From patchwork Wed Jun 12 21:29:36 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 1947131 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256 header.s=selector1 header.b=hoX5PMgV; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VzzNG4gW3z20KL for ; Thu, 13 Jun 2024 07:35:10 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sHVcQ-0006ge-3b; Wed, 12 Jun 2024 17:34:58 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVcO-0006gS-LA for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:34:56 -0400 Received: from mail-mw2nam10on2071.outbound.protection.outlook.com ([40.107.94.71] helo=NAM10-MW2-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVcM-0003oF-Hh for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:34:56 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=c/fgsgFE8JBsc9yQZGX59NotLq0hADlBIVKD0IJrKDvoxGg8K8x7Mn+3M3+73VuJqkyY4fgvlo+RQUxdF+2CzcQNlow+oHXxhFO2ZxMYwVyKfczVqFsjubBkfMULF3rQ6tZIX0IwQPC+VluvzV3mlHOOWQHxqkbAf3L77iC29GrFR2Yf55zdM/2IC6s+mJaHjwoNWjE73ySxAeFI/pJ/HCIb8rar5gMzyPuFMzWvR4NSRkvi8C20w3trBBY3nftQ/wObqm2LPi2nY+gumo3NE7nhKu9jfMdKi0CqiscUNwjfnJfCj2l/wcaZTFfJRkobHNn13GnH0z6bhPvzN3KPTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=jO4UHVrqZMP3djoXDVI4YZ6oy2MK9x1fZiqbu8aBG/Y=; b=W2rAZHEqYIgDJgCYFjBzfCBgoXQvUcxDiTtnOcM6lhgIXsJBTmJEf8hyBMW7MK2IWtJ+OLcdJFt3nlcOrD5H/URAI7zeaKZLDaCiemCMjaclXUHvqnv5nf7wyMoN0uxg1gO3WfAGIqMPXT1NkKJq2eAfvuGd/DSuw5vHAH+GVK63jLJofG78dWeUFqYjObZSVNRNzDJczaZBv8zLcFh94KybL5WCXyle17MjR9zoploKBjguztwyBMY4KSpImYCeNSjIUknZwNySWzbfKdZImrTXisMktXu1o9KTtwDTTR8Pmddzt8M2jdLxWl0Wafmq+mQuWL3I5dirdjl17TwYyg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=nongnu.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jO4UHVrqZMP3djoXDVI4YZ6oy2MK9x1fZiqbu8aBG/Y=; b=hoX5PMgVYcAkjC3mjUipzJ1t/mQkY108f2zFYO+lSvetnHUCP1eX+e8bJQEmQcKhtZPDHoHBlcgL/pje2ITfcVaN609K/7m0o4Bl1yBqX2VUnN40pUq3jtLZNGIP84Tlgu4aIhjt2/Dc5LuYinR+Dtug9zwNyFiDKG8qYuBEfjk= Received: from SJ0PR03CA0187.namprd03.prod.outlook.com (2603:10b6:a03:2ef::12) by DS0PR12MB7726.namprd12.prod.outlook.com (2603:10b6:8:130::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.36; Wed, 12 Jun 2024 21:29:49 +0000 Received: from SJ5PEPF000001CC.namprd05.prod.outlook.com (2603:10b6:a03:2ef:cafe::6b) by SJ0PR03CA0187.outlook.office365.com (2603:10b6:a03:2ef::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.20 via Frontend Transport; Wed, 12 Jun 2024 21:29:49 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C Received: from SATLEXMB03.amd.com (165.204.84.17) by SJ5PEPF000001CC.mail.protection.outlook.com (10.167.242.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7677.15 via Frontend Transport; Wed, 12 Jun 2024 21:29:48 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Wed, 12 Jun 2024 16:29:47 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Wed, 12 Jun 2024 16:29:41 -0500 From: Stefano Stabellini To: CC: , , , , "Edgar E. Iglesias" , =?utf-8?q?Philippe_Mathieu-Da?= =?utf-8?q?ud=C3=A9?= Subject: [PULL 1/5] xen: mapcache: Make MCACHE_BUCKET_SHIFT runtime configurable Date: Wed, 12 Jun 2024 16:29:36 -0500 Message-ID: <20240612212940.2178248-1-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB03.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF000001CC:EE_|DS0PR12MB7726:EE_ X-MS-Office365-Filtering-Correlation-Id: 7ecc0ff9-e20b-44a1-1ee2-08dc8b26c9d4 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230034|376008|1800799018|82310400020|36860700007; X-Microsoft-Antispam-Message-Info: =?utf-8?q?k2m8ML4Ivzu401cv7V8BQIjNc7yOoHR?= =?utf-8?q?tSE2+h3JU9zSfKt17wdG4PG+Dn8EBDyBS+pAvnpZoVoz5S21TmhyhOs33jIn2Pl+A?= =?utf-8?q?1d8DT0+nrWS4jbgby3JAeZrIoYTIVNy8Keovw1/jklPZ3NN54gSYUuZ6mtl8iF4zZ?= =?utf-8?q?fcyPuYlBpJQ8SaUWKpBSFX1y3hb0Mr1Y+OL4HfyvicxmAk1+pN9OWAv49WCkQaD/V?= =?utf-8?q?AQDOSVy7itmwcjxUwgHxytWo1axyMBB7eJpMOe+GTWn6uodJom2b3TseHLdZwo2n1?= =?utf-8?q?0dCMfWfEgy591DKSMlPI0e3RDJ+KeHiuL6RPEDg6z6By0J3lYpPvx17BUZwDq56nK?= =?utf-8?q?fErOC7/gczr13NOYa/ckGku4P0FJory/fC6o2FP/epIyfjnPxgorS6jDfq3AKROLE?= =?utf-8?q?rAhxS71prg2QYYVzPexHGwT6A+ociwf772JV6dprhkmhhE+N7SxydxoHIpdPeXRW/?= =?utf-8?q?CIpccub2i4CEkMBFZmdQQ7pCvuSmu4PDcLnRUrnFVLJIn1XTnBMFsTZSZd0Z3+nGQ?= =?utf-8?q?zTxhPyKIe9BY6Fu9rn67SuSD6x+d8wljcligTKKtLm+CIgPv//aCfNsCEWTg17FVy?= =?utf-8?q?UOFXkIv16zn5mf6tGoJe3F2S4mEYXLJQztib3lMwOCSXv1IeQxvgz8FG6luh1lcZu?