From nobody Fri Apr 26 01:17:01 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1565137462; cv=none; d=zoho.com; s=zohoarc; b=DSk4PtTEbUVcEKwIieRXhQ6LNDVoP5u5dZJEI1r67f405VzWotXFET4xISHy6Mo+oQ/TM+lmI2UFEH5aO8I6lzRp0pUmDRywpGyy5+XCbXGjSvjcOxHHnnnJf+kw/eBJzJGq+Nba8rSLnz2fKkemC3HZNpyHRhdh0hs0FLB+204= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1565137462; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=PPSwb3A2a3LfMQpaHSyGYrAs5dQ+XHanEP3PhKBEn0A=; b=noTb2vZZU9PeKy+pWcv9xTrP/7DNJNe/8vhH6UITBp83/JAK/cx3mLh8vUpfKjxVZ/nKbigZljETBB+dmZVEBnN9nttYFMOFPydSdoctn/6VLO3rk3XdaukQUcL5mECPxolBpAQ/oYPRvTNII+CfbDqBp9/ykRsnt6/IVMIGv4U= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1565137462899744.7094958817823; Tue, 6 Aug 2019 17:24:22 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jX-0004do-7Y; Wed, 07 Aug 2019 00:23:15 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jW-0004dX-49 for xen-devel@lists.xenproject.org; Wed, 07 Aug 2019 00:23:14 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 8a9f5071-b8a9-11e9-8980-bc764e045a96; Wed, 07 Aug 2019 00:23:12 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s.xilinx.com (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 38E33214C6; Wed, 7 Aug 2019 00:23:12 +0000 (UTC) X-Inumbo-ID: 8a9f5071-b8a9-11e9-8980-bc764e045a96 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565137392; bh=jDipdn+4VUYW2qZ4ApT2mSbJxsiNklXhSAwqKIj+xQA=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=yUnkcD3+V5WHqogYv3QNC6vpxa1WpIM2Gs0r7tKjsSz25Zf0Mxj7I1RTzk/wAG61O r33G3Yjo8WopagOwTTdqArqeMJdkGJTT9mBKSnKqOa5qldtD5/aDTm8itSeM7Z0n0D h3wvKfrSPdjAHfi0C3ibXUctEEViDU/SQ2W2Dkh8= From: Stefano Stabellini To: xen-devel@lists.xenproject.org Date: Tue, 6 Aug 2019 17:23:06 -0700 Message-Id: <20190807002311.9906-1-sstabellini@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Subject: [Xen-devel] [PATCH v4 1/6] xen/arm: introduce p2m_is_mmio X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , julien.grall@arm.com, sstabellini@kernel.org MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Add a p2m_is_mmio macro for easy checkings. Signed-off-by: Stefano Stabellini Acked-by: Julien Grall --- xen/include/asm-arm/p2m.h | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h index 03f2ee75c1..31902317da 100644 --- a/xen/include/asm-arm/p2m.h +++ b/xen/include/asm-arm/p2m.h @@ -132,6 +132,11 @@ typedef enum { #define P2M_RAM_TYPES (p2m_to_mask(p2m_ram_rw) | \ p2m_to_mask(p2m_ram_ro)) =20 +/* MMIO types */ +#define P2M_MMIO_TYPES (p2m_to_mask(p2m_mmio_direct_dev) | \ + p2m_to_mask(p2m_mmio_direct_nc) | \ + p2m_to_mask(p2m_mmio_direct_c)) + /* Grant mapping types, which map to a real frame in another VM */ #define P2M_GRANT_TYPES (p2m_to_mask(p2m_grant_map_rw) | \ p2m_to_mask(p2m_grant_map_ro)) @@ -146,6 +151,7 @@ typedef enum { #define p2m_is_any_ram(_t) (p2m_to_mask(_t) & \ (P2M_RAM_TYPES | P2M_GRANT_TYPES | \ P2M_FOREIGN_TYPES)) +#define p2m_is_mmio(_t) (p2m_to_mask(_t) & P2M_MMIO_TYPES) =20 /* All common type definitions should live ahead of this inclusion. */ #ifdef _XEN_P2M_COMMON_H --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel From nobody Fri Apr 26 01:17:01 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1565137480; cv=none; d=zoho.com; s=zohoarc; b=PlmcJPPNp6xVOHd3CvTwIv73TUJW22RyqtvONkyGKdBOMPMLkkNuPpuXugG0o4DvoLPS/qb8Qm7nEFUCQF8uyb3dbP9CPQc3NCgpPzmoUF8XRFwjAr3BfnrMdZlfxKbPDsQziloZCKystXsqk9fQzsiVHmO+JhRoPzOFZUNzzak= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1565137480; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=ndbdtBIdA0wDKMp2j0YmUn5poxuRvW4sg7Yjt2XHMfg=; b=hFwVGY5XXJO8SDRoR7rbJ6hh75r1r0uPpfuKCzA/NqHzNtmw6krYxORKjb57HAQOnkAo5f97nczFgI3amWEY//dLU/smUVmvJwa1PllKaBuGfj10EsnmCKOZDpepIiTZ1OAN8F10kakdSQxUgQAX8fOIt0cgjOAvqjyHqpzgB3M= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1565137480425420.12454770982697; Tue, 6 Aug 2019 17:24:40 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jY-0004es-2e; Wed, 07 Aug 2019 00:23:16 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jX-0004dm-8s for xen-devel@lists.xenproject.org; Wed, 07 Aug 2019 00:23:15 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 8aea54ed-b8a9-11e9-8980-bc764e045a96; Wed, 07 Aug 2019 00:23:13 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s.xilinx.com (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 94E6E21743; Wed, 7 Aug 2019 00:23:12 +0000 (UTC) X-Inumbo-ID: 8aea54ed-b8a9-11e9-8980-bc764e045a96 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565137392; bh=kySvefi7qf7TmYa7lUBxuohtznj99+jY/nnCVAYolso=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=lJ4Za2uWN/5ocCupfWUUp1vld+jOORX82t2FCIuBA7ZCLGh+yiBZS96eHsOSqTM9o VHJIDV+RZ44Z1q5t8frjjIyTGrviKzZkrHU/x7FzdDjrx7+jO4Ix/93R1Jjo06++nO /k17L1pP5Yah1pb2jkn4I87VFDqqSWkunzEKAcCM= From: Stefano Stabellini To: xen-devel@lists.xenproject.org Date: Tue, 6 Aug 2019 17:23:07 -0700 Message-Id: <20190807002311.9906-2-sstabellini@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Subject: [Xen-devel] [PATCH v4 2/6] xen: add a p2mt parameter to map_mmio_regions X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , julien.grall@arm.com, sstabellini@kernel.org, JBeulich@suse.com, andrew.cooper3@citrix.com MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Add a p2mt parameter to map_mmio_regions, pass p2m_mmio_direct_dev on ARM and p2m_mmio_direct on x86 -- no changes in behavior. On x86, introduce a macro to strip away the last parameter and rename the existing implementation of map_mmio_regions to map_mmio_region. Use map_mmio_region in vpci as it is x86-only today. On ARM, given the similarity between