diff mbox

[v6] xen/arm: Allow balooning working with 1:1 memory mapping

Message ID 1387290499-3970-1-git-send-email-julien.grall@linaro.org
State Accepted, archived
Headers show

Commit Message

Julien Grall Dec. 17, 2013, 2:28 p.m. UTC
With the lack of iommu, dom0 must have a 1:1 memory mapping for all
these guest physical address. When the ballon decides to give back a
page to the kernel, this page must have the same address as previously.
Otherwise, we will loose the 1:1 mapping and will break DMA-capable
devices.

Signed-off-by: Julien Grall <julien.grall@linaro.org>
Reviewed-by: Jan Beulich <jbeulich@suse.com>
Cc: Keir Fraser <keir@xen.org>

---
    Release: This is a bug that prevents DMA-capable devices to work after
    a guest has started.

    Changes in v6:
        - Use # instead of 0x
        - Make sure that d is evaluated in is_domain_direct_mapped
    Changes in v5:
        - Export dom0_11_mapping and transform is_domain_direct_mapped in macro
        - Add ifndef in common code to define is_domain_direct_mapped
    Changes in v4:
        - Fix typoes
        - Update comment in the code
    Changes in v3:
        - Remove spurious page = NULL
        - Rename is_dom0_mapped_11 to is_domain_direct_mapped
        - Coding style
    Changes in v2:
        - Drop CONFIG_ARM and add is_dom0_mapped_11
---
 xen/arch/arm/domain_build.c  |    2 +-
 xen/common/memory.c          |   35 ++++++++++++++++++++++++++++++++++-
 xen/include/asm-arm/domain.h |    3 +++
 3 files changed, 38 insertions(+), 2 deletions(-)

Comments

Stefano Stabellini Dec. 17, 2013, 2:55 p.m. UTC | #1
On Tue, 17 Dec 2013, Julien Grall wrote:
> With the lack of iommu, dom0 must have a 1:1 memory mapping for all
> these guest physical address. When the ballon decides to give back a
> page to the kernel, this page must have the same address as previously.
> Otherwise, we will loose the 1:1 mapping and will break DMA-capable
> devices.
> 
> Signed-off-by: Julien Grall <julien.grall@linaro.org>
> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> Cc: Keir Fraser <keir@xen.org>

Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>


>     Release: This is a bug that prevents DMA-capable devices to work after
>     a guest has started.
> 
>     Changes in v6:
>         - Use # instead of 0x
>         - Make sure that d is evaluated in is_domain_direct_mapped
>     Changes in v5:
>         - Export dom0_11_mapping and transform is_domain_direct_mapped in macro
>         - Add ifndef in common code to define is_domain_direct_mapped
>     Changes in v4:
>         - Fix typoes
>         - Update comment in the code
>     Changes in v3:
>         - Remove spurious page = NULL
>         - Rename is_dom0_mapped_11 to is_domain_direct_mapped
>         - Coding style
>     Changes in v2:
>         - Drop CONFIG_ARM and add is_dom0_mapped_11
> ---
>  xen/arch/arm/domain_build.c  |    2 +-
>  xen/common/memory.c          |   35 ++++++++++++++++++++++++++++++++++-
>  xen/include/asm-arm/domain.h |    3 +++
>  3 files changed, 38 insertions(+), 2 deletions(-)
> 
> diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> index faff88e..47b781b 100644
> --- a/xen/arch/arm/domain_build.c
> +++ b/xen/arch/arm/domain_build.c
> @@ -22,7 +22,7 @@
>  static unsigned int __initdata opt_dom0_max_vcpus;
>  integer_param("dom0_max_vcpus", opt_dom0_max_vcpus);
>  
> -static int dom0_11_mapping = 1;
> +int dom0_11_mapping = 1;
>  
>  #define DOM0_MEM_DEFAULT 0x8000000 /* 128 MiB */
>  static u64 __initdata dom0_mem = DOM0_MEM_DEFAULT;
> diff --git a/xen/common/memory.c b/xen/common/memory.c
> index eb7b72b..51f11ff 100644
> --- a/xen/common/memory.c
> +++ b/xen/common/memory.c
> @@ -29,6 +29,10 @@
>  #include <xsm/xsm.h>
>  #include <xen/trace.h>
>  
> +#ifndef is_domain_direct_mapped
> +# define is_domain_direct_mapped(d) ((void)(d), 0)
> +#endif
> +
>  struct memop_args {
>      /* INPUT */
>      struct domain *domain;     /* Domain to be affected. */
> @@ -122,7 +126,29 @@ static void populate_physmap(struct memop_args *a)
>          }
>          else
>          {
> -            page = alloc_domheap_pages(d, a->extent_order, a->memflags);
> +            if ( is_domain_direct_mapped(d) )
> +            {
> +                mfn = gpfn;
> +                if ( !mfn_valid(mfn) )
> +                {
> +                    gdprintk(XENLOG_INFO, "Invalid mfn %#"PRI_xen_pfn"\n",
> +                             mfn);
> +                    goto out;
> +                }
> +
> +                page = mfn_to_page(mfn);
> +                if ( !get_page(page, d) )
> +                {
> +                    gdprintk(XENLOG_INFO,
> +                             "mfn %#"PRI_xen_pfn" doesn't belong to the"
> +                             " domain\n", mfn);
> +                    goto out;
> +                }
> +                put_page(page);
> +            }
> +            else
> +                page = alloc_domheap_pages(d, a->extent_order, a->memflags);
> +
>              if ( unlikely(page == NULL) ) 
>              {
>                  if ( !opt_tmem || (a->extent_order != 0) )
> @@ -270,6 +296,13 @@ static void decrease_reservation(struct memop_args *a)
>               && p2m_pod_decrease_reservation(a->domain, gmfn, a->extent_order) )
>              continue;
>  
> +        /* With the lack for iommu on some ARM platform, domain with DMA-capable
> +         * device must retrieve the same pfn when the hypercall
> +         * populate_physmap is called.
> +         */
> +        if ( is_domain_direct_mapped(a->domain) )
> +            continue;
> +
>          for ( j = 0; j < (1 << a->extent_order); j++ )
>              if ( !guest_remove_page(a->domain, gmfn + j) )
>                  goto out;
> diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
> index 28d39a0..e2202a6 100644
> --- a/xen/include/asm-arm/domain.h
> +++ b/xen/include/asm-arm/domain.h
> @@ -86,6 +86,9 @@ enum domain_type {
>  #define is_pv64_domain(d) (0)
>  #endif
>  
> +extern int dom0_11_mapping;
> +#define is_domain_direct_mapped(d) ((d) == dom0 && dom0_11_mapping)
> +
>  struct vtimer {
>          struct vcpu *v;
>          int irq;
> -- 
> 1.7.10.4
>
Ian Campbell Dec. 19, 2013, 1:51 p.m. UTC | #2
On Tue, 2013-12-17 at 14:55 +0000, Stefano Stabellini wrote:
> On Tue, 17 Dec 2013, Julien Grall wrote:
> > With the lack of iommu, dom0 must have a 1:1 memory mapping for all
> > these guest physical address. When the ballon decides to give back a
> > page to the kernel, this page must have the same address as previously.
> > Otherwise, we will loose the 1:1 mapping and will break DMA-capable
> > devices.
> > 
> > Signed-off-by: Julien Grall <julien.grall@linaro.org>
> > Reviewed-by: Jan Beulich <jbeulich@suse.com>
> > Cc: Keir Fraser <keir@xen.org>
> 
> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>

Keir, any objections to this patch?

> 
> 
> >     Release: This is a bug that prevents DMA-capable devices to work after
> >     a guest has started.
> > 
> >     Changes in v6:
> >         - Use # instead of 0x
> >         - Make sure that d is evaluated in is_domain_direct_mapped
> >     Changes in v5:
> >         - Export dom0_11_mapping and transform is_domain_direct_mapped in macro
> >         - Add ifndef in common code to define is_domain_direct_mapped
> >     Changes in v4:
> >         - Fix typoes
> >         - Update comment in the code
> >     Changes in v3:
> >         - Remove spurious page = NULL
> >         - Rename is_dom0_mapped_11 to is_domain_direct_mapped
> >         - Coding style
> >     Changes in v2:
> >         - Drop CONFIG_ARM and add is_dom0_mapped_11
> > ---
> >  xen/arch/arm/domain_build.c  |    2 +-
> >  xen/common/memory.c          |   35 ++++++++++++++++++++++++++++++++++-
> >  xen/include/asm-arm/domain.h |    3 +++
> >  3 files changed, 38 insertions(+), 2 deletions(-)
> > 
> > diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
> > index faff88e..47b781b 100644
> > --- a/xen/arch/arm/domain_build.c
> > +++ b/xen/arch/arm/domain_build.c
> > @@ -22,7 +22,7 @@
> >  static unsigned int __initdata opt_dom0_max_vcpus;
> >  integer_param("dom0_max_vcpus", opt_dom0_max_vcpus);
> >  
> > -static int dom0_11_mapping = 1;
> > +int dom0_11_mapping = 1;
> >  
> >  #define DOM0_MEM_DEFAULT 0x8000000 /* 128 MiB */
> >  static u64 __initdata dom0_mem = DOM0_MEM_DEFAULT;
> > diff --git a/xen/common/memory.c b/xen/common/memory.c
> > index eb7b72b..51f11ff 100644
> > --- a/xen/common/memory.c
> > +++ b/xen/common/memory.c
> > @@ -29,6 +29,10 @@
> >  #include <xsm/xsm.h>
> >  #include <xen/trace.h>
> >  
> > +#ifndef is_domain_direct_mapped
> > +# define is_domain_direct_mapped(d) ((void)(d), 0)
> > +#endif
> > +
> >  struct memop_args {
> >      /* INPUT */
> >      struct domain *domain;     /* Domain to be affected. */
> > @@ -122,7 +126,29 @@ static void populate_physmap(struct memop_args *a)
> >          }
> >          else
> >          {
> > -            page = alloc_domheap_pages(d, a->extent_order, a->memflags);
> > +            if ( is_domain_direct_mapped(d) )
> > +            {
> > +                mfn = gpfn;
> > +                if ( !mfn_valid(mfn) )
> > +                {
> > +                    gdprintk(XENLOG_INFO, "Invalid mfn %#"PRI_xen_pfn"\n",
> > +                             mfn);
> > +                    goto out;
> > +                }
> > +
> > +                page = mfn_to_page(mfn);
> > +                if ( !get_page(page, d) )
> > +                {
> > +                    gdprintk(XENLOG_INFO,
> > +                             "mfn %#"PRI_xen_pfn" doesn't belong to the"
> > +                             " domain\n", mfn);
> > +                    goto out;
> > +                }
> > +                put_page(page);
> > +            }
> > +            else
> > +                page = alloc_domheap_pages(d, a->extent_order, a->memflags);
> > +
> >              if ( unlikely(page == NULL) ) 
> >              {
> >                  if ( !opt_tmem || (a->extent_order != 0) )
> > @@ -270,6 +296,13 @@ static void decrease_reservation(struct memop_args *a)
> >               && p2m_pod_decrease_reservation(a->domain, gmfn, a->extent_order) )
> >              continue;
> >  
> > +        /* With the lack for iommu on some ARM platform, domain with DMA-capable
> > +         * device must retrieve the same pfn when the hypercall
> > +         * populate_physmap is called.
> > +         */
> > +        if ( is_domain_direct_mapped(a->domain) )
> > +            continue;
> > +
> >          for ( j = 0; j < (1 << a->extent_order); j++ )
> >              if ( !guest_remove_page(a->domain, gmfn + j) )
> >                  goto out;
> > diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
> > index 28d39a0..e2202a6 100644
> > --- a/xen/include/asm-arm/domain.h
> > +++ b/xen/include/asm-arm/domain.h
> > @@ -86,6 +86,9 @@ enum domain_type {
> >  #define is_pv64_domain(d) (0)
> >  #endif
> >  
> > +extern int dom0_11_mapping;
> > +#define is_domain_direct_mapped(d) ((d) == dom0 && dom0_11_mapping)
> > +
> >  struct vtimer {
> >          struct vcpu *v;
> >          int irq;
> > -- 
> > 1.7.10.4
> >
Ian Campbell Jan. 7, 2014, 1:53 p.m. UTC | #3
On Mon, 2014-01-06 at 11:48 +0000, Ian Campbell wrote:
> On Mon, 2014-01-06 at 11:44 +0000, Julien Grall wrote:
> > 
> > On 12/19/2013 01:51 PM, Ian Campbell wrote:
> > > On Tue, 2013-12-17 at 14:55 +0000, Stefano Stabellini wrote:
> > >> On Tue, 17 Dec 2013, Julien Grall wrote:
> > >>> With the lack of iommu, dom0 must have a 1:1 memory mapping for all
> > >>> these guest physical address. When the ballon decides to give back a
> > >>> page to the kernel, this page must have the same address as previously.
> > >>> Otherwise, we will loose the 1:1 mapping and will break DMA-capable
> > >>> devices.
> > >>>
> > >>> Signed-off-by: Julien Grall <julien.grall@linaro.org>
> > >>> Reviewed-by: Jan Beulich <jbeulich@suse.com>
> > >>> Cc: Keir Fraser <keir@xen.org>
> > >>
> > >> Acked-by: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
> > >
> > > Keir, any objections to this patch?
> > 
> > Hi Ian,
> > 
> > Do we need to wait Keir Ack?
> 
> I think he's had ample opportunity to object (last call!) and since this
> code is explicitly dead on everything apart from ARM I intend to commit
> it next time I go through my queue.

Which I've now done.
diff mbox

Patch

diff --git a/xen/arch/arm/domain_build.c b/xen/arch/arm/domain_build.c
index faff88e..47b781b 100644
--- a/xen/arch/arm/domain_build.c
+++ b/xen/arch/arm/domain_build.c
@@ -22,7 +22,7 @@ 
 static unsigned int __initdata opt_dom0_max_vcpus;
 integer_param("dom0_max_vcpus", opt_dom0_max_vcpus);
 
-static int dom0_11_mapping = 1;
+int dom0_11_mapping = 1;
 
 #define DOM0_MEM_DEFAULT 0x8000000 /* 128 MiB */
 static u64 __initdata dom0_mem = DOM0_MEM_DEFAULT;
diff --git a/xen/common/memory.c b/xen/common/memory.c
index eb7b72b..51f11ff 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -29,6 +29,10 @@ 
 #include <xsm/xsm.h>
 #include <xen/trace.h>
 
+#ifndef is_domain_direct_mapped
+# define is_domain_direct_mapped(d) ((void)(d), 0)
+#endif
+
 struct memop_args {
     /* INPUT */
     struct domain *domain;     /* Domain to be affected. */
@@ -122,7 +126,29 @@  static void populate_physmap(struct memop_args *a)
         }
         else
         {
-            page = alloc_domheap_pages(d, a->extent_order, a->memflags);
+            if ( is_domain_direct_mapped(d) )
+            {
+                mfn = gpfn;
+                if ( !mfn_valid(mfn) )
+                {
+                    gdprintk(XENLOG_INFO, "Invalid mfn %#"PRI_xen_pfn"\n",
+                             mfn);
+                    goto out;
+                }
+
+                page = mfn_to_page(mfn);
+                if ( !get_page(page, d) )
+                {
+                    gdprintk(XENLOG_INFO,
+                             "mfn %#"PRI_xen_pfn" doesn't belong to the"
+                             " domain\n", mfn);
+                    goto out;
+                }
+                put_page(page);
+            }
+            else
+                page = alloc_domheap_pages(d, a->extent_order, a->memflags);
+
             if ( unlikely(page == NULL) ) 
             {
                 if ( !opt_tmem || (a->extent_order != 0) )
@@ -270,6 +296,13 @@  static void decrease_reservation(struct memop_args *a)
              && p2m_pod_decrease_reservation(a->domain, gmfn, a->extent_order) )
             continue;
 
+        /* With the lack for iommu on some ARM platform, domain with DMA-capable
+         * device must retrieve the same pfn when the hypercall
+         * populate_physmap is called.
+         */
+        if ( is_domain_direct_mapped(a->domain) )
+            continue;
+
         for ( j = 0; j < (1 << a->extent_order); j++ )
             if ( !guest_remove_page(a->domain, gmfn + j) )
                 goto out;
diff --git a/xen/include/asm-arm/domain.h b/xen/include/asm-arm/domain.h
index 28d39a0..e2202a6 100644
--- a/xen/include/asm-arm/domain.h
+++ b/xen/include/asm-arm/domain.h
@@ -86,6 +86,9 @@  enum domain_type {
 #define is_pv64_domain(d) (0)
 #endif
 
+extern int dom0_11_mapping;
+#define is_domain_direct_mapped(d) ((d) == dom0 && dom0_11_mapping)
+
 struct vtimer {
         struct vcpu *v;
         int irq;