= =?utf-8?q?ojkEQ+Fhp5MfcICa93OMq9VdO6C+sT4y8ZTCL+xpK5MZMcyH12lpMi3YymS/wyNj+?= =?utf-8?q?lpZjvnxPLIC2CDw5CpMfFYBK4/EeHCkSj0k0JrUCshPoIbrAGSHRHeZ5vy6jDA2bM?= =?utf-8?q?k2iKF4wJDR5ilgaKXPBW5Pbapa5KqNpzNGZFsSqLOW6BTHAwrLw4NGBg0J79gAbtB?= =?utf-8?q?gX7nC57iiJgWtFSgwhHdRsgqKjoa4PqERL/+0MH2ZzEIsYtNVF2tNXZc+7VDeT0w2?= =?utf-8?q?0eMvskQxiNolm/DosrGwarhtwJcI/SEdPfv461xHIm/FetzLz2UcZ4rHG53H3yXaz?= =?utf-8?q?/ElICtDLjcyNIRdK9vsxoHthzWe2APV91tbV4EuED65GoCadYDILkpX6oj2nNsV+E?= =?utf-8?q?HdlDnUDXy+tc+gfy3kYfMLK0qz6LAT7tuAW6B+j+OSlCTggIEGIaoDGUGaa/T+C+b?= =?utf-8?q?AvbXf6aAY8af6siTh2YY1qRqGLwgRQW0PwA7gF4QRTJG78D03rbXY8sFAezshNTb6?= =?utf-8?q?MtfWVThMpAzwBwLUw8CiUo/eZK6eEFZrkO1YS7uvHEVuvebV9IbhWOqD1a/HbE/7Z?= =?utf-8?q?LoARZ1uuGxJdNWlJ/pSi6l6h6lVV7G7Di8uqdS+FPe8dKSE6jm5eT513NLQ5cVIbC?= =?utf-8?q?zqA+c2KQeVld7+n1rhtLQ/HvrI/5orAxncVcQTDozmbNBYF9th+VpIIDEmgAOmO+B?= =?utf-8?q?luSb/eDMDmz1y+W1YnlGOkbKL0xPLLBpGA=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:SATLEXMB03.amd.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230034)(376008)(1800799018)(82310400020)(36860700007); DIR:OUT; SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jun 2024 21:29:48.7470 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 7ecc0ff9-e20b-44a1-1ee2-08dc8b26c9d4 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17]; Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF000001CC.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB7726 Received-SPF: permerror client-ip=40.107.94.71; envelope-from=stefano.stabellini@amd.com; helo=NAM10-MW2-obe.outbound.protection.outlook.com X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.143, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H2=-0.001, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: "Edgar E. Iglesias" Make MCACHE_BUCKET_SHIFT runtime configurable per cache instance. Signed-off-by: Edgar E. Iglesias Reviewed-by: Stefano Stabellini Reviewed-by: Philippe Mathieu-Daudé --- hw/xen/xen-mapcache.c | 54 ++++++++++++++++++++++++++----------------- 1 file changed, 33 insertions(+), 21 deletions(-) diff --git a/hw/xen/xen-mapcache.c b/hw/xen/xen-mapcache.c index fa6813b1ad..bc860f4373 100644 --- a/hw/xen/xen-mapcache.c +++ b/hw/xen/xen-mapcache.c @@ -23,13 +23,10 @@ #if HOST_LONG_BITS == 32 -# define MCACHE_BUCKET_SHIFT 16 # define MCACHE_MAX_SIZE (1UL<<31) /* 2GB Cap */ #else -# define MCACHE_BUCKET_SHIFT 20 # define MCACHE_MAX_SIZE (1UL<<35) /* 32GB Cap */ #endif -#define MCACHE_BUCKET_SIZE (1UL << MCACHE_BUCKET_SHIFT) /* This is the size of the virtual address space reserve to QEMU that will not * be use by MapCache. @@ -65,7 +62,8 @@ typedef struct MapCache { /* For most cases (>99.9%), the page address is the same. */ MapCacheEntry *last_entry; unsigned long max_mcache_size; - unsigned int mcache_bucket_shift; + unsigned int bucket_shift; + unsigned long bucket_size; phys_offset_to_gaddr_t phys_offset_to_gaddr; QemuMutex lock; @@ -95,11 +93,14 @@ static inline int test_bits(int nr, int size, const unsigned long *addr) static MapCache *xen_map_cache_init_single(phys_offset_to_gaddr_t f, void *opaque, + unsigned int bucket_shift, unsigned long max_size) { unsigned long size; MapCache *mc; + assert(bucket_shift >= XC_PAGE_SHIFT); + mc = g_new0(MapCache, 1); mc->phys_offset_to_gaddr = f; @@ -108,12 +109,14 @@ static MapCache *xen_map_cache_init_single(phys_offset_to_gaddr_t f, QTAILQ_INIT(&mc->locked_entries); + mc->bucket_shift = bucket_shift; + mc->bucket_size = 1UL << bucket_shift; mc->max_mcache_size = max_size; mc->nr_buckets = (((mc->max_mcache_size >> XC_PAGE_SHIFT) + - (1UL << (MCACHE_BUCKET_SHIFT - XC_PAGE_SHIFT)) - 1) >> - (MCACHE_BUCKET_SHIFT - XC_PAGE_SHIFT)); + (1UL << (bucket_shift - XC_PAGE_SHIFT)) - 1) >> + (bucket_shift - XC_PAGE_SHIFT)); size = mc->nr_buckets * sizeof(MapCacheEntry); size = (size + XC_PAGE_SIZE - 1) & ~(XC_PAGE_SIZE - 1); @@ -126,6 +129,13 @@ void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque) { struct rlimit rlimit_as; unsigned long max_mcache_size; + unsigned int bucket_shift; + + if (HOST_LONG_BITS == 32) { + bucket_shift = 16; + } else { + bucket_shift = 20; + } if (geteuid() == 0) { rlimit_as.rlim_cur = RLIM_INFINITY; @@ -146,7 +156,9 @@ void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque) } } - mapcache = xen_map_cache_init_single(f, opaque, max_mcache_size); + mapcache = xen_map_cache_init_single(f, opaque, + bucket_shift, + max_mcache_size); setrlimit(RLIMIT_AS, &rlimit_as); } @@ -195,7 +207,7 @@ static void xen_remap_bucket(MapCache *mc, entry->valid_mapping = NULL; for (i = 0; i < nb_pfn; i++) { - pfns[i] = (address_index << (MCACHE_BUCKET_SHIFT-XC_PAGE_SHIFT)) + i; + pfns[i] = (address_index << (mc->bucket_shift - XC_PAGE_SHIFT)) + i; } /* @@ -266,8 +278,8 @@ static uint8_t *xen_map_cache_unlocked(MapCache *mc, bool dummy = false; tryagain: - address_index = phys_addr >> MCACHE_BUCKET_SHIFT; - address_offset = phys_addr & (MCACHE_BUCKET_SIZE - 1); + address_index = phys_addr >> mc->bucket_shift; + address_offset = phys_addr & (mc->bucket_size - 1); trace_xen_map_cache(phys_addr); @@ -294,14 +306,14 @@ tryagain: return mc->last_entry->vaddr_base + address_offset; } - /* size is always a multiple of MCACHE_BUCKET_SIZE */ + /* size is always a multiple of mc->bucket_size */ if (size) { cache_size = size + address_offset; - if (cache_size % MCACHE_BUCKET_SIZE) { - cache_size += MCACHE_BUCKET_SIZE - (cache_size % MCACHE_BUCKET_SIZE); + if (cache_size % mc->bucket_size) { + cache_size += mc->bucket_size - (cache_size % mc->bucket_size); } } else { - cache_size = MCACHE_BUCKET_SIZE; + cache_size = mc->bucket_size; } entry = &mc->entry[address_index % mc->nr_buckets]; @@ -422,7 +434,7 @@ static ram_addr_t xen_ram_addr_from_mapcache_single(MapCache *mc, void *ptr) trace_xen_ram_addr_from_mapcache_not_in_cache(ptr); raddr = RAM_ADDR_INVALID; } else { - raddr = (reventry->paddr_index << MCACHE_BUCKET_SHIFT) + + raddr = (reventry->paddr_index << mc->bucket_shift) + ((unsigned long) ptr - (unsigned long) entry->vaddr_base); } mapcache_unlock(mc); @@ -585,8 +597,8 @@ static uint8_t *xen_replace_cache_entry_unlocked(MapCache *mc, hwaddr address_index, address_offset; hwaddr test_bit_size, cache_size = size; - address_index = old_phys_addr >> MCACHE_BUCKET_SHIFT; - address_offset = old_phys_addr & (MCACHE_BUCKET_SIZE - 1); + address_index = old_phys_addr >> mc->bucket_shift; + address_offset = old_phys_addr & (mc->bucket_size - 1); assert(size); /* test_bit_size is always a multiple of XC_PAGE_SIZE */ @@ -595,8 +607,8 @@ static uint8_t *xen_replace_cache_entry_unlocked(MapCache *mc, test_bit_size += XC_PAGE_SIZE - (test_bit_size % XC_PAGE_SIZE); } cache_size = size + address_offset; - if (cache_size % MCACHE_BUCKET_SIZE) { - cache_size += MCACHE_BUCKET_SIZE - (cache_size % MCACHE_BUCKET_SIZE); + if (cache_size % mc->bucket_size) { + cache_size += mc->bucket_size - (cache_size % mc->bucket_size); } entry = &mc->entry[address_index % mc->nr_buckets]; @@ -609,8 +621,8 @@ static uint8_t *xen_replace_cache_entry_unlocked(MapCache *mc, return NULL; } - address_index = new_phys_addr >> MCACHE_BUCKET_SHIFT; - address_offset = new_phys_addr & (MCACHE_BUCKET_SIZE - 1); + address_index = new_phys_addr >> mc->bucket_shift; + address_offset = new_phys_addr & (mc->bucket_size - 1); trace_xen_replace_cache_entry_dummy(old_phys_addr, new_phys_addr); From patchwork Wed Jun 12 21:29:37 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 1947127 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256 header.s=selector1 header.b=VQOWTdBG; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VzzGs1jLdz20Pb for ; Thu, 13 Jun 2024 07:30:29 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sHVXt-0001VB-SO; Wed, 12 Jun 2024 17:30:17 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXp-0001PA-7c for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:13 -0400 Received: from mail-mw2nam10on20629.outbound.protection.outlook.com ([2a01:111:f403:2412::629] helo=NAM10-MW2-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXm-0002o7-Ui for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:12 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Vq8FZZ4cmbC8kpW+HwXQinPmacIs5AyPT4J5apDpX07xwOvxMPtexStmGBPCnrq0fAh0dfAuGVGpoHbNXPUMcwR6hd/sQGutY1hHD6oguq26Gkby+q9uRNOOh67bXApRc3qa6At5XOou7zx+H/CmOxesytm9pa7+UbkMEtNt7DJPtzzKHfyibZXguS0fMoLfqn8DSwtjufiBhCJoK2WyKQkDz95LQCKaUXKEbGINBgp1yCOcKQX5CPWlCQKij/pdRNCXfJN4bpZGCzcearz42EeEIEehu7c8lHGzeP+0AeCZT9EUYY6iBNF1Gr0bPa05oWdNj6dYIDaLjy04VxyG2Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=GMJ7KkTrwysosIa9wix1W+C3OTxXI/gaCPR0zSc7XW0=; b=XkFc1qjoIMkwFxtnWH6CIO4/y3xNcZ5YKPEbgPtXzelhPsjQ4cMYdwMu4IThsUAAzLM5BfVCS/qQ9yK4UYLEwNc2Q0A1hj/RuUwuwMXU5HS6XdpECkftp4QS/3Tv1FidOdTIaLImnVun0AQF1xVthkuG8wBHVcBRo3iVGU5TvtlQMRMEZTnjf0aTGWM4PRqCc13RUQrioXmJAPbxloMzkp8RCGP2995eFa3KbLElNoy//vm/9rBYDGN3GEcjnyFwGKg6iTstebV2azdIYuLDcrr9DLxaKKMN10d76gCour8rHUBAWBbrf+zcOLHrDQuGRiBe5kvvXPOhq7r2Jg8keQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=nongnu.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GMJ7KkTrwysosIa9wix1W+C3OTxXI/gaCPR0zSc7XW0=; b=VQOWTdBG//GoDBF5DBo15eMI6R1AaHAhDVFwP/uiB1fKADYAjSwItFcAguKfVwYXH1EbC0RscbsWaSC2Iw6nWEqmfyz+OGoKb+ojucxb7Weh14IwtpkWc4cSOrms9OHoZpoH0u9ijff3aVk7+1iVnZiF0cNbK00jhP0P1bfgtpQ= Received: from DM6PR21CA0013.namprd21.prod.outlook.com (2603:10b6:5:174::23) by IA0PR12MB8715.namprd12.prod.outlook.com (2603:10b6:208:487::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.37; Wed, 12 Jun 2024 21:29:58 +0000 Received: from DS1PEPF00017095.namprd03.prod.outlook.com (2603:10b6:5:174:cafe::c2) by DM6PR21CA0013.outlook.office365.com (2603:10b6:5:174::23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.15 via Frontend Transport; Wed, 12 Jun 2024 21:29:55 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DS1PEPF00017095.mail.protection.outlook.com (10.167.17.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7677.15 via Frontend Transport; Wed, 12 Jun 2024 21:29:54 +0000 Received: from SATLEXMB06.amd.com (10.181.40.147) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Wed, 12 Jun 2024 16:29:53 -0500 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB06.amd.com (10.181.40.147) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Wed, 12 Jun 2024 16:29:53 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Wed, 12 Jun 2024 16:29:47 -0500 From: Stefano Stabellini To: CC: , , , , "Edgar E. Iglesias" Subject: [PULL 2/5] xen: mapcache: Unmap first entries in buckets Date: Wed, 12 Jun 2024 16:29:37 -0500 Message-ID: <20240612212940.2178248-2-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF00017095:EE_|IA0PR12MB8715:EE_ X-MS-Office365-Filtering-Correlation-Id: 11834b92-4515-4722-343b-08dc8b26cd77 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230034|376008|1800799018|82310400020|36860700007; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:SATLEXMB04.amd.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230034)(376008)(1800799018)(82310400020)(36860700007); DIR:OUT; SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jun 2024 21:29:54.8958 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 11834b92-4515-4722-343b-08dc8b26cd77 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17]; Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF00017095.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: IA0PR12MB8715 Received-SPF: permerror client-ip=2a01:111:f403:2412::629; envelope-from=stefano.stabellini@amd.com; helo=NAM10-MW2-obe.outbound.protection.outlook.com X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.143, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: "Edgar E. Iglesias" When invalidating memory ranges, if we happen to hit the first entry in a bucket we were never unmapping it. This was harmless for foreign mappings but now that we're looking to reuse the mapcache for transient grant mappings, we must unmap entries when invalidated. Signed-off-by: Edgar E. Iglesias Reviewed-by: Stefano Stabellini --- hw/xen/xen-mapcache.c | 11 ++++++++--- 1 file changed, 8 insertions(+), 3 deletions(-) diff --git a/hw/xen/xen-mapcache.c b/hw/xen/xen-mapcache.c index bc860f4373..ec95445696 100644 --- a/hw/xen/xen-mapcache.c +++ b/hw/xen/xen-mapcache.c @@ -491,18 +491,23 @@ static void xen_invalidate_map_cache_entry_unlocked(MapCache *mc, return; } entry->lock--; - if (entry->lock > 0 || pentry == NULL) { + if (entry->lock > 0) { return; } - pentry->next = entry->next; ram_block_notify_remove(entry->vaddr_base, entry->size, entry->size); if (munmap(entry->vaddr_base, entry->size) != 0) { perror("unmap fails"); exit(-1); } + g_free(entry->valid_mapping); - g_free(entry); + if (pentry) { + pentry->next = entry->next; + g_free(entry); + } else { + memset(entry, 0, sizeof *entry); + } } typedef struct XenMapCacheData { From patchwork Wed Jun 12 21:29:38 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 1947130 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256 header.s=selector1 header.b=pNdYgATe; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VzzHS2G3Xz20Pb for ; Thu, 13 Jun 2024 07:31:00 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sHVXv-0001aY-BW; Wed, 12 Jun 2024 17:30:19 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXr-0001Tv-RM for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:17 -0400 Received: from mail-bn8nam12on20621.outbound.protection.outlook.com ([2a01:111:f403:2418::621] helo=NAM12-BN8-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXp-0002oN-3Q for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:15 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=X5JVm2Q4fbxL61dIGUq0HECnSoZEdAc/dt+zPqPgWWjrHjUeDHfT5jaik0xHslOPF5er5uoScMG7r2d1bEdUH5z6xJsk89KOYwz7gZlMGVWlsDyAR4VYUqpZHrhuzxZ9JDaHL7ngkeOKWgnoFup1O4EXOANb7+/q0xjcMyANtoXL0f91qP6UtmyCrqsz3LOfcpYnPcjLSaG0VFFzt3/23IS0zm59/Y7MOO4cWfPpaq/g4OZ5XuGy51ZUlaePhX35JBOH4GIWdFRlWy9c8QrHvCi8kOf4EvSpwBke9q7H0wvV816GYHz3ACj8xR707JJfVMRf214K55jNV1BlMXM7qA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2mJ+jql/EDqUybJTnjb/85JYlMFA6jZ7hOjOjsOzvs8=; b=Sscn61tOa1TTOltVUnQxFjdcwo7s8q6kZLbdqmXTeaoarqL6OHxt/5LpbIfvjMKyv5/8RqtCC9IrJJOW9z0jvFa63t4vNFv6f6PpWb6RvA8U4/Hv8nvXbWi7aK9ZxO4qL19FRWPhLtfkFtpGEknZxyL4Ts1SPce4FPQ/1mRl0pqTTYIRAYS69nlMykkJayNDbr+hsVZvk0r1XzvqlMT10WbSofeYbqq7oaHBXA8dD04UbNs96CS2ZM8AeEtIhZQ/NK170vu70uBL3Q9MkDFfgsnqrnJtsB6Z7mlLYykMIBTqE7SHBUy4qYbmGY7fmfQxu58qzEShnj10wzTdkF9n4A== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=nongnu.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2mJ+jql/EDqUybJTnjb/85JYlMFA6jZ7hOjOjsOzvs8=; b=pNdYgATeHKFi1Yp8QqDLXMoq11IB1seHvah7purc7hUJW0N6VY+AMv06bSGY6UtpXGwxUfhUJXLdfVnjTfzqXkQHdj2sZNAmW1AU66j0lYYBjl4TTBX21jW44bFMIGTsgOFOb6BMZu2u4bKKYm9WRZ5zh+NyKghD8A5QsYXpW8E= Received: from DM6PR21CA0014.namprd21.prod.outlook.com (2603:10b6:5:174::24) by CH3PR12MB7499.namprd12.prod.outlook.com (2603:10b6:610:142::22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.20; Wed, 12 Jun 2024 21:30:01 +0000 Received: from DS1PEPF00017095.namprd03.prod.outlook.com (2603:10b6:5:174:cafe::41) by DM6PR21CA0014.outlook.office365.com (2603:10b6:5:174::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.17 via Frontend Transport; Wed, 12 Jun 2024 21:30:01 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB04.amd.com; pr=C Received: from SATLEXMB04.amd.com (165.204.84.17) by DS1PEPF00017095.mail.protection.outlook.com (10.167.17.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7677.15 via Frontend Transport; Wed, 12 Jun 2024 21:30:01 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Wed, 12 Jun 2024 16:29:59 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Wed, 12 Jun 2024 16:29:53 -0500 From: Stefano Stabellini To: CC: , , , , "Edgar E. Iglesias" , David Hildenbrand , =?utf-8?q?Philippe_Mathieu-Daud=C3=A9?= Subject: [PULL 3/5] xen: mapcache: Pass the ram_addr offset to xen_map_cache() Date: Wed, 12 Jun 2024 16:29:38 -0500 Message-ID: <20240612212940.2178248-3-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB04.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: DS1PEPF00017095:EE_|CH3PR12MB7499:EE_ X-MS-Office365-Filtering-Correlation-Id: 945c847c-f031-464d-f621-08dc8b26d143 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230034|376008|1800799018|82310400020|36860700007; X-Microsoft-Antispam-Message-Info: =?utf-8?q?oIXJ0vTuz7LDgq0p5YPuxoPGTQQBPWM?= =?utf-8?q?7AyPrpq8EHadLa1L57cw1axN4Wvm2Fg6SZnyd7hVJmTGZFgcERoynV85F3XluUy8i?= =?utf-8?q?zPakWVSOtyb1vDCjuHDUs71bA7SS4Nr3whgTaCfqeaLONSD93Tt1SmvPYAlyh7xEV?= =?utf-8?q?6V8ypii40a5MmF8XC4580gssJjyceNolPBqrdagGE3ETEelE2HDxVCC7JxURjsLhv?= =?utf-8?q?cuYlwcDKnXA7h694g7SkPIoOx/BVxs6FneYFikM1ty1MhAfK0TU0WBlk+p4tHZF8y?= =?utf-8?q?ywdC/3o73Z5nSQrcptuE5/4SHyqno8SEeGRFwzeyQAtXf/n3K+hmTkz4yAq0nB137?= =?utf-8?q?STto9XYpEixe+GwknIh3YXt8UCdrXkdC4dMDXK3n7u8mTQCZm8n6y0dYGAsG5ooQL?= =?utf-8?q?JHLY7Q0RwN+6v1AuINgNAv1ARmaxIsI4Jyey1XK0NZg8ZZ1wodNAktY9NnFhaJHlF?= =?utf-8?q?6C8Gdy+BHEQfDYDaie5D8mwqbKMzURln9oJT2+MOT4WhVlko+nliQ+8U7VPPILRKh?= =?utf-8?q?8Pde7ShKrgVi5bo3VT9LQKucqLNBdkIgk6gPycMTkEHXm3G326AykEmaBXFAywPIW?= =?utf-8?q?JzryzcdhQPp6hq6h0E9Eyu1CNDhfKc9e7HxldSB+8uxtPDYFHnC9rbMoPiBZOnd50?= =?utf-8?q?ti/UwBwY07BLoLZC9mRx3J6vXTXOZ/gX1uNeNdL/oDlTb4h6buGgkt1+tNtR2iU0S?= =?utf-8?q?9sFBm6K7Y8361SEqBerTy9I/Wg480D/70sA63JEwDwvNlGFS1h+jgL52YDu2icEl9?= =?utf-8?q?PJ7x0E62Jve0Ax3vF+buMaQkCaMDMA++j3mDfhrbW/QpyF9g7s7WXuD4x5CMAD0XL?= =?utf-8?q?bYnfLQ9XsCFgmZc/LzlZHWOO3lxEDWwF2swCDwaftENwrTaYNRHPrYxuB61g4J1R/?= =?utf-8?q?Q6KHDrIk2rkTxlj969ZbqBqt5nM6z8T6EPWMykw+s577FKvdwxCv5yP5A1PxCYa71?= =?utf-8?q?ci1ehQhKyYSKrIQeJbV2um44REQ7DToEZ8VWbttJR2c6yd+kAAFomZq63Fv+YkehJ?= =?utf-8?q?YumFAxJtHz6u7WzzpeMap0Ns+Z9vNQln86AGpBxe9KSFIrwMtGvKq618aNYXDI77j?= =?utf-8?q?SpFr1yPZSLh9jF/bhv/C5bvCUfQxHUEnjo93UCTgo7idCEzILe7WX3FvHc0+YQSWF?= =?utf-8?q?Id27QDrhhC9M1i3F5oOd6gelEUrxI7GE56+2DUwUz1QJTqCcw6x6W5pTBSKeETkCu?= =?utf-8?q?aegxO0OJ+k5qvgBPlI36++lXBcgIxf9r02tEm98bNStz4sbFn52q+ivGgRpO1f4fd?= =?utf-8?q?GkkTZEgHPNE9TKHDcJampXtw9aDeENk/XTYn0pPB10icoKVioSb8tPlZN8jNuYJkJ?= =?utf-8?q?HcN5ZlseiUwvkxNVFyTQqt5tjVLMHFbVZA=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:SATLEXMB04.amd.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230034)(376008)(1800799018)(82310400020)(36860700007); DIR:OUT; SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jun 2024 21:30:01.2709 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 945c847c-f031-464d-f621-08dc8b26d143 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17]; Helo=[SATLEXMB04.amd.com] X-MS-Exchange-CrossTenant-AuthSource: DS1PEPF00017095.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR12MB7499 Received-SPF: permerror client-ip=2a01:111:f403:2418::621; envelope-from=stefano.stabellini@amd.com; helo=NAM12-BN8-obe.outbound.protection.outlook.com X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.143, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: "Edgar E. Iglesias" Pass the ram_addr offset to xen_map_cache. This is in preparation for adding grant mappings that need to compute the address within the RAMBlock. No functional changes. Signed-off-by: Edgar E. Iglesias Reviewed-by: David Hildenbrand Reviewed-by: Stefano Stabellini Reviewed-by: Philippe Mathieu-Daudé --- hw/xen/xen-mapcache.c | 16 +++++++++++----- include/sysemu/xen-mapcache.h | 2 ++ system/physmem.c | 9 +++++---- 3 files changed, 18 insertions(+), 9 deletions(-) diff --git a/hw/xen/xen-mapcache.c b/hw/xen/xen-mapcache.c index ec95445696..a07c47b0b1 100644 --- a/hw/xen/xen-mapcache.c +++ b/hw/xen/xen-mapcache.c @@ -167,7 +167,8 @@ static void xen_remap_bucket(MapCache *mc, void *vaddr, hwaddr size, hwaddr address_index, - bool dummy) + bool dummy, + ram_addr_t ram_offset) { uint8_t *vaddr_base; xen_pfn_t *pfns; @@ -266,6 +267,7 @@ static void xen_remap_bucket(MapCache *mc, static uint8_t *xen_map_cache_unlocked(MapCache *mc, hwaddr phys_addr, hwaddr size, + ram_addr_t ram_offset, uint8_t lock, bool dma, bool is_write) { MapCacheEntry *entry, *pentry = NULL, @@ -337,14 +339,16 @@ tryagain: if (!entry) { entry = g_new0(MapCacheEntry, 1); pentry->next = entry; - xen_remap_bucket(mc, entry, NULL, cache_size, address_index, dummy); + xen_remap_bucket(mc, entry, NULL, cache_size, address_index, dummy, + ram_offset); } else if (!entry->lock) { if (!entry->vaddr_base || entry->paddr_index != address_index || entry->size != cache_size || !test_bits(address_offset >> XC_PAGE_SHIFT, test_bit_size >> XC_PAGE_SHIFT, entry->valid_mapping)) { - xen_remap_bucket(mc, entry, NULL, cache_size, address_index, dummy); + xen_remap_bucket(mc, entry, NULL, cache_size, address_index, dummy, + ram_offset); } } @@ -391,13 +395,15 @@ tryagain: uint8_t *xen_map_cache(MemoryRegion *mr, hwaddr phys_addr, hwaddr size, + ram_addr_t ram_addr_offset, uint8_t lock, bool dma, bool is_write) { uint8_t *p; mapcache_lock(mapcache); - p = xen_map_cache_unlocked(mapcache, phys_addr, size, lock, dma, is_write); + p = xen_map_cache_unlocked(mapcache, phys_addr, size, ram_addr_offset, + lock, dma, is_write); mapcache_unlock(mapcache); return p; } @@ -632,7 +638,7 @@ static uint8_t *xen_replace_cache_entry_unlocked(MapCache *mc, trace_xen_replace_cache_entry_dummy(old_phys_addr, new_phys_addr); xen_remap_bucket(mc, entry, entry->vaddr_base, - cache_size, address_index, false); + cache_size, address_index, false, old_phys_addr); if (!test_bits(address_offset >> XC_PAGE_SHIFT, test_bit_size >> XC_PAGE_SHIFT, entry->valid_mapping)) { diff --git a/include/sysemu/xen-mapcache.h b/include/sysemu/xen-mapcache.h index 1ec9e66752..b5e3ea1bc0 100644 --- a/include/sysemu/xen-mapcache.h +++ b/include/sysemu/xen-mapcache.h @@ -19,6 +19,7 @@ typedef hwaddr (*phys_offset_to_gaddr_t)(hwaddr phys_offset, void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque); uint8_t *xen_map_cache(MemoryRegion *mr, hwaddr phys_addr, hwaddr size, + ram_addr_t ram_addr_offset, uint8_t lock, bool dma, bool is_write); ram_addr_t xen_ram_addr_from_mapcache(void *ptr); @@ -37,6 +38,7 @@ static inline void xen_map_cache_init(phys_offset_to_gaddr_t f, static inline uint8_t *xen_map_cache(MemoryRegion *mr, hwaddr phys_addr, hwaddr size, + ram_addr_t ram_addr_offset, uint8_t lock, bool dma, bool is_write) diff --git a/system/physmem.c b/system/physmem.c index b7847db1a2..33d09f7571 100644 --- a/system/physmem.c +++ b/system/physmem.c @@ -2231,13 +2231,14 @@ static void *qemu_ram_ptr_length(RAMBlock *block, ram_addr_t addr, */ if (xen_mr_is_memory(block->mr)) { return xen_map_cache(block->mr, block->offset + addr, - len, lock, lock, - is_write); + len, block->offset, + lock, lock, is_write); } block->host = xen_map_cache(block->mr, block->offset, - block->max_length, 1, - lock, is_write); + block->max_length, + block->offset, + 1, lock, is_write); } return ramblock_ptr(block, addr); From patchwork Wed Jun 12 21:29:39 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 1947128 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256 header.s=selector1 header.b=t16xynhy; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VzzGz0g2bz20Pb for ; Thu, 13 Jun 2024 07:30:35 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sHVXy-0001ln-1N; Wed, 12 Jun 2024 17:30:22 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXw-0001ef-7G for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:20 -0400 Received: from mail-bn8nam11on2062f.outbound.protection.outlook.com ([2a01:111:f403:2414::62f] helo=NAM11-BN8-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXs-0002oy-MO for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:19 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cFw9SN1BIKokmLnFX9JHEjukOBvTp3o234YaYCFt9JPgsacj4STqCsoPHvWo4IkVvtjpHVsb5CZq8KZKTuRwpD/65eY8gdLSuH5bZ7+aLrHhw1sBRMzjsM2b0/sv4g9GSRYNokfHBNHNRuFhjPQSh9lQ8Y7sL2ZuLFRLuqQytyMJ+3pC8yln+pV6snCZw6fhMnaRv4hgWz/eM+KcT8NOk0tmt0K8zyEJzOYypAsVngNptj+dovKn+njtytgOTR6Oi93wsBvcs4ba2O10P2wvJLM6ICFVMX8dwgoiMBhl7wzs9AvYb5LIjzFx66rbjHLFlGA2P1C3GqBIAb05x2uwsQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TaUS6wQGlVOTWcB9MLN8ydEe5uuQPHXEXiwY+daGi78=; b=bGXgmRRsYoIVkcWY0KUdTzDPLTiRxHPyYxIBhwQ7HpUo/cjlOfwsp+J6yegtS0lDBrJzboWvB5DKnOoFs25GlXGsT30QnInc/hrXTyiSIvR2jrOnc3dGT6X87xYu81/VkIBzuwYz4giUqKUCVtn7+u0C10f+joG6XloaliDRs7MVj+0dHuSG0HoneeSyO9cIdMmdxEgeoH3P+SlX9HRkFc9xM+fiKyc3jaHwvOqSG9TpyBWPltAPnDC4/ZCWXWPsfcMHf4KFTUGop1s+SCC30P70D/D6IF1vFO3CF7mDSWar+j3hrXUX1i0Pv2UsAMjZMf6N2lqmRfoGWNFcOu9xCQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=nongnu.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=TaUS6wQGlVOTWcB9MLN8ydEe5uuQPHXEXiwY+daGi78=; b=t16xynhym4JfXtIx78s+OyHiKCzoRSDQudzMK7GnwGMtcSnIP3vOL6CachPMOdI8SZHzvF42/Y+FfYmYdtW5WMpnWqOuqKDY5DfVcIVcq12Hzz2RITF8yoIWnkY3xBL4DxB56/8qTF4mR6gUD53NlmIddx/p8ecECKX0n1t/m2k= Received: from SJ0PR03CA0183.namprd03.prod.outlook.com (2603:10b6:a03:2ef::8) by PH0PR12MB8773.namprd12.prod.outlook.com (2603:10b6:510:28d::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7633.37; Wed, 12 Jun 2024 21:30:08 +0000 Received: from SJ5PEPF000001CC.namprd05.prod.outlook.com (2603:10b6:a03:2ef:cafe::c8) by SJ0PR03CA0183.outlook.office365.com (2603:10b6:a03:2ef::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.21 via Frontend Transport; Wed, 12 Jun 2024 21:30:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C Received: from SATLEXMB03.amd.com (165.204.84.17) by SJ5PEPF000001CC.mail.protection.outlook.com (10.167.242.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7677.15 via Frontend Transport; Wed, 12 Jun 2024 21:30:07 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Wed, 12 Jun 2024 16:30:06 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Wed, 12 Jun 2024 16:30:00 -0500 From: Stefano Stabellini To: CC: , , , , "Edgar E. Iglesias" , Manos Pitsidianakis Subject: [PULL 4/5] xen: mapcache: Add support for grant mappings Date: Wed, 12 Jun 2024 16:29:39 -0500 Message-ID: <20240612212940.2178248-4-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB03.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF000001CC:EE_|PH0PR12MB8773:EE_ X-MS-Office365-Filtering-Correlation-Id: 3d79c9e7-5f26-4794-36a5-08dc8b26d514 X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230034|376008|1800799018|82310400020|36860700007; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:SATLEXMB03.amd.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230034)(376008)(1800799018)(82310400020)(36860700007); DIR:OUT; SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jun 2024 21:30:07.6220 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 3d79c9e7-5f26-4794-36a5-08dc8b26d514 X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17]; Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF000001CC.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: PH0PR12MB8773 Received-SPF: permerror client-ip=2a01:111:f403:2414::62f; envelope-from=stefano.stabellini@amd.com; helo=NAM11-BN8-obe.outbound.protection.outlook.com X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.143, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: "Edgar E. Iglesias" Add a second mapcache for grant mappings. The mapcache for grants needs to work with XC_PAGE_SIZE granularity since we can't map larger ranges than what has been granted to us. Like with foreign mappings (xen_memory), machines using grants are expected to initialize the xen_grants MR and map it into their address-map accordingly. CC: Manos Pitsidianakis Signed-off-by: Edgar E. Iglesias Reviewed-by: Stefano Stabellini --- hw/xen/xen-hvm-common.c | 12 ++- hw/xen/xen-mapcache.c | 165 +++++++++++++++++++++++++------- include/hw/xen/xen-hvm-common.h | 3 + include/sysemu/xen.h | 1 + 4 files changed, 144 insertions(+), 37 deletions(-) diff --git a/hw/xen/xen-hvm-common.c b/hw/xen/xen-hvm-common.c index a0a0252da0..b8ace1c368 100644 --- a/hw/xen/xen-hvm-common.c +++ b/hw/xen/xen-hvm-common.c @@ -10,12 +10,18 @@ #include "hw/boards.h" #include "hw/xen/arch_hvm.h" -MemoryRegion xen_memory; +MemoryRegion xen_memory, xen_grants; -/* Check for xen memory. */ +/* Check for any kind of xen memory, foreign mappings or grants. */ bool xen_mr_is_memory(MemoryRegion *mr) { - return mr == &xen_memory; + return mr == &xen_memory || mr == &xen_grants; +} + +/* Check specifically for grants. */ +bool xen_mr_is_grants(MemoryRegion *mr) +{ + return mr == &xen_grants; } void xen_ram_alloc(ram_addr_t ram_addr, ram_addr_t size, MemoryRegion *mr, diff --git a/hw/xen/xen-mapcache.c b/hw/xen/xen-mapcache.c index a07c47b0b1..5f23b0adbe 100644 --- a/hw/xen/xen-mapcache.c +++ b/hw/xen/xen-mapcache.c @@ -14,6 +14,7 @@ #include +#include "hw/xen/xen-hvm-common.h" #include "hw/xen/xen_native.h" #include "qemu/bitmap.h" @@ -21,6 +22,8 @@ #include "sysemu/xen-mapcache.h" #include "trace.h" +#include +#include #if HOST_LONG_BITS == 32 # define MCACHE_MAX_SIZE (1UL<<31) /* 2GB Cap */ @@ -41,6 +44,7 @@ typedef struct MapCacheEntry { unsigned long *valid_mapping; uint32_t lock; #define XEN_MAPCACHE_ENTRY_DUMMY (1 << 0) +#define XEN_MAPCACHE_ENTRY_GRANT (1 << 1) uint8_t flags; hwaddr size; struct MapCacheEntry *next; @@ -71,6 +75,8 @@ typedef struct MapCache { } MapCache; static MapCache *mapcache; +static MapCache *mapcache_grants; +static xengnttab_handle *xen_region_gnttabdev; static inline void mapcache_lock(MapCache *mc) { @@ -131,6 +137,12 @@ void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque) unsigned long max_mcache_size; unsigned int bucket_shift; + xen_region_gnttabdev = xengnttab_open(NULL, 0); + if (xen_region_gnttabdev == NULL) { + error_report("mapcache: Failed to open gnttab device"); + exit(EXIT_FAILURE); + } + if (HOST_LONG_BITS == 32) { bucket_shift = 16; } else { @@ -159,6 +171,15 @@ void xen_map_cache_init(phys_offset_to_gaddr_t f, void *opaque) mapcache = xen_map_cache_init_single(f, opaque, bucket_shift, max_mcache_size); + + /* + * Grant mappings must use XC_PAGE_SIZE granularity since we can't + * map anything beyond the number of pages granted to us. + */ + mapcache_grants = xen_map_cache_init_single(f, opaque, + XC_PAGE_SHIFT, + max_mcache_size); + setrlimit(RLIMIT_AS, &rlimit_as); } @@ -168,17 +189,24 @@ static void xen_remap_bucket(MapCache *mc, hwaddr size, hwaddr address_index, bool dummy, + bool grant, + bool is_write, ram_addr_t ram_offset) { uint8_t *vaddr_base; - xen_pfn_t *pfns; - int *err; + g_autofree uint32_t *refs = NULL; + g_autofree xen_pfn_t *pfns = NULL; + g_autofree int *err; unsigned int i; hwaddr nb_pfn = size >> XC_PAGE_SHIