From patchwork Mon Aug 14 14:23:51 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Julien Grall X-Patchwork-Id: 110013 Delivered-To: patch@linaro.org Received: by 10.182.109.195 with SMTP id hu3csp4281732obb; Mon, 14 Aug 2017 07:26:26 -0700 (PDT) X-Received: by 10.107.169.81 with SMTP id s78mr19636705ioe.249.1502720786185; Mon, 14 Aug 2017 07:26:26 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1502720786; cv=none; d=google.com; s=arc-20160816; b=MkGZ2V50gR7z8MutBf+HbiNRzAvkYmhTsCI+RUAlVGsV5VqpwGU3M8l/xyW4sd4qGB T6q1VphH0tgVz7nvsQg1yfZgw7x+/xSB+3dk8QT5hZmNwGmzmF1yenVLmgHBAhXhuSav 9suvhVRCQlHCWifoKcjqJHMJNSqcbPc35uOPR3yCnoAHZPIPuocmb/tqyQ7H7OSPk7na AQ8AjB55D3s3yHrlb8Gu353VV0GNKSnOqIV2TUVmyERXGf9KNcOJjaXkWgmt3HIURDiW 26r23Wdl/YEecvxq54KdRWTrLYK8/uPwgoghRKuIM0BZu4X17fwktxidUPlsk+NWdpco MFJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=sender:errors-to:content-transfer-encoding:mime-version :list-subscribe:list-help:list-post:list-unsubscribe:list-id :precedence:subject:cc:message-id:date:to:from :arc-authentication-results; bh=I/EosOPbVNqU9sIel8GRwlsiKAKMSorJ+EQgYSZEzM8=; b=MkWC05JjrN49OsB+butq77UE/LqCwaq4MVbTr8KURLnEagD2b9nFfX5AYMvtPuZzio wlZAXz8yAaFo0WQuP9UEqc23KnCaHQkSl6+QFZN55zlap8Js9iX1VINdCtW9114lRf99 FzeHcF9UQbYy/yFnD8IfCQX35PG5mB2klYFLJhm89VCHz5UianoqcG/o3z65Qqpaf/Md pfRV4UvzLTPosFROCjdhMUds2Hy0mTCvQv+7kPR93ltoj5LwHfGvhrnjojuH8/NtDQ5X XsVcaaeLo8l0OuVRElxLsjflWyi8IU2Kzj8QF9Hbymp/SXY5gcRRvJHKZTTkdpijBTfc Qtpw== ARC-Authentication-Results: i=1; mx.google.com; spf=neutral (google.com: 192.237.175.120 is neither permitted nor denied by best guess record for domain of xen-devel-bounces@lists.xen.org) smtp.mailfrom=xen-devel-bounces@lists.xen.org Return-Path: Received: from lists.xenproject.org (lists.xenproject.org. [192.237.175.120]) by mx.google.com with ESMTPS id b125si3329252ith.104.2017.08.14.07.26.25 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 14 Aug 2017 07:26:26 -0700 (PDT) Received-SPF: neutral (google.com: 192.237.175.120 is neither permitted nor denied by best guess record for domain of xen-devel-bounces@lists.xen.org) client-ip=192.237.175.120; Authentication-Results: mx.google.com; spf=neutral (google.com: 192.237.175.120 is neither permitted nor denied by best guess record for domain of xen-devel-bounces@lists.xen.org) smtp.mailfrom=xen-devel-bounces@lists.xen.org Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dhGIE-0000AP-8o; Mon, 14 Aug 2017 14:24:34 +0000 Received: from mail6.bemta6.messagelabs.com ([193.109.254.103]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1dhGIC-0000A7-Pc for xen-devel@lists.xen.org; Mon, 14 Aug 2017 14:24:32 +0000 Received: from [85.158.143.35] by server-3.bemta-6.messagelabs.com id E5/59-03044-0A2B1995; Mon, 14 Aug 2017 14:24:32 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFrrLLMWRWlGSWpSXmKPExsVysyfVTXf+pom RBjPWS1ss+biYxYHR4+ju30wBjFGsmXlJ+RUJrBlnes+xFeyQqph4dCFrA2OjaBcjF4eQwCZG iTeLvrBAOKcZJV5Mf87UxcjJwSagKXHn8ycwW0RAWuLa58uMIEXMAjOYJRaeu8sKkhAWsJR4M GM/WBGLgKrEi1Pn2EFsXqD4k1fzGUFsCQF5iV1tF1knMHIuYGRYxahenFpUllqka6GXVJSZnl GSm5iZo2toYKaXm1pcnJiempOYVKyXnJ+7iRHoMQYg2ME4+7L/IUZJDiYlUd4En95IIb6k/JT KjMTijPii0pzU4kOMMhwcShK8qRsnRgoJFqWmp1akZeYAQwcmLcHBoyTCOwskzVtckJhbnJkO kTrFaM+xYfX6L0wcl/o2AMmOGT+/MXG8mvD/G5MQS15+XqqUOO+rDUBtAiBtGaV5cENhoX6JU VZKmJcR6EwhnoLUotzMElT5V4ziHIxKwrxOIMt5MvNK4Ha/AjqLCeisPpCPeItLEhFSUg2MAb sKE2fsM8mNOLCPf+5pA/G0ziwHZaffdZJV96cxbZuj17ZNxPiJnN+vNu9oxdnzJ3WuCmxicmI Idd12QezRX4YnX7VEHr7he7s10+bfvORKDrWSUwJqq564F+XzMtVcnF+wjStx30/nPRpiOWfO ivgoVd1lW9Ecnfgx2T1zy8ov2nGfJ/1WYinOSDTUYi4qTgQABDuGOHACAAA= X-Env-Sender: julien.grall@arm.com X-Msg-Ref: server-12.tower-21.messagelabs.com!1502720670!77838644!1 X-Originating-IP: [217.140.101.70] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 9.4.45; banners=-,-,- X-VirusChecked: Checked Received: (qmail 59269 invoked from network); 14 Aug 2017 14:24:31 -0000 Received: from usa-sjc-mx-foss1.foss.arm.com (HELO foss.arm.com) (217.140.101.70) by server-12.tower-21.messagelabs.com with SMTP; 14 Aug 2017 14:24:31 -0000 Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 0C68B80D; Mon, 14 Aug 2017 07:24:30 -0700 (PDT) Received: from e108454-lin.cambridge.arm.com (e108454-lin.cambridge.arm.com [10.1.206.53]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPSA id EABE13F483; Mon, 14 Aug 2017 07:24:27 -0700 (PDT) From: Julien Grall To: xen-devel@lists.xen.org Date: Mon, 14 Aug 2017 15:23:51 +0100 Message-Id: <20170814142418.13267-1-julien.grall@arm.com> X-Mailer: git-send-email 2.11.0 Cc: sstabellini@kernel.org, Wei Liu , George Dunlap , andre.przywara@arm.com, Ian Jackson , Tim Deegan , Ross Lagerwall , Julien Grall , Jan Beulich , Andrew Cooper Subject: [Xen-devel] [PATCH 00/27] xen/arm: Memory subsystem clean-up X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" Hi all, This patch series contains clean-up for the ARM Memory subsystem in preparation of reworking the page tables handling. A branch with the patches can be found on xenbits: https://xenbits.xen.org/git-http/people/julieng/xen-unstable.git branch mm-cleanup-v1 Cheers, Cc: Andrew Cooper Cc: George Dunlap Cc: Ian Jackson Cc: Jan Beulich Cc: Konrad Rzeszutek Wilk Cc: Stefano Stabellini Cc: Tim Deegan Cc: Wei Liu Cc: Ross Lagerwall Julien Grall (27): xen/x86: numa: Don't check alloc_boot_pages return xen/x86: srat: Don't check alloc_boot_pages return xen/x86: mm: Don't check alloc_boot_pages return xen/mm: Move {G,M]FN <-> {G,M}ADDR helpers to common code xen/mm: Use typesafe MFN for alloc_boot_pages return xen/mm: Use __virt_to_mfn in map_domain_page instead of virt_to_mfn xen/arm: mm: Redefine mfn_to_virt to use typesafe xen/arm: hsr_iabt: Document RES0 field xen/arm: traps: Don't define FAR_EL2 for ARM32 xen/arm: arm32: Don't define FAR_EL1 xen/arm: Add FnV field in hsr_*abt xen/arm: Introduce hsr_xabt to gather common bits between hsr_dabt and xen/arm: traps: Introduce a helper to read the hypersivor fault register xen/arm: traps: Improve logging for data/prefetch abort fault xen/arm: Replace ioremap_attr(PAGE_HYPERVISOR_NOCACHE) call by ioremap_nocache xen/arm: page: Remove unused attributes DEV_NONSHARED and DEV_CACHED xen/arm: page: Use directly BUFFERABLE and drop DEV_WC xen/arm: page: Prefix memory types with MT_ xen/arm: page: Clean-up the definition of MAIRVAL xen/arm: page: Use ARMv8 naming to improve readability xen/arm: mm: Rename and clarify AP[1] in the stage-1 page table xen/arm: Switch to SYS_STATE_boot just after end_boot_allocator() xen/arm: mm: Rename 'ai' into 'flags' in create_xen_entries xen/arm: page: Describe the layout of flags used to update page tables xen/arm: mm: Embed permission in the flags xen/arm: mm: Handling permission flags when adding a new mapping xen/arm: mm: Use memory flags for modify_xen_mappings rather than custom one xen/arch/arm/kernel.c | 2 +- xen/arch/arm/livepatch.c | 6 +-- xen/arch/arm/mm.c | 79 +++++++++++++++++------------- xen/arch/arm/platforms/exynos5.c | 2 +- xen/arch/arm/platforms/omap5.c | 6 +-- xen/arch/arm/platforms/vexpress.c | 2 +- xen/arch/arm/setup.c | 12 +++-- xen/arch/arm/traps.c | 52 +++++++++++++++++--- xen/arch/x86/mm.c | 8 +-- xen/arch/x86/numa.c | 10 +--- xen/arch/x86/srat.c | 7 +-- xen/common/page_alloc.c | 7 ++- xen/drivers/acpi/osl.c | 2 +- xen/drivers/video/arm_hdlcd.c | 2 +- xen/include/asm-arm/cpregs.h | 2 - xen/include/asm-arm/lpae.h | 2 +- xen/include/asm-arm/mm.h | 7 +-- xen/include/asm-arm/page.h | 100 ++++++++++++++++++++++---------------- xen/include/asm-arm/processor.h | 25 ++++++++-- xen/include/xen/domain_page.h | 2 +- xen/include/xen/mm.h | 9 +++- 21 files changed, 204 insertions(+), 140 deletions(-)