map_mmio_regions after the change and map_regions_p2mt, remove un/map_regions_p2mt. Also add an ASSERT to check that only p2m_mmio_* types are passed to it. Also fix the style of the comment on top of map_mmio_regions since we are at it. Signed-off-by: Stefano Stabellini CC: JBeulich@suse.com CC: andrew.cooper3@citrix.com --- Changes in v4: - rename __map_mmio_regions to map_mmio_region - use p2m_is_mmio Changes in v3: - code style - introduce __map_mmio_regions on x86 - fix comment style on top of map_mmio_regions - add an assert on allowed p2mt types in map_mmio_regions Changes in v2: - new patch --- xen/arch/arm/acpi/domain_build.c | 4 ++-- xen/arch/arm/domain_build.c | 2 +- xen/arch/arm/gic-v2.c | 3 ++- xen/arch/arm/p2m.c | 19 ++----------------- xen/arch/arm/platforms/exynos5.c | 6 ++++-- xen/arch/arm/platforms/omap5.c | 12 ++++++++---- xen/arch/arm/traps.c | 2 +- xen/arch/arm/vgic-v2.c | 2 +- xen/arch/arm/vgic/vgic-v2.c | 2 +- xen/arch/x86/hvm/dom0_build.c | 2 +- xen/arch/x86/mm/p2m.c | 8 ++++---- xen/common/domctl.c | 7 ++++++- xen/drivers/vpci/header.c | 2 +- xen/include/asm-arm/p2m.h | 15 --------------- xen/include/asm-x86/p2m.h | 8 ++++++++ xen/include/xen/p2m-common.h | 11 +++++++---- 16 files changed, 49 insertions(+), 56 deletions(-) diff --git a/xen/arch/arm/acpi/domain_build.c b/xen/arch/arm/acpi/domain_bu= ild.c index 1b1cfabb00..09f91cc8bf 100644 --- a/xen/arch/arm/acpi/domain_build.c +++ b/xen/arch/arm/acpi/domain_build.c @@ -193,7 +193,7 @@ static void __init acpi_map_other_tables(struct domain = *d) { addr =3D acpi_gbl_root_table_list.tables[i].address; size =3D acpi_gbl_root_table_list.tables[i].length; - res =3D map_regions_p2mt(d, + res =3D map_mmio_regions(d, gaddr_to_gfn(addr), PFN_UP(size), maddr_to_mfn(addr), @@ -547,7 +547,7 @@ int __init prepare_acpi(struct domain *d, struct kernel= _info *kinfo) acpi_create_efi_mmap_table(d, &kinfo->mem, tbl_add); =20 /* Map the EFI and ACPI tables to Dom0 */ - rc =3D map_regions_p2mt(d, + rc =3D map_mmio_regions(d, gaddr_to_gfn(d->arch.efi_acpi_gpa), PFN_UP(d->arch.efi_acpi_len), virt_to_mfn(d->arch.efi_acpi_table), diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c index 4c8404155a..544b0040ce 100644 --- a/xen/arch/arm/domain_build.c +++ b/xen/arch/arm/domain_build.c @@ -1168,7 +1168,7 @@ static int __init map_range_to_domain(const struct dt= _device_node *dev, =20 if ( need_mapping ) { - res =3D map_regions_p2mt(d, + res =3D map_mmio_regions(d, gaddr_to_gfn(addr), PFN_UP(len), maddr_to_mfn(addr), diff --git a/xen/arch/arm/gic-v2.c b/xen/arch/arm/gic-v2.c index 256988c665..d2ef361fc7 100644 --- a/xen/arch/arm/gic-v2.c +++ b/xen/arch/arm/gic-v2.c @@ -701,7 +701,8 @@ static int gicv2_map_hwdown_extra_mappings(struct domai= n *d) =20 ret =3D map_mmio_regions(d, gaddr_to_gfn(v2m_data->addr), PFN_UP(v2m_data->size), - maddr_to_mfn(v2m_data->addr)); + maddr_to_mfn(v2m_data->addr), + p2m_mmio_direct_dev); if ( ret ) { printk(XENLOG_ERR "GICv2: Map v2m frame to d%d failed.\n", diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c index e28ea1c85a..4b26bca92a 100644 --- a/xen/arch/arm/p2m.c +++ b/xen/arch/arm/p2m.c @@ -1310,31 +1310,16 @@ static inline int p2m_remove_mapping(struct domain = *d, return rc; } =20 -int map_regions_p2mt(struct domain *d, +int map_mmio_regions(struct domain *d, gfn_t gfn, unsigned long nr, mfn_t mfn, p2m_type_t p2mt) { + ASSERT(p2m_is_mmio(p2mt)); return p2m_insert_mapping(d, gfn, nr, mfn, p2mt); } =20 -int unmap_regions_p2mt(struct domain *d, - gfn_t gfn, - unsigned long nr, - mfn_t mfn) -{ - return p2m_remove_mapping(d, gfn, nr, mfn); -} - -int map_mmio_regions(struct domain *d, - gfn_t start_gfn, - unsigned long nr, - mfn_t mfn) -{ - return p2m_insert_mapping(d, start_gfn, nr, mfn, p2m_mmio_direct_dev); -} - int unmap_mmio_regions(struct domain *d, gfn_t start_gfn, unsigned long nr, diff --git a/xen/arch/arm/platforms/exynos5.c b/xen/arch/arm/platforms/exyn= os5.c index 6560507092..97cd080759 100644 --- a/xen/arch/arm/platforms/exynos5.c +++ b/xen/arch/arm/platforms/exynos5.c @@ -83,11 +83,13 @@ static int exynos5250_specific_mapping(struct domain *d) { /* Map the chip ID */ map_mmio_regions(d, gaddr_to_gfn(EXYNOS5_PA_CHIPID), 1, - maddr_to_mfn(EXYNOS5_PA_CHIPID)); + maddr_to_mfn(EXYNOS5_PA_CHIPID), + p2m_mmio_direct_dev); =20 /* Map the PWM region */ map_mmio_regions(d, gaddr_to_gfn(EXYNOS5_PA_TIMER), 2, - maddr_to_mfn(EXYNOS5_PA_TIMER)); + maddr_to_mfn(EXYNOS5_PA_TIMER), + p2m_mmio_direct_dev); =20 return 0; } diff --git a/xen/arch/arm/platforms/omap5.c b/xen/arch/arm/platforms/omap5.c index aee24e4d28..c5701dfd6c 100644 --- a/xen/arch/arm/platforms/omap5.c +++ b/xen/arch/arm/platforms/omap5.c @@ -99,19 +99,23 @@ static int omap5_specific_mapping(struct domain *d) { /* Map the PRM module */ map_mmio_regions(d, gaddr_to_gfn(OMAP5_PRM_BASE), 2, - maddr_to_mfn(OMAP5_PRM_BASE)); + maddr_to_mfn(OMAP5_PRM_BASE), + p2m_mmio_direct_dev); =20 /* Map the PRM_MPU */ map_mmio_regions(d, gaddr_to_gfn(OMAP5_PRCM_MPU_BASE), 1, - maddr_to_mfn(OMAP5_PRCM_MPU_BASE)); + maddr_to_mfn(OMAP5_PRCM_MPU_BASE), + p2m_mmio_direct_dev); =20 /* Map the Wakeup Gen */ map_mmio_regions(d, gaddr_to_gfn(OMAP5_WKUPGEN_BASE), 1, - maddr_to_mfn(OMAP5_WKUPGEN_BASE)); + maddr_to_mfn(OMAP5_WKUPGEN_BASE), + p2m_mmio_direct_dev); =20 /* Map the on-chip SRAM */ map_mmio_regions(d, gaddr_to_gfn(OMAP5_SRAM_PA), 32, - maddr_to_mfn(OMAP5_SRAM_PA)); + maddr_to_mfn(OMAP5_SRAM_PA), + p2m_mmio_direct_dev); =20 return 0; } diff --git a/xen/arch/arm/traps.c b/xen/arch/arm/traps.c index f062ae6f6a..7209405d80 100644 --- a/xen/arch/arm/traps.c +++ b/xen/arch/arm/traps.c @@ -1879,7 +1879,7 @@ static bool try_map_mmio(gfn_t gfn) if ( !iomem_access_permitted(d, mfn_x(mfn), mfn_x(mfn) + 1) ) return false; =20 - return !map_regions_p2mt(d, gfn, 1, mfn, p2m_mmio_direct_c); + return !map_mmio_regions(d, gfn, 1, mfn, p2m_mmio_direct_c); } =20 static void do_trap_stage2_abort_guest(struct cpu_user_regs *regs, diff --git a/xen/arch/arm/vgic-v2.c b/xen/arch/arm/vgic-v2.c index 64b141fea5..1543625ea4 100644 --- a/xen/arch/arm/vgic-v2.c +++ b/xen/arch/arm/vgic-v2.c @@ -691,7 +691,7 @@ static int vgic_v2_domain_init(struct domain *d) * region of the guest. */ ret =3D map_mmio_regions(d, gaddr_to_gfn(cbase), csize / PAGE_SIZE, - maddr_to_mfn(vbase)); + maddr_to_mfn(vbase), p2m_mmio_direct_dev); if ( ret ) return ret; =20 diff --git a/xen/arch/arm/vgic/vgic-v2.c b/xen/arch/arm/vgic/vgic-v2.c index b5ba4ace87..04f34ddab5 100644 --- a/xen/arch/arm/vgic/vgic-v2.c +++ b/xen/arch/arm/vgic/vgic-v2.c @@ -309,7 +309,7 @@ int vgic_v2_map_resources(struct domain *d) * region of the guest. */ ret =3D map_mmio_regions(d, gaddr_to_gfn(cbase), csize / PAGE_SIZE, - maddr_to_mfn(vbase)); + maddr_to_mfn(vbase), p2m_mmio_direct_dev); if ( ret ) { gdprintk(XENLOG_ERR, "Unable to remap VGIC CPU to VCPU\n"); diff --git a/xen/arch/x86/hvm/dom0_build.c b/xen/arch/x86/hvm/dom0_build.c index 8845399ae9..2d3940b0fb 100644 --- a/xen/arch/x86/hvm/dom0_build.c +++ b/xen/arch/x86/hvm/dom0_build.c @@ -79,7 +79,7 @@ static int __init modify_identity_mmio(struct domain *d, = unsigned long pfn, =20 for ( ; ; ) { - rc =3D map ? map_mmio_regions(d, _gfn(pfn), nr_pages, _mfn(pfn)) + rc =3D map ? map_mmio_region(d, _gfn(pfn), nr_pages, _mfn(pfn)) : unmap_mmio_regions(d, _gfn(pfn), nr_pages, _mfn(pfn)); if ( rc =3D=3D 0 ) break; diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c index fef97c82f6..e602cd229c 100644 --- a/xen/arch/x86/mm/p2m.c +++ b/xen/arch/x86/mm/p2m.c @@ -2277,10 +2277,10 @@ static unsigned int mmio_order(const struct domain = *d, =20 #define MAP_MMIO_MAX_ITER 64 /* pretty arbitrary */ =20 -int map_mmio_regions(struct domain *d, - gfn_t start_gfn, - unsigned long nr, - mfn_t mfn) +int map_mmio_region(struct domain *d, + gfn_t start_gfn, + unsigned long nr, + mfn_t mfn) { int ret =3D 0; unsigned long i; diff --git a/xen/common/domctl.c b/xen/common/domctl.c index b48e408583..2674caa005 100644 --- a/xen/common/domctl.c +++ b/xen/common/domctl.c @@ -919,6 +919,7 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_d= omctl) unsigned long nr_mfns =3D op->u.memory_mapping.nr_mfns; unsigned long mfn_end =3D mfn + nr_mfns - 1; int add =3D op->u.memory_mapping.add_mapping; + p2m_type_t p2mt; =20 ret =3D -EINVAL; if ( mfn_end < mfn || /* wrap? */ @@ -931,6 +932,10 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_= domctl) /* Must break hypercall up as this could take a while. */ if ( nr_mfns > 64 ) break; + + p2mt =3D p2m_mmio_direct_dev; +#else + p2mt =3D p2m_mmio_direct; #endif =20 ret =3D -EPERM; @@ -948,7 +953,7 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_d= omctl) "memory_map:add: dom%d gfn=3D%lx mfn=3D%lx nr=3D%lx\n", d->domain_id, gfn, mfn, nr_mfns); =20 - ret =3D map_mmio_regions(d, _gfn(gfn), nr_mfns, _mfn(mfn)); + ret =3D map_mmio_regions(d, _gfn(gfn), nr_mfns, _mfn(mfn), p2m= t); if ( ret < 0 ) printk(XENLOG_G_WARNING "memory_map:fail: dom%d gfn=3D%lx mfn=3D%lx nr=3D%l= x ret:%ld\n", diff --git a/xen/drivers/vpci/header.c b/xen/drivers/vpci/header.c index 3c794f486d..76b33af58e 100644 --- a/xen/drivers/vpci/header.c +++ b/xen/drivers/vpci/header.c @@ -52,7 +52,7 @@ static int map_range(unsigned long s, unsigned long e, vo= id *data, * - {un}map_mmio_regions doesn't support preemption. */ =20 - rc =3D map->map ? map_mmio_regions(map->d, _gfn(s), size, _mfn(s)) + rc =3D map->map ? map_mmio_region(map->d, _gfn(s), size, _mfn(s)) : unmap_mmio_regions(map->d, _gfn(s), size, _mfn(s)); if ( rc =3D=3D 0 ) { diff --git a/xen/include/asm-arm/p2m.h b/xen/include/asm-arm/p2m.h index 31902317da..f970c53764 100644 --- a/xen/include/asm-arm/p2m.h +++ b/xen/include/asm-arm/p2m.h @@ -258,21 +258,6 @@ void p2m_toggle_cache(struct vcpu *v, bool was_enabled= ); =20 void p2m_flush_vm(struct vcpu *v); =20 -/* - * Map a region in the guest p2m with a specific p2m type. - * The memory attributes will be derived from the p2m type. - */ -int map_regions_p2mt(struct domain *d, - gfn_t gfn, - unsigned long nr, - mfn_t mfn, - p2m_type_t p2mt); - -int unmap_regions_p2mt(struct domain *d, - gfn_t gfn, - unsigned long nr, - mfn_t mfn); - int map_dev_mmio_region(struct domain *d, gfn_t gfn, unsigned long nr, diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h index aff34e3adf..a7050ee21c 100644 --- a/xen/include/asm-x86/p2m.h +++ b/xen/include/asm-x86/p2m.h @@ -1001,6 +1001,14 @@ static inline int p2m_entry_modify(struct p2m_domain= *p2m, p2m_type_t nt, return 0; } =20 +/* x86 doesn't use the p2mt parameter, just strip it away */ +#define map_mmio_regions(d, start_gfn, nr, mfn, p2mt) \ + map_mmio_region(d, start_gfn, nr, mfn) +int map_mmio_region(struct domain *d, + gfn_t start_gfn, + unsigned long nr, + mfn_t mfn); + #endif /* _XEN_ASM_X86_P2M_H */ =20 /* diff --git a/xen/include/xen/p2m-common.h b/xen/include/xen/p2m-common.h index 58031a6ea8..e20b4974b0 100644 --- a/xen/include/xen/p2m-common.h +++ b/xen/include/xen/p2m-common.h @@ -8,13 +8,16 @@ int __must_check guest_physmap_remove_page(struct domain *d, gfn_t gfn, mfn_t mfn, unsigned int page_order); =20 -/* Map MMIO regions in the p2m: start_gfn and nr describe the range in - * * the guest physical address space to map, starting from the machine - * * frame number mfn. */ +/* + * Map MMIO regions in the p2m: start_gfn and nr describe the range in + * the guest physical address space to map, starting from the machine + * frame number mfn. + */ int map_mmio_regions(struct domain *d, gfn_t start_gfn, unsigned long nr, - mfn_t mfn); + mfn_t mfn, + p2m_type_t p2mt); int unmap_mmio_regions(struct domain *d, gfn_t start_gfn, unsigned long nr, --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel From nobody Fri Apr 26 01:17:01 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1565137477; cv=none; d=zoho.com; s=zohoarc; b=oFT1zpLrflRpZqkyVrwwtot4uf6G5iYbzk7jRsmr26zdDcB6px+gWwi3xzvxv4u+CQ8oxurAQ+AbBh0CKtkrXKHZREULysixdw+toXCNCDnUGAKi8knTzNFNnooNjeZhbvA+d0n4vha99XL3ORM3kYiqECxCHrt5jBB/ULsZns0= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1565137477; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=eBqUcrX2TsTKx85DwuuCSi90uEuuE0ywWArJEWJMQbI=; b=lzQjBpfiUfTyI27fFAjUCB8zcv0kJ08GmmVqiFH9W9ZN8RS9EVI/JYOx8gWDQxreHu2cvC08lX+Xy/w/xlFr6R3fP9WOb7cB0Uiw8odjzZUawKxcHP4BuWWkjhN4PzZSoeRZbxwYfnZhr7h+ni8VnoUlkEKylupakiie8A8HoLY= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1565137477379650.2006300794825; Tue, 6 Aug 2019 17:24:37 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jX-0004eR-Os; Wed, 07 Aug 2019 00:23:15 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jX-0004dn-Ai for xen-devel@lists.xenproject.org; Wed, 07 Aug 2019 00:23:15 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 8b3e6983-b8a9-11e9-8980-bc764e045a96; Wed, 07 Aug 2019 00:23:13 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s.xilinx.com (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 25CF5217D7; Wed, 7 Aug 2019 00:23:13 +0000 (UTC) X-Inumbo-ID: 8b3e6983-b8a9-11e9-8980-bc764e045a96 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565137393; bh=xnN7N9SBAauUcp9S3b/w79ZpDs9tT93O9O8L4dJP124=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=i6yo3+Nf52JavZbWcnKwa3hTrL8mOPNBpndy6+rNpYMbRXjQlqEpRa8WF92x8z2Iy 2zBMfwPHccd2zCbgDjGmpaEvuDxCXY6auyEB+s4zVkqN+kMZarYlz279hRO2sImIoP nJ1tJnksMN96Fc1J8HQVWRtWg0CoHGlqGqdY57PY= From: Stefano Stabellini To: xen-devel@lists.xenproject.org Date: Tue, 6 Aug 2019 17:23:08 -0700 Message-Id: <20190807002311.9906-3-sstabellini@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Subject: [Xen-devel] [PATCH v4 3/6] xen: extend XEN_DOMCTL_memory_mapping to handle memory policy X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , julien.grall@arm.com, sstabellini@kernel.org, JBeulich@suse.com, andrew.cooper3@citrix.com MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Reuse the existing padding field to pass memory policy information. On Arm, the caller can specify whether the memory should be mapped as Device-nGnRE (Device Memory on Armv7) at stage-2, which is the default and the only possibility today, or cacheable memory write-back. The resulting memory attributes will be a combination of stage-2 and stage-1 memory attributes: it will actually be the strongest between the 2 stages attributes. On x86, the only option is uncachable. The current behavior becomes the default (numerically '0'). Also explicitely set the memory_policy field to 0 in libxc. On Arm, map Device-nGnRE as p2m_mmio_direct_dev (as it is already done today) and WB cacheable memory as p2m_mmio_direct_c. On x86, there is just one policy which is the default. Signed-off-by: Stefano Stabellini CC: JBeulich@suse.com CC: andrew.cooper3@citrix.com --- Changes in v4: - return -EINVAL on XEN_DOMCTL_memory_mapping on default label - use MEMORY_POLICY_DEFAULT instead of 0 - uint32_t memory_policy -> unsigned int memory_policy - cache=3D -> policy=3D - MEMORY_POLICY_X86_UC_MINUS -> MEMORY_POLICY_DEFAULT - ARM -> Arm Changes in v3: - error handling in default label of the switch - set memory_policy to 0 in libxc - improve commit message - improve comments - s/Device-nGRE/Device-nGnRE/g - add in-code comment - s/MEMORY_POLICY_X86_UC/MEMORY_POLICY_X86_UC_MINUS/g - #ifdef hypercall defines according to arch Changes in v2: - rebase - use p2m_mmio_direct_c - use EOPNOTSUPP - rename cache_policy to memory policy - rename MEMORY_POLICY_DEVMEM to MEMORY_POLICY_ARM_DEV_nGRE - rename MEMORY_POLICY_MEMORY to MEMORY_POLICY_ARM_MEM_WB - add MEMORY_POLICY_X86_UC - add MEMORY_POLICY_DEFAULT and use it --- tools/libxc/xc_domain.c | 1 + xen/common/domctl.c | 25 +++++++++++++++++++++++-- xen/include/public/domctl.h | 20 +++++++++++++++++++- 3 files changed, 43 insertions(+), 3 deletions(-) diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c index 05d771f2ce..075ffb9ed1 100644 --- a/tools/libxc/xc_domain.c +++ b/tools/libxc/xc_domain.c @@ -2070,6 +2070,7 @@ int xc_domain_memory_mapping( domctl.cmd =3D XEN_DOMCTL_memory_mapping; domctl.domain =3D domid; domctl.u.memory_mapping.add_mapping =3D add_mapping; + domctl.u.memory_mapping.memory_policy =3D MEMORY_POLICY_DEFAULT; max_batch_sz =3D nr_mfns; do { diff --git a/xen/common/domctl.c b/xen/common/domctl.c index 2674caa005..063523c7f7 100644 --- a/xen/common/domctl.c +++ b/xen/common/domctl.c @@ -920,6 +920,7 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_d= omctl) unsigned long mfn_end =3D mfn + nr_mfns - 1; int add =3D op->u.memory_mapping.add_mapping; p2m_type_t p2mt; + unsigned int memory_policy =3D op->u.memory_mapping.memory_policy; =20 ret =3D -EINVAL; if ( mfn_end < mfn || /* wrap? */ @@ -950,9 +951,29 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) u_= domctl) if ( add ) { printk(XENLOG_G_DEBUG - "memory_map:add: dom%d gfn=3D%lx mfn=3D%lx nr=3D%lx\n", - d->domain_id, gfn, mfn, nr_mfns); + "memory_map:add: dom%d gfn=3D%lx mfn=3D%lx nr=3D%lx pol= icy=3D%u\n", + d->domain_id, gfn, mfn, nr_mfns, memory_policy); =20 + switch ( memory_policy ) + { +#ifdef CONFIG_ARM + case MEMORY_POLICY_ARM_MEM_WB: + p2mt =3D p2m_mmio_direct_c; + break; + case MEMORY_POLICY_ARM_DEV_nGnRE: + p2mt =3D p2m_mmio_direct_dev; + break; +#endif +#ifdef CONFIG_X86 + case MEMORY_POLICY_DEFAULT: + p2mt =3D p2m_mmio_direct; + break; +#endif + default: + domctl_lock_release(); + ret =3D -EINVAL; + goto domctl_out_unlock_domonly; + } ret =3D map_mmio_regions(d, _gfn(gfn), nr_mfns, _mfn(mfn), p2m= t); if ( ret < 0 ) printk(XENLOG_G_WARNING diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h index 19486d5e32..b9078400fa 100644 --- a/xen/include/public/domctl.h +++ b/xen/include/public/domctl.h @@ -571,12 +571,30 @@ struct xen_domctl_bind_pt_irq { */ #define DPCI_ADD_MAPPING 1 #define DPCI_REMOVE_MAPPING 0 +/* + * Default memory policy. Corresponds to: + * Arm: MEMORY_POLICY_ARM_DEV_nGnRE + * x86: Memory type UNCACHABLE + */ +#define MEMORY_POLICY_DEFAULT 0 +#if defined(__arm__) || defined (__aarch64__) +/* Arm only. Outer Shareable, Device-nGnRE memory (Device Memory on Armv7)= */ +# define MEMORY_POLICY_ARM_DEV_nGnRE 0 +/* Arm only. Outer Shareable, Outer/Inner Write-Back Cacheable memory */ +# define MEMORY_POLICY_ARM_MEM_WB 1 +/* + * On Arm, MEMORY_POLICY selects the stage-2 memory attributes, but note + * that the resulting memory attributes will be a combination of stage-2 + * and stage-1 memory attributes: it will be the strongest between the 2 + * stages attributes. + */ +#endif struct xen_domctl_memory_mapping { uint64_aligned_t first_gfn; /* first page (hvm guest phys page) in ran= ge */ uint64_aligned_t first_mfn; /* first page (machine page) in range */ uint64_aligned_t nr_mfns; /* number of pages in range (>0) */ uint32_t add_mapping; /* add or remove mapping */ - uint32_t padding; /* padding for 64-bit aligned structure */ + uint32_t memory_policy; /* cacheability of the memory mapping */ }; =20 =20 --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel From nobody Fri Apr 26 01:17:01 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1565137476; cv=none; d=zoho.com; s=zohoarc; b=HMYyaAWVXCB4PAavc3G+/j7ZyiHrG/I/M+gOM3ShQer7KbGmj2B6UX6ffHlUnegm2g2mCbM3tovvNkEHQUCCP3QcJf1vkhhicTqWhpwLZLWGkCo9RGHHeLYWK8V0ZLZmStcwpBTy6sczcRU7qI3eJmZRtLCmhD2j/uU3fO2pO4A= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1565137476; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=pwGzfL2a0hgGXl8uCQzkhCNn9D2YL2It9KbkLe1XX58=; b=opK+vlLitMHvA9SGhgjI/9CaXUZ4ZIl8WP7gQRXqvkynXbwTkNzbaihT3kVNGhHeF5Mw8Ha0sev3GujU+xk2GA3+SVw3plleLuSJLpHMkGXtSsrQ3Lzpj0V+TbnIMtOeJkJ5SylmbnFDxk4WkccC0zANK9YVZQoYnel9ejDDiJw= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1565137476633137.0539520908451; Tue, 6 Aug 2019 17:24:36 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jZ-0004fb-Ev; Wed, 07 Aug 2019 00:23:17 +0000 Received: from all-amaz-eas1.inumbo.com ([34.197.232.57] helo=us1-amaz-eas2.inumbo.com) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jX-0004eP-Qd for xen-devel@lists.xenproject.org; Wed, 07 Aug 2019 00:23:15 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-amaz-eas2.inumbo.com (Halon) with ESMTPS id 8b8ae1c4-b8a9-11e9-aefc-7bf671acb327; Wed, 07 Aug 2019 00:23:14 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s.xilinx.com (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 9C65E217D9; Wed, 7 Aug 2019 00:23:13 +0000 (UTC) X-Inumbo-ID: 8b8ae1c4-b8a9-11e9-aefc-7bf671acb327 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565137393; bh=5eP0DKuxjfEdCn97uh85DOCUFSUK8uBbkDIIzaLhY08=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=BLk9XRYkkjlY9YxkYDDeLLT+Z0tPXF42P3z830Up6uyGzG3CIYzXaeK7BdHRXu2Qh rASRX1orE+0AQoVByORaAKDz4KpNPTyyUs7aegRrnTJDv1PhvrGh3VmGHlYOkJEq+0 9Saiu9NDafH+f8XcigfkWBZP8UfhxQX1ISaVICXw= From: Stefano Stabellini To: xen-devel@lists.xenproject.org Date: Tue, 6 Aug 2019 17:23:09 -0700 Message-Id: <20190807002311.9906-4-sstabellini@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Subject: [Xen-devel] [PATCH v4 4/6] libxc: introduce xc_domain_mem_map_policy X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , julien.grall@arm.com, sstabellini@kernel.org, ian.jackson@eu.citrix.com, wei.liu2@citrix.com MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Introduce a new libxc function that makes use of the new memory_policy parameter added to the XEN_DOMCTL_memory_mapping hypercall. The parameter values are the same for the XEN_DOMCTL_memory_mapping hypercall (0 is MEMORY_POLICY_DEFAULT). Pass MEMORY_POLICY_DEFAULT by default -- no changes in behavior. We could extend xc_domain_memory_mapping, but QEMU makes use of it, so it is easier and less disruptive to introduce a new libxc function and change the implementation of xc_domain_memory_mapping to call into it. Signed-off-by: Stefano Stabellini CC: ian.jackson@eu.citrix.com CC: wei.liu2@citrix.com --- Changes in v2: - rename cache_policy to memory policy - rename MEMORY_POLICY_DEVMEM to MEMORY_POLICY_ARM_DEV_nGRE - rename MEMORY_POLICY_MEMORY to MEMORY_POLICY_ARM_MEM_WB - introduce xc_domain_mem_map_policy --- tools/libxc/include/xenctrl.h | 8 ++++++++ tools/libxc/xc_domain.c | 25 ++++++++++++++++++++----- 2 files changed, 28 insertions(+), 5 deletions(-) diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h index 0ff6ed9e70..2396929960 100644 --- a/tools/libxc/include/xenctrl.h +++ b/tools/libxc/include/xenctrl.h @@ -1714,6 +1714,14 @@ int xc_deassign_dt_device(xc_interface *xch, uint32_t domid, char *path); =20 +int xc_domain_mem_map_policy(xc_interface *xch, + uint32_t domid, + unsigned long first_gfn, + unsigned long first_mfn, + unsigned long nr_mfns, + uint32_t add_mapping, + uint32_t memory_policy); + int xc_domain_memory_mapping(xc_interface *xch, uint32_t domid, unsigned long first_gfn, diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c index 075ffb9ed1..02f5778212 100644 --- a/tools/libxc/xc_domain.c +++ b/tools/libxc/xc_domain.c @@ -2042,13 +2042,14 @@ failed: return -1; } =20 -int xc_domain_memory_mapping( +int xc_domain_mem_map_policy( xc_interface *xch, uint32_t domid, unsigned long first_gfn, unsigned long first_mfn, unsigned long nr_mfns, - uint32_t add_mapping) + uint32_t add_mapping, + uint32_t memory_policy) { DECLARE_DOMCTL; xc_dominfo_t info; @@ -2070,7 +2071,7 @@ int xc_domain_memory_mapping( domctl.cmd =3D XEN_DOMCTL_memory_mapping; domctl.domain =3D domid; domctl.u.memory_mapping.add_mapping =3D add_mapping; - domctl.u.memory_mapping.memory_policy =3D MEMORY_POLICY_DEFAULT; + domctl.u.memory_mapping.memory_policy =3D memory_policy; max_batch_sz =3D nr_mfns; do { @@ -2106,8 +2107,9 @@ int xc_domain_memory_mapping( * Errors here are ignored. */ if ( ret && add_mapping !=3D DPCI_REMOVE_MAPPING ) - xc_domain_memory_mapping(xch, domid, first_gfn, first_mfn, nr_mfns, - DPCI_REMOVE_MAPPING); + xc_domain_mem_map_policy(xch, domid, first_gfn, first_mfn, nr_mfns, + DPCI_REMOVE_MAPPING, + MEMORY_POLICY_DEFAULT); =20 /* We might get E2BIG so many times that we never advance. */ if ( !done && !ret ) @@ -2116,6 +2118,19 @@ int xc_domain_memory_mapping( return ret; } =20 +int xc_domain_memory_mapping( + xc_interface *xch, + uint32_t domid, + unsigned long first_gfn, + unsigned long first_mfn, + unsigned long nr_mfns, + uint32_t add_mapping) +{ + return xc_domain_mem_map_policy(xch, domid, first_gfn, first_mfn, + nr_mfns, add_mapping, + MEMORY_POLICY_DEFAULT); +} + int xc_domain_ioport_mapping( xc_interface *xch, uint32_t domid, --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel From nobody Fri Apr 26 01:17:01 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1565137483; cv=none; d=zoho.com; s=zohoarc; b=avHPo71D0PfghZcMCNLjiv0PIuiPGD9oh4kharIlTcMbyzbvfakf6YUB4wdo97aAGYI5AvIIts3zTafH1wDr+8PPdfQQeZpfLMsTv7ngEsskGSm3Pc3G9K57VPWX5TqMBSZ7Y/UsPFvbL/5HOWC7Yg8oocmdkGEFTucy/QDALjE= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1565137483; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=RjwJ2gho97x2afqJ5IVmqEm+q/tdS+sRqVQbVQpcyvk=; b=azB2FaVDieT52c4EprcopRLEHpjUMv9WMHF0KyMiZUz9/WCjVtcTh/qxZYCFIWBpCS1F890mYRSg2g/DB8bEwNzcL1ACLaQxSIMa0jXA4EDuvZhnOX7BPu+Ci2OeY7X21e6HlUpnqcA1ms2poKdnc4fxk+8SvH+JXmU/QdIYoPA= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1565137483531850.4017500884091; Tue, 6 Aug 2019 17:24:43 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9ja-0004gK-2w; Wed, 07 Aug 2019 00:23:18 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jY-0004fA-Jd for xen-devel@lists.xenproject.org; Wed, 07 Aug 2019 00:23:16 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 8bcc28cb-b8a9-11e9-8980-bc764e045a96; Wed, 07 Aug 2019 00:23:14 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s.xilinx.com (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 1B0F7217F4; Wed, 7 Aug 2019 00:23:14 +0000 (UTC) X-Inumbo-ID: 8bcc28cb-b8a9-11e9-8980-bc764e045a96 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565137394; bh=JETEGkAaZ3TGtOfvtVMH7SmZ/HozO6XDy93NN1nnekg=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=aaGEG+cw70ZIJEHv/hBuApoMOmWvYb1zU0LK1SbEqcKKcwd6pMPmobxMM8G5YQkaO 3K3YTljxY80/z7KzeBAGRU1elhzXfsXtzKN7TaAgwLTpwW3ooqWHgjIIGyAI04Mst1 8wy+PAzMNUMAke77cs+mofTdXabF3GiIQ+MTtCAE= From: Stefano Stabellini To: xen-devel@lists.xenproject.org Date: Tue, 6 Aug 2019 17:23:10 -0700 Message-Id: <20190807002311.9906-5-sstabellini@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Subject: [Xen-devel] [PATCH v4 5/6] libxl/xl: add memory policy option to iomem X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , julien.grall@arm.com, sstabellini@kernel.org, ian.jackson@eu.citrix.com, wei.liu2@citrix.com MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) Add a new memory policy option for the iomem parameter. Possible values are: - arm_dev_nGnRE, Device-nGnRE, the default on Arm - arm_mem_WB, WB cachable memory - default Store the parameter in a new field in libxl_iomem_range. Pass the memory policy option to xc_domain_mem_map_policy. Do the libxl to libxc value conversion in per-arch functions so that we can return error for x86 parameters on Arm architectures and vice versa. Signed-off-by: Stefano Stabellini CC: ian.jackson@eu.citrix.com CC: wei.liu2@citrix.com Acked-by: Julien Grall --- Changes in v4: - ARM -> Arm - libxl__memory_policy_to_xc -> libxl__arch_memory_policy_to_xc - keep Arm policies together Changes in v3: - s/nGRE/nGnRE/g - s/LIBXL_MEMORY_POLICY_ARM_DEV_NGRE/LIBXL_MEMORY_POLICY_ARM_DEV_NGNRE/g - s/arm_devmem/arm_dev_nGnRE/g - s/arm_memory/arm_mem_WB/g - improve commit message - improve man page - s/MEMORY_POLICY_X86_UC/MEMORY_POLICY_X86_UC_MINUS/g - s/x86_uc/x86_UC_minus/g - move security support clarification to a separate patch Changes in v2: - add #define LIBXL_HAVE_MEMORY_POLICY - ability to part the memory policy parameter even if gfn is not passed - rename cache_policy to memory policy - rename MEMORY_POLICY_DEVMEM to MEMORY_POLICY_ARM_DEV_nGRE - rename MEMORY_POLICY_MEMORY to MEMORY_POLICY_ARM_MEM_WB - rename memory to arm_memory and devmem to arm_devmem - expand the non-security support status to non device passthrough iomem configurations - rename iomem options - add x86 specific iomem option --- docs/man/xl.cfg.5.pod.in | 10 +++++++++- tools/libxl/libxl.h | 5 +++++ tools/libxl/libxl_arch.h | 3 +++ tools/libxl/libxl_arm.c | 14 ++++++++++++++ tools/libxl/libxl_create.c | 12 ++++++++++-- tools/libxl/libxl_types.idl | 8 ++++++++ tools/libxl/libxl_x86.c | 10 ++++++++++ tools/xl/xl_parse.c | 22 +++++++++++++++++++++- 8 files changed, 80 insertions(+), 4 deletions(-) diff --git a/docs/man/xl.cfg.5.pod.in b/docs/man/xl.cfg.5.pod.in index c99d40307e..77df9c1bdb 100644 --- a/docs/man/xl.cfg.5.pod.in +++ b/docs/man/xl.cfg.5.pod.in @@ -1222,7 +1222,7 @@ is given in hexadecimal format and may either be a ra= nge, e.g. C<2f8-2ff> It is recommended to only use this option for trusted VMs under administrator's control. =20 -=3Ditem B +=3Ditem B =20 Allow auto-translated domains to access specific hardware I/O memory pages. =20 @@ -1233,6 +1233,14 @@ B is not specified, the mapping will be perform= ed using B as a start in the guest's address space, therefore performing a 1:1 mapping by default. All of these values must be given in hexadecimal format. +B for Arm platforms: + - "arm_dev_nGnRE" for Device-nGnRE (Device Memory on Armv7), the default= on Arm + - "arm_mem_WB" for Outer Shareable Write-Back Cacheable Memory +They select the stage-2 memory attributes, but note that the resulting +memory attributes will be a combination of stage-2 and stage-1 memory +attributes: it will be the strongest between the 2 stages attributes. +B can be for both Arm and x86 platforms: + - "default" which is Uncachable Memory on x86, and arm_dev_nGnRE on Arm =20 Note that the IOMMU won't be updated with the mappings specified with this option. This option therefore should not be used to pass through any diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h index 9bacfb97f0..cf12f1d3bd 100644 --- a/tools/libxl/libxl.h +++ b/tools/libxl/libxl.h @@ -378,6 +378,11 @@ #define LIBXL_HAVE_BUILDINFO_BOOTLOADER 1 #define LIBXL_HAVE_BUILDINFO_BOOTLOADER_ARGS 1 =20 +/* + * Support specifying memory policy information for memory mappings. + */ +#define LIBXL_HAVE_MEMORY_POLICY 1 + /* * LIBXL_HAVE_EXTENDED_VKB indicates that libxl_device_vkb has extended fi= elds: * - unique_id; diff --git a/tools/libxl/libxl_arch.h b/tools/libxl/libxl_arch.h index d624159e53..796c961568 100644 --- a/tools/libxl/libxl_arch.h +++ b/tools/libxl/libxl_arch.h @@ -77,6 +77,9 @@ int libxl__arch_extra_memory(libxl__gc *gc, const libxl_domain_build_info *info, uint64_t *out); =20 +_hidden +int libxl__arch_memory_policy_to_xc(libxl_memory_policy c); + #if defined(__i386__) || defined(__x86_64__) =20 #define LAPIC_BASE_ADDRESS 0xfee00000 diff --git a/tools/libxl/libxl_arm.c b/tools/libxl/libxl_arm.c index 141e159043..6b8e7ddb06 100644 --- a/tools/libxl/libxl_arm.c +++ b/tools/libxl/libxl_arm.c @@ -1149,6 +1149,20 @@ void libxl__arch_domain_build_info_setdefault(libxl_= _gc *gc, libxl_domain_build_info_init_type(b_info, LIBXL_DOMAIN_TYPE_PVH); } =20 +int libxl__arch_memory_policy_to_xc(libxl_memory_policy c) +{ + switch (c) { + case LIBXL_MEMORY_POLICY_ARM_MEM_WB: + return MEMORY_POLICY_ARM_MEM_WB; + case LIBXL_MEMORY_POLICY_ARM_DEV_NGNRE: + return MEMORY_POLICY_ARM_DEV_nGnRE; + case LIBXL_MEMORY_POLICY_DEFAULT: + return MEMORY_POLICY_DEFAULT; + default: + return ERROR_INVAL; + } +} + /* * Local variables: * mode: C diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c index 03ce166f4f..9b375cdf69 100644 --- a/tools/libxl/libxl_create.c +++ b/tools/libxl/libxl_create.c @@ -1357,6 +1357,7 @@ static void domcreate_launch_dm(libxl__egc *egc, libx= l__multidev *multidev, =20 for (i =3D 0; i < d_config->b_info.num_iomem; i++) { libxl_iomem_range *io =3D &d_config->b_info.iomem[i]; + int memory_policy; =20 LOGD(DEBUG, domid, "iomem %"PRIx64"-%"PRIx64, io->start, io->start + io->number - 1); @@ -1370,9 +1371,16 @@ static void domcreate_launch_dm(libxl__egc *egc, lib= xl__multidev *multidev, ret =3D ERROR_FAIL; goto error_out; } - ret =3D xc_domain_memory_mapping(CTX->xch, domid, + memory_policy =3D libxl__arch_memory_policy_to_xc(io->memory_polic= y); + if (memory_policy < 0) { + LOGED(ERROR, domid, + "invalid memory policy %u", io->memory_policy); + ret =3D ERROR_FAIL; + goto error_out; + } + ret =3D xc_domain_mem_map_policy(CTX->xch, domid, io->gfn, io->start, - io->number, 1); + io->number, 1, memory_policy); if (ret < 0) { LOGED(ERROR, domid, "failed to map to domain iomem range %"PRIx64"-%"PRIx64 diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl index b61399ce36..ad5d9cdae2 100644 --- a/tools/libxl/libxl_types.idl +++ b/tools/libxl/libxl_types.idl @@ -272,6 +272,12 @@ libxl_ioport_range =3D Struct("ioport_range", [ ("number", uint32), ]) =20 +libxl_memory_policy =3D Enumeration("memory_policy", [ + (0, "default"), + (1, "ARM_Dev_nGnRE"), + (2, "ARM_Mem_WB"), + ], init_val =3D "LIBXL_MEMORY_POLICY_DEFAULT") + libxl_iomem_range =3D Struct("iomem_range", [ # start host frame number to be mapped to the guest ("start", uint64), @@ -279,6 +285,8 @@ libxl_iomem_range =3D Struct("iomem_range", [ ("number", uint64), # guest frame number used as a start for the mapping ("gfn", uint64, {'init_val': "LIBXL_INVALID_GFN"}), + # memory_policy of the memory region + ("memory_policy", libxl_memory_policy), ]) =20 libxl_vga_interface_info =3D Struct("vga_interface_info", [ diff --git a/tools/libxl/libxl_x86.c b/tools/libxl/libxl_x86.c index c0f88a7eaa..32c211c3ae 100644 --- a/tools/libxl/libxl_x86.c +++ b/tools/libxl/libxl_x86.c @@ -631,6 +631,16 @@ void libxl__arch_domain_build_info_setdefault(libxl__g= c *gc, libxl_defbool_setdefault(&b_info->acpi, true); } =20 +int libxl__arch_memory_policy_to_xc(libxl_memory_policy c) +{ + switch (c) { + case LIBXL_MEMORY_POLICY_DEFAULT: + return MEMORY_POLICY_DEFAULT; + default: + return ERROR_INVAL; + } +} + /* * Local variables: * mode: C diff --git a/tools/xl/xl_parse.c b/tools/xl/xl_parse.c index e105bda2bb..c019bca728 100644 --- a/tools/xl/xl_parse.c +++ b/tools/xl/xl_parse.c @@ -1883,6 +1883,7 @@ void parse_config_data(const char *config_source, } for (i =3D 0; i < num_iomem; i++) { int used; + const char *mempolicy; =20 buf =3D xlu_cfg_get_listitem (iomem, i); if (!buf) { @@ -1895,11 +1896,30 @@ void parse_config_data(const char *config_source, &b_info->iomem[i].start, &b_info->iomem[i].number, &used, &b_info->iomem[i].gfn, &used); - if (ret < 2 || buf[used] !=3D '\0') { + if (ret < 2) { fprintf(stderr, "xl: Invalid argument parsing iomem: %s\n", buf); exit(1); } + mempolicy =3D &buf[used]; + if (strlen(mempolicy) > 1) { + mempolicy++; + if (!strcmp(mempolicy, "arm_dev_nGnRE")) + b_info->iomem[i].memory_policy =3D + LIBXL_MEMORY_POLICY_ARM_DEV_NGNRE; + else if (!strcmp(mempolicy, "arm_mem_WB")) + b_info->iomem[i].memory_policy =3D + LIBXL_MEMORY_POLICY_ARM_MEM_WB; + else if (!strcmp(mempolicy, "default")) + b_info->iomem[i].memory_policy =3D + LIBXL_MEMORY_POLICY_DEFAULT; + else { + fprintf(stderr, + "xl: Invalid iomem memory policy parameter: %s= \n", + mempolicy); + exit(1); + } + } } } =20 --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel From nobody Fri Apr 26 01:17:01 2024 Delivered-To: importer@patchew.org Received-SPF: none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) client-ip=192.237.175.120; envelope-from=xen-devel-bounces@lists.xenproject.org; helo=lists.xenproject.org; Authentication-Results: mx.zohomail.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail(p=none dis=none) header.from=kernel.org ARC-Seal: i=1; a=rsa-sha256; t=1565137485; cv=none; d=zoho.com; s=zohoarc; b=DfH0YwLKNgT4zihnevD8HYZajNNGQ36lfInnXaNhpQDZACApmxvaqdXak50EhdGFoo4c+9BkhWPmE91XFNqDpGCAZU+CHpfSo78HTeJGY9N/g4yNQB0R2NujKHbdM2wPWCM8NcPfrtgzcDxaet1GG3K5N/6wlLF0U/w8pdjPPaI= ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zoho.com; s=zohoarc; t=1565137485; h=Content-Type:Content-Transfer-Encoding:Cc:Date:From:In-Reply-To:List-Subscribe:List-Post:List-Id:List-Help:List-Unsubscribe:MIME-Version:Message-ID:References:Sender:Subject:To:ARC-Authentication-Results; bh=wq0b6L9XxGDeS5HZIGeMbLnB9Uy3l2phH6OwdKnDlIM=; b=NrR8ckcoMbcRk6w5l2+zKPKreOz3gDAB3u1HzQF7BLf/VtsenhiWQl4mlXwaCewk8jXlLNPQz1t9GSEcPSSRtIcE64v24lGlbW9Cy1WjrbwmyaSR2+5iHfKlAsLzW1yOtzCMPf+EUfmlO72JlJogu9l2ZV4AeGTqSX1fD3kI+F8= ARC-Authentication-Results: i=1; mx.zoho.com; dkim=fail; spf=none (zoho.com: 192.237.175.120 is neither permitted nor denied by domain of lists.xenproject.org) smtp.mailfrom=xen-devel-bounces@lists.xenproject.org; dmarc=fail header.from= (p=none dis=none) header.from= Return-Path: Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) by mx.zohomail.com with SMTPS id 1565137485540705.0946031496677; Tue, 6 Aug 2019 17:24:45 -0700 (PDT) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jZ-0004fx-PH; Wed, 07 Aug 2019 00:23:17 +0000 Received: from us1-rack-dfw2.inumbo.com ([104.130.134.6]) by lists.xenproject.org with esmtp (Exim 4.89) (envelope-from ) id 1hv9jY-0004f9-J4 for xen-devel@lists.xenproject.org; Wed, 07 Aug 2019 00:23:16 +0000 Received: from mail.kernel.org (unknown [198.145.29.99]) by us1-rack-dfw2.inumbo.com (Halon) with ESMTPS id 8c32a4d2-b8a9-11e9-8980-bc764e045a96; Wed, 07 Aug 2019 00:23:15 +0000 (UTC) Received: from sstabellini-ThinkPad-T480s.xilinx.com (c-67-164-102-47.hsd1.ca.comcast.net [67.164.102.47]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 94703217F5; Wed, 7 Aug 2019 00:23:14 +0000 (UTC) X-Inumbo-ID: 8c32a4d2-b8a9-11e9-8980-bc764e045a96 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1565137395; bh=GwEyAjT+Br4GmpstYguJ2DQHzeu78DBIV+5LF7N2vbU=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=dVMS2akiNICfXbmJN7Q6L7sVwn24Q8neypBwjOSZHKsIyhzwo6F82AX5teur3xQMG 1gXw1alg5zfBNcvuTJda/go5/QXKk3Tqts9vfuT41xjgXKV/1PFXpSSmbP+to0Xs1x VwGQK1AkEeCphG3R8rh5gklnrzFaAiXAIRnwOUgc= From: Stefano Stabellini To: xen-devel@lists.xenproject.org Date: Tue, 6 Aug 2019 17:23:11 -0700 Message-Id: <20190807002311.9906-6-sstabellini@kernel.org> X-Mailer: git-send-email 2.17.1 In-Reply-To: References: Subject: [Xen-devel] [PATCH v4 6/6] xen/arm: clarify the support status of iomem configurations X-BeenThere: xen-devel@lists.xenproject.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Cc: Stefano Stabellini , sstabellini@kernel.org, wei.liu2@citrix.com, konrad.wilk@oracle.com, andrew.cooper3@citrix.com, tim@xen.org, julien.grall@arm.com, JBeulich@suse.com, ian.jackson@eu.citrix.com MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable Errors-To: xen-devel-bounces@lists.xenproject.org Sender: "Xen-devel" X-ZohoMail-DKIM: fail (Header signature does not verify) iomem settings fall under the broader category of "Non-PCI device passthrough": they are not security supported. Make it clearer. Signed-off-by: Stefano Stabellini CC: tim@xen.org CC: konrad.wilk@oracle.com CC: Julien Grall CC: JBeulich@suse.com CC: andrew.cooper3@citrix.com CC: ian.jackson@eu.citrix.com CC: wei.liu2@citrix.com --- SUPPORT.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/SUPPORT.md b/SUPPORT.md index 375473a456..bc6fb58e04 100644 --- a/SUPPORT.md +++ b/SUPPORT.md @@ -639,7 +639,7 @@ to be used in addition to QEMU. =20 Status: Experimental =20 -### ARM/Non-PCI device passthrough +### ARM/Non-PCI device passthrough and other iomem configurations =20 Status: Supported, not security supported =20 --=20 2.17.1 _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel