +0000 Received: by outflank-mailman (output) from mailman id 1004560.1384308; Tue, 03 Jun 2025 14:49:58 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxi-0006iC-OP; Tue, 03 Jun 2025 14:49:58 +0000 Received: by outflank-mailman (input) for mailman id 1004560; Tue, 03 Jun 2025 14:49:57 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxh-00060n-Cb for xen-devel@lists.xenproject.org; Tue, 03 Jun 2025 14:49:57 +0000 Received: from mail-lj1-x231.google.com (mail-lj1-x231.google.com [2a00:1450:4864:20::231]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 040d5322-408a-11f0-a300-13f23c93f187; Tue, 03 Jun 2025 16:49:56 +0200 (CEST) Received: by mail-lj1-x231.google.com with SMTP id 38308e7fff4ca-32a81344ae9so61753821fa.0 for ; Tue, 03 Jun 2025 07:49:56 -0700 (PDT) Received: from gmail.com (213-67-3-247-no600.tbcn.telia.com. [213.67.3.247]) by smtp.gmail.com with ESMTPSA id 38308e7fff4ca-32a85bd20e2sm19958911fa.88.2025.06.03.07.49.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Jun 2025 07:49:53 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 040d5322-408a-11f0-a300-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1748962196; x=1749566996; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8/P4JJfVyXfBWOJOwxQ63tEugbkZDcheuT5ZnHfj61Q=; b=GRdlHQp+vD3UkJtI5GxssD1hknwr864YmpWaRw+pVvusbtHctFacK0FyRVt0ipM0ak odUfICi2KlbZzNR/2gDxzBY7a3CP60ZcS+zdZBd2j6K8ds11puZ/FrllsAl3c7fe3XQZ 0gv2zbMO56Jt4ot9wk882PRXLkHX6/ebTqr6QsXUr2o9H18QNok8y3D/7TZuCJfwVBPv qCdH+yyjkDK5rWj+z/XbYv5fRyykFSLN3C7Nh6rTuQtsLkZsDIBFctrdUXXw4soXHFii O7h7h+iHx1b/3zYwJhE2R7OmUHkEk8Ie5tNi6heydTtOPsdSeJ4AYyXjcfKVZHS7XPFx sl6w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1748962196; x=1749566996; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8/P4JJfVyXfBWOJOwxQ63tEugbkZDcheuT5ZnHfj61Q=; b=aw4i0+75jr03zOVuyl6JivOXgG7ZKQR0MNCGkkZNsFgIyRU8lWZGY8S71H9FfHATqb x/uvrjix9CXMQFQT+Gzfqqwog4mub6/BnHL9+/SoMd7vZUVIpEG/LhblHq8/XQEaqqHY +20nv86I/4yuY9RcrBBywDzE5nFQEL0LUkU6X320znqSRiwoMI6QErwM0C5RNiaTUNqP q6QroJtOSJXgOy3WlawNr+3cwCh4snbpi15Md36JtO6bQPiQtoaDd/GruN0Y7DPmpQuz /POuFxHMvKa6N2f9tprZVg8sBGtzcU5t+jOhYue7uVpNf3fbW4XWTI9KT1eBXq1i/lKN xlOw== X-Gm-Message-State: AOJu0YxzojiqtcEX4kIgJVr+9LNr3nhnCGnVLziRb25dVdxvez7vHPPM vaWZWH5b1L4CbXXfwCCjhfuQO+LV9aqv6xwS19lL6bwzYaDUXwT/6fixasrTrCRTPnI= X-Gm-Gg: ASbGncvUANldHzSl9njM0J0Rg8MAayRBOZv1aa3j2b8wuK/VL+FrVPW0cAyhaX+T1Uu GfTPxoy1TcWtafKGbvuSLRIbVhTpxSdNG2UgF/RGc9OMNOD2FK4hdXhGGta/nLzxcqA/kVpmdfE 4/8vQn0sfSfh37B3OFEQ0ramI0lmUSZrQMkRG4xd5oQWaCKBrGmnf4M0LwP5w4lV7q6Fb2A86d7 l1oc6HxICrkXwJj4OfE6RKe2fsH2FnSUZ9KlEh9GoCILlaImczTaysS+FOV2hnScYdxReuT+Z25 9lLB+25gSfVOzY3PK0wuYhaMi94GHvfbIO/9ZBg15Hsx2B4MQRVr8lJF773tv4QI/Us/sop5KUy XgHzhiKXR0+t41vcyc9qJgMA= X-Google-Smtp-Source: AGHT+IG8r/MCEHNzSQ5BGqRl+m2UokCyQfxstG/mthNpbTEWTCy0p07qQ5CFnX8ov8CFEYVmvgmH/A== X-Received: by 2002:a05:651c:30c6:b0:32a:681f:696e with SMTP id 38308e7fff4ca-32a8ce5d659mr52521281fa.37.1748962195426; Tue, 03 Jun 2025 07:49:55 -0700 (PDT) From: "Edgar E. Iglesias" To: xen-devel@lists.xenproject.org Cc: sstabellini@kernel.org, julien@xen.org, bertrand.marquis@arm.com, michal.orzel@amd.com, Volodymyr_Babchuk@epam.com, andrew.cooper3@citrix.com, edgar.iglesias@amd.com, Anthony PERARD , Juergen Gross Subject: [PATCH v4 3/5] tools/arm: Add the trap_unmapped_accesses xl config option Date: Tue, 3 Jun 2025 16:49:46 +0200 Message-ID: <20250603144948.1685047-4-edgar.iglesias@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250603144948.1685047-1-edgar.iglesias@gmail.com> References: <20250603144948.1685047-1-edgar.iglesias@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1748962219753116600 Content-Type: text/plain; charset="utf-8" From: "Edgar E. Iglesias" Reviewed-by: Stefano Stabellini Signed-off-by: Edgar E. Iglesias --- docs/man/xl.cfg.5.pod.in | 9 +++++++++ tools/include/libxl.h | 7 +++++++ tools/libs/light/libxl_arm.c | 6 +++--- tools/libs/light/libxl_create.c | 3 +++ tools/libs/light/libxl_types.idl | 1 + tools/libs/light/libxl_x86.c | 6 ++++++ tools/xl/xl_parse.c | 3 +++ 7 files changed, 32 insertions(+), 3 deletions(-) diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index c388899306..075e89e6d2 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -3056,6 +3056,15 @@ will be used for the domain. Otherwise, the value sp= ecified by the `nr_spis` parameter will be used. The number of SPIs should match the highest interr= upt ID that will be assigned to the domain. =20 +=3Ditem B + +An Optional boolean parameter that configures handling of accesses to unma= pped +address ranges. If enabled, guest accesses will trap. If disabled, guest +accesses will read all bits as ones, e.g 0xFFFFFFFF for a 32bit access and +writes will be ignored. + +This option is only implemented for Arm where the default is enabled. + =3Dback =20 =3Dhead3 x86 diff --git a/tools/include/libxl.h b/tools/include/libxl.h index b7ad7735ca..24c81cf145 100644 --- a/tools/include/libxl.h +++ b/tools/include/libxl.h @@ -549,6 +549,13 @@ */ #define LIBXL_HAVE_VPMU 1 =20 +/* + * LIBXL_HAVE_TRAP_UNMAPPED_ACCESSES indicates that libxl_domain_build_info + * has a trap_unmapped_accesses parameter, which allows the control of how + * accesses to unmapped adresses behave. + */ +#define LIBXL_HAVE_TRAP_UNMAPPED_ACCESSES 1 + /* * LIBXL_HAVE_PHYSINFO_CAP_GNTTAB indicates that libxl_physinfo has a * cap_gnttab_v1/2 fields, which indicates the available grant table ABIs. diff --git a/tools/libs/light/libxl_arm.c b/tools/libs/light/libxl_arm.c index 9530996e72..afc62a5299 100644 --- a/tools/libs/light/libxl_arm.c +++ b/tools/libs/light/libxl_arm.c @@ -233,9 +233,6 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, config->arch.sve_vl =3D d_config->b_info.arch_arm.sve_vl / 128U; } =20 - /* Trap accesses to unmapped areas. */ - config->flags |=3D XEN_DOMCTL_CDF_trap_unmapped_accesses; - return 0; } =20 @@ -1714,6 +1711,9 @@ int libxl__arch_domain_build_info_setdefault(libxl__g= c *gc, /* ACPI is disabled by default */ libxl_defbool_setdefault(&b_info->acpi, false); =20 + /* Trapping of unmapped accesses enabled by default. */ + libxl_defbool_setdefault(&b_info->trap_unmapped_accesses, true); + /* Sanitise SVE parameter */ if (b_info->arch_arm.sve_vl) { unsigned int max_sve_vl =3D diff --git a/tools/libs/light/libxl_create.c b/tools/libs/light/libxl_creat= e.c index 8bc768b515..625ce5b040 100644 --- a/tools/libs/light/libxl_create.c +++ b/tools/libs/light/libxl_create.c @@ -605,6 +605,9 @@ int libxl__domain_make(libxl__gc *gc, libxl_domain_conf= ig *d_config, if (libxl_defbool_val(b_info->vpmu)) create.flags |=3D XEN_DOMCTL_CDF_vpmu; =20 + if (libxl_defbool_val(b_info->trap_unmapped_accesses)) + create.flags |=3D XEN_DOMCTL_CDF_trap_unmapped_accesses; + assert(info->passthrough !=3D LIBXL_PASSTHROUGH_DEFAULT); LOG(DETAIL, "passthrough: %s", libxl_passthrough_to_string(info->passthrough)); diff --git a/tools/libs/light/libxl_types.idl b/tools/libs/light/libxl_type= s.idl index 1985153830..57ae16ae78 100644 --- a/tools/libs/light/libxl_types.idl +++ b/tools/libs/light/libxl_types.idl @@ -736,6 +736,7 @@ libxl_domain_build_info =3D Struct("domain_build_info",[ ("vmtrace_buf_kb", integer), =20 ("vpmu", libxl_defbool), + ("trap_unmapped_accesses", libxl_defbool), =20 ], dir=3DDIR_IN, copy_deprecated_fn=3D"libxl__domain_build_info_copy_deprecated", diff --git a/tools/libs/light/libxl_x86.c b/tools/libs/light/libxl_x86.c index 867addfcab..60d4e8661c 100644 --- a/tools/libs/light/libxl_x86.c +++ b/tools/libs/light/libxl_x86.c @@ -26,6 +26,11 @@ int libxl__arch_domain_prepare_config(libxl__gc *gc, if (libxl_defbool_val(d_config->b_info.arch_x86.msr_relaxed)) config->arch.misc_flags |=3D XEN_X86_MSR_RELAXED; =20 + if (libxl_defbool_val(d_config->b_info.trap_unmapped_accesses)) { + LOG(ERROR, "trap_unmapped_accesses is not supported on x86\n"); + return ERROR_FAIL; + } + return 0; } =20 @@ -813,6 +818,7 @@ int libxl__arch_domain_build_info_setdefault(libxl__gc = *gc, { libxl_defbool_setdefault(&b_info->acpi, true); libxl_defbool_setdefault(&b_info->arch_x86.msr_relaxed, false); + libxl_defbool_setdefault(&b_info->trap_unmapped_accesses, false); =20 if (b_info->type =3D=3D LIBXL_DOMAIN_TYPE_HVM) { /* diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c index 219e924779..98b3612d0f 100644 --- a/tools/xl/xl_parse.c +++ b/tools/xl/xl_parse.c @@ -2972,6 +2972,9 @@ skip_usbdev: if (!xlu_cfg_get_long (config, "nr_spis", &l, 0)) b_info->arch_arm.nr_spis =3D l; =20 + xlu_cfg_get_defbool(config, "trap_unmapped_accesses", + &b_info->trap_unmapped_accesses, 0); + parse_vkb_list(config, d_config); =20 d_config->virtios =3D NULL; --=20 2.43.0 From nobody Fri Oct 31 09:50:36 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1748962221; cv=none; d=zohomail.com; s=zohoarc; b=TfoAJXaDSU9OvceBpQx3DM/ARJQiMTkcNQ3XE6oVDKSyrkgoqB9wrqpIBoZjUS9Ucye9IX6Ylq6Zqf+601bzcqYp+I5yif8fxeD6tEimGdDKscowLqi+XeDA9bJ7y05egpI8j1vaEZhiZcpEZ0LTIMjLkUZWxmvlkNoB2qAEHtY= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748962221; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=8Rv9jkk9a7Mmckdgwtv3pi1GijaKXKBiRxq1uzaztv4=; b=GQ8CEUS4nhu15Rh6Qjm8dIW9UX/R5cIG8vY5iN1jMKC4QRh+cluiHlSKts/nY+0G6hoHC4rot4XdGHb4OcYXqXkHUo+30fVuag2CmmkhAfZetmYIV7EcdfXwykcmUyPysPvyH9ORfrcSh3qWPW6yknipoBBezqBC3BtAvTYEUVs= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748962221378830.4416486740893; Tue, 3 Jun 2025 07:50:21 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1004561.1384317 (Exim 4.92) (envelope-from ) id 1uMSxk-0006xt-3u; Tue, 03 Jun 2025 14:50:00 +0000 Received: by outflank-mailman (output) from mailman id 1004561.1384317; Tue, 03 Jun 2025 14:50:00 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxk-0006xi-0S; Tue, 03 Jun 2025 14:50:00 +0000 Received: by outflank-mailman (input) for mailman id 1004561; Tue, 03 Jun 2025 14:49:58 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxi-00060n-G3 for xen-devel@lists.xenproject.org; Tue, 03 Jun 2025 14:49:58 +0000 Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com [2a00:1450:4864:20::135]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 04e74a9c-408a-11f0-a300-13f23c93f187; Tue, 03 Jun 2025 16:49:58 +0200 (CEST) Received: by mail-lf1-x135.google.com with SMTP id 2adb3069b0e04-5532a30ac41so6587144e87.0 for ; Tue, 03 Jun 2025 07:49:58 -0700 (PDT) Received: from gmail.com (213-67-3-247-no600.tbcn.telia.com. [213.67.3.247]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55337937409sm1926383e87.213.2025.06.03.07.49.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Jun 2025 07:49:55 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 04e74a9c-408a-11f0-a300-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1748962197; x=1749566997; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=8Rv9jkk9a7Mmckdgwtv3pi1GijaKXKBiRxq1uzaztv4=; b=FryjlqXvPvaOSRJF9986RbyZ9g9VnxhhzDqBlwGAArYETqcwI+ZPuyZxtX31LYF0qs 5Tr6tB9QRTxJEQ78B21iuiqMkgfKhXBtu8obA8A4KJsZY8eYxq1THEa/lhNFjVT/NoUF h2SSnMHMe/3RzhRyqCSffeMhaU63JlEHQQ/gIe06BK+Efa8LK3Ie3NOyP+rhdccpEGm5 0o5e31Y8p5MXssdoD8uhvVWq5TE2i/OuWRCQv97awg0683Q/jXck1+k3rlfsnHjIcwEe 4LuKZ9BEn9x9M2tDZYHDizdpCO+l13QZkKtnfiu7kksOtCOe2o0WbihA9vFGb7Cep7vc EfuQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1748962197; x=1749566997; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=8Rv9jkk9a7Mmckdgwtv3pi1GijaKXKBiRxq1uzaztv4=; b=DTh+l7074sLXUbO2ob99odm1QkyDf9E8TYBZDTh8M5+il3cqK8xLCB70sJGWYWWG0L dKTFaCqfJbDq92k0NLaDvsdr+19iDBkLica1Of+PgO8/2BjLt15ycRzoHkUCXB/c9YT6 3rq6eyAD9Wr8fXremDfCg6FBFrhZPLW7tLO8oVVwpJ37D5VtAK6V7I/N5Wo5WhmtBmsq Mvxx5TafBsRgXBnBufvUzN1nqJTzvmpT4qqjGd4GrREIbsyeav40R4vhCya7o+YUc2t2 mSccTs7J85gJse1IdOx+o1jr7ZpfueH315sjwKoTDdkDC/qNFAXy6RISXE+YY3/u103j Jp1Q== X-Gm-Message-State: AOJu0YyMjmwOQ82uQrWt31QHjy1QhB31M+gDElFYZvbsjCX5uFt5nIrY NrGA1Wus7yEgRhupO2MP4cqbKJ58IvljVvHCYtIbpjqxcdoYt+FBPJMQmiyvspglmlE= X-Gm-Gg: ASbGncuVSnTEqTS96P2CoA6OWlOfeqStzGyEFGFBq2RvnawOWcjGZzNn1ZE1G4gCW7V ubEqoWQTGbLTWGVOLvOCJW1epiAe2gjNuGk2tiO3sGfuWmqIRNOkPqYrVJoHz+0vzVa5rhWi3In 35jTtb4oQ0sAMm5pGoyvoA822/33LpzDG6CQ28vQlE4mt0VRz6J5s8N4e8M+xmGnavaDHt1ew+y HNZWMTZECB+wRM17t2PNlWQDdC1LAaPndcZu67juANc4XKAtBLLc4mLrZdP6Ob7fQ3WIY8W59cV o2qWIbavleaTI+GcEgmqgGjTmPMWU3uH7td6IxrPdp/nPWPG4GC9wtwaBY1tlEjjX5875xQvHbF bN6B1xaS5WjMc434LK41UCrM= X-Google-Smtp-Source: AGHT+IH8/jb/PldOgmQh1jF9CunVlSSRPSF7jucpLmiTBONZ2toTWA1eabhva7I9GfIVjFLmvX3g4A== X-Received: by 2002:a05:6512:3d2a:b0:553:35c4:db08 with SMTP id 2adb3069b0e04-5533b908034mr5543769e87.30.1748962196978; Tue, 03 Jun 2025 07:49:56 -0700 (PDT) From: "Edgar E. Iglesias" To: xen-devel@lists.xenproject.org Cc: sstabellini@kernel.org, julien@xen.org, bertrand.marquis@arm.com, michal.orzel@amd.com, Volodymyr_Babchuk@epam.com, andrew.cooper3@citrix.com, edgar.iglesias@amd.com, Christian Lindig , Christian Lindig , David Scott , Anthony PERARD Subject: [PATCH v4 4/5] tools/ocaml: Update bindings for CDF_TRAP_UNMAPPED_ACCESSES Date: Tue, 3 Jun 2025 16:49:47 +0200 Message-ID: <20250603144948.1685047-5-edgar.iglesias@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250603144948.1685047-1-edgar.iglesias@gmail.com> References: <20250603144948.1685047-1-edgar.iglesias@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1748962223512116600 Content-Type: text/plain; charset="utf-8" From: "Edgar E. Iglesias" Acked-by: Christian Lindig Signed-off-by: Edgar E. Iglesias --- tools/ocaml/libs/xc/xenctrl.ml | 1 + tools/ocaml/libs/xc/xenctrl.mli | 1 + 2 files changed, 2 insertions(+) diff --git a/tools/ocaml/libs/xc/xenctrl.ml b/tools/ocaml/libs/xc/xenctrl.ml index 2690f9a923..7e1aabad6c 100644 --- a/tools/ocaml/libs/xc/xenctrl.ml +++ b/tools/ocaml/libs/xc/xenctrl.ml @@ -70,6 +70,7 @@ type domain_create_flag =3D | CDF_IOMMU | CDF_NESTED_VIRT | CDF_VPMU + | CDF_TRAP_UNMAPPED_ACCESSES =20 type domain_create_iommu_opts =3D | IOMMU_NO_SHAREPT diff --git a/tools/ocaml/libs/xc/xenctrl.mli b/tools/ocaml/libs/xc/xenctrl.= mli index febbe1f6ae..f44dba61ae 100644 --- a/tools/ocaml/libs/xc/xenctrl.mli +++ b/tools/ocaml/libs/xc/xenctrl.mli @@ -63,6 +63,7 @@ type domain_create_flag =3D | CDF_IOMMU | CDF_NESTED_VIRT | CDF_VPMU + | CDF_TRAP_UNMAPPED_ACCESSES =20 type domain_create_iommu_opts =3D | IOMMU_NO_SHAREPT --=20 2.43.0 From nobody Fri Oct 31 09:50:36 2025 Delivered-To: importer@patchew.org Received-SPF: pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass(p=none dis=none) header.from=gmail.com ARC-Seal: i=1; a=rsa-sha256; t=1748962217; cv=none; d=zohomail.com; s=zohoarc; b=CAZ/A8k7ef13ZiAjJrE73qnNxN1FZU997uS/JhLIV9fE821KvIvN/KAJuiYtmeOfLa9TA7Z1tFJe0Sq1Jqw9K5jpr0EKXFCranmNqkDzUk09t13TlNg33Nj+fzYTuC10Wu4r79+a/zgjFopYbl2E9f+tIvkfLaZDo2UM3fcBCr8= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1748962217; h=Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:Subject:To:To:Message-Id:Reply-To; bh=vQZpCaGwN67bAjam9mj+oezbvKc88yCztRac3tGbr1g=; b=ZT/vgjWlzBoh0SDoBDzP3gKcrnDGEUpChMsKyeRYoeAHM4M0f63zZj9gKJSLU7n637VT37vDyQvsQeQGZVuJGpWRFsLAQXq0Ehp/thRkvCHj3dtOzNTJYIjaiBBxpXI1PTWXA5ygX9o50pLcNLh5PxeegNq4WKOA7yZTsTzIItA= ARC-Authentication-Results: i=1; mx.zohomail.com; dkim=pass; spf=pass (zohomail.com: domain of lists.xenproject.org designates 192.237.175.120 as permitted sender) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=pass header.from= (p=none dis=none) Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1748962217448507.5060801999347; Tue, 3 Jun 2025 07:50:17 -0700 (PDT) Received: from list by lists.xenproject.org with outflank-mailman.1004562.1384328 (Exim 4.92) (envelope-from ) id 1uMSxm-0007Og-Gv; Tue, 03 Jun 2025 14:50:02 +0000 Received: by outflank-mailman (output) from mailman id 1004562.1384328; Tue, 03 Jun 2025 14:50:02 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxm-0007OJ-Dn; Tue, 03 Jun 2025 14:50:02 +0000 Received: by outflank-mailman (input) for mailman id 1004562; Tue, 03 Jun 2025 14:50:00 +0000 Received: from se1-gles-sth1-in.inumbo.com ([159.253.27.254] helo=se1-gles-sth1.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1uMSxk-00060n-3P for xen-devel@lists.xenproject.org; Tue, 03 Jun 2025 14:50:00 +0000 Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [2a00:1450:4864:20::12f]) by se1-gles-sth1.inumbo.com (Halon) with ESMTPS id 05dc7897-408a-11f0-a300-13f23c93f187; Tue, 03 Jun 2025 16:49:59 +0200 (CEST) Received: by mail-lf1-x12f.google.com with SMTP id 2adb3069b0e04-54afb5fcebaso7319233e87.3 for ; Tue, 03 Jun 2025 07:49:59 -0700 (PDT) Received: from gmail.com (213-67-3-247-no600.tbcn.telia.com. [213.67.3.247]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-55350cab690sm450214e87.53.2025.06.03.07.49.57 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 03 Jun 2025 07:49:57 -0700 (PDT) X-Outflank-Mailman: Message body and most headers restored to incoming version X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 05dc7897-408a-11f0-a300-13f23c93f187 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1748962199; x=1749566999; darn=lists.xenproject.org; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:from:to:cc:subject:date :message-id:reply-to; bh=vQZpCaGwN67bAjam9mj+oezbvKc88yCztRac3tGbr1g=; b=PVpp1t+w6flUgorB/q0H5JkTZRl43mbgRsV3vvqaPpb4mTkXxdMoY2Xc2ORlO9vZmc 69kvN5NHEV6ocZAs2P4KF0RMPTT3t0LwL1SYSVacUPVuUzKfPxBcl/YsgqUJX3Akq77H V5m8g732OPVlPEEOwMXSviGwjrIcTCd77zA3/QXIMOQZhE5NcdDrphhWDhJYISSvzhES wpHT2MJlPYASUFWs7wewsyKSyFGgcfJ5CH/rlXGzgTNTfjcOE2MBLAmKBed3AwY15KKe bcyDlRANoSvXRAjc3Co+dcLHv2G82koi2daZiIk6JoUcKbZPNJ6tmZrcgG8yYWEWFEWn p3VA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1748962199; x=1749566999; h=content-transfer-encoding:mime-version:references:in-reply-to :message-id:date:subject:cc:to:from:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=vQZpCaGwN67bAjam9mj+oezbvKc88yCztRac3tGbr1g=; b=mQykN1m2NY5cgaKpKravjl54bsILQwk5T9K2PUMdNri/vu+VwisTJ0YiGwinOPbuV7 iZsMevlOVZXZG/JgjXWQg7iI0Stm8UkfcdEvcMNWApQcjtU6HgzOA4kwxNPTUfi/qypY 1R7rVcF31Z/KzEvW7LlILlC6rq6zCGxN8pK+2dTEYa9aSh3Hob8msgCXdNejazOmRpW6 rUvxWdyXmtQhd+e6iE+iIViAv/nweNP9MQih7JpzvGFLQn3VIE+rdqgiSszZj2eccthv LGWSm1xUQGJo7LQS19YVzQ4XsfVY+uqFwkrY7r1ZLgfHpaiz4WZkC9nGFHpwGSoKDfBH ZzHg== X-Gm-Message-State: AOJu0Yx1hWEfHe+pKA868+ILzDxltM/aLjsCyDqIvlDJwGfvvTrqSOAD tVs9kqCxVZrk35hJX44rd3ocfi7G7K6vgnwx6aatZXWlc+XF2dWyBu2+FGvDfSL9r4A= X-Gm-Gg: ASbGncvn8zQRoe8q+avk/EIsXhxCBANu9O705YFEBGtM6xYGuKdSlnuUUtmw7OU0cc5 /y3wAXTIZqa1i8po9u6BtqBlGnNF09865+dXtDz7XZj9/Vsxqq4DT4HxH31Hnv628DHJocuN/0A 2ZsPq4LsqP8YAEEdD3tBEzjftC098miyw3OgMPm0+zb9NTCfUXSm8FMrxkFDbXL7x4X9cRI+yZD 7f8Q2ox+7CjbX19LDhXHfXuX+l+NO4czDWlQnCeE0T+Qp+1cMMH1ij4ul3fQYUg7ZnX5Lk6UwbE j+qFlWU00IEge0AXP3DpRlnLuRUJXy7u0fuBsQM8JDux/u5a774JyAmG723S21Pvpnm8yDSgaus Rjhk/4+JJBg1WiU6oeqi7lNBMQiIDaFplkw== X-Google-Smtp-Source: AGHT+IGGQ7NvgDsfuiAWCA46sv02b09CkDopMWaZ/5Lkp1s7+9CQeYnYoAEWbBDrB5w+u3eS1tdXLQ== X-Received: by 2002:a05:6512:2203:b0:553:3303:471 with SMTP id 2adb3069b0e04-5533b90af1emr4945561e87.30.1748962198615; Tue, 03 Jun 2025 07:49:58 -0700 (PDT) From: "Edgar E. Iglesias" To: xen-devel@lists.xenproject.org Cc: sstabellini@kernel.org, julien@xen.org, bertrand.marquis@arm.com, michal.orzel@amd.com, Volodymyr_Babchuk@epam.com, andrew.cooper3@citrix.com, edgar.iglesias@amd.com, Nick Rosbrook , George Dunlap , Anthony PERARD Subject: [PATCH v4 5/5] tools/golang: Regenerate bindings for trap_unmapped_accesses Date: Tue, 3 Jun 2025 16:49:48 +0200 Message-ID: <20250603144948.1685047-6-edgar.iglesias@gmail.com> X-Mailer: git-send-email 2.43.0 In-Reply-To: <20250603144948.1685047-1-edgar.iglesias@gmail.com> References: <20250603144948.1685047-1-edgar.iglesias@gmail.com> MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable X-ZohoMail-DKIM: pass (identity @gmail.com) X-ZM-MESSAGEID: 1748962219493116600 Content-Type: text/plain; charset="utf-8" From: "Edgar E. Iglesias" Signed-off-by: Edgar E. Iglesias --- tools/golang/xenlight/helpers.gen.go | 6 ++++++ tools/golang/xenlight/types.gen.go | 1 + 2 files changed, 7 insertions(+) diff --git a/tools/golang/xenlight/helpers.gen.go b/tools/golang/xenlight/h= elpers.gen.go index 90846ea8e8..191be87297 100644 --- a/tools/golang/xenlight/helpers.gen.go +++ b/tools/golang/xenlight/helpers.gen.go @@ -1170,6 +1170,9 @@ x.Altp2M =3D Altp2MMode(xc.altp2m) x.VmtraceBufKb =3D int(xc.vmtrace_buf_kb) if err :=3D x.Vpmu.fromC(&xc.vpmu);err !=3D nil { return fmt.Errorf("converting field Vpmu: %v", err) +} +if err :=3D x.TrapUnmappedAccesses.fromC(&xc.trap_unmapped_accesses);err != =3D nil { +return fmt.Errorf("converting field TrapUnmappedAccesses: %v", err) } =20 return nil} @@ -1695,6 +1698,9 @@ xc.altp2m =3D C.libxl_altp2m_mode(x.Altp2M) xc.vmtrace_buf_kb =3D C.int(x.VmtraceBufKb) if err :=3D x.Vpmu.toC(&xc.vpmu); err !=3D nil { return fmt.Errorf("converting field Vpmu: %v", err) +} +if err :=3D x.TrapUnmappedAccesses.toC(&xc.trap_unmapped_accesses); err != =3D nil { +return fmt.Errorf("converting field TrapUnmappedAccesses: %v", err) } =20 return nil diff --git a/tools/golang/xenlight/types.gen.go b/tools/golang/xenlight/typ= es.gen.go index e7667f1ce3..656933c6c9 100644 --- a/tools/golang/xenlight/types.gen.go +++ b/tools/golang/xenlight/types.gen.go @@ -606,6 +606,7 @@ MsrRelaxed Defbool Altp2M Altp2MMode VmtraceBufKb int Vpmu Defbool +TrapUnmappedAccesses Defbool } =20 type DomainBuildInfoTypeUnion interface { --=20 2.43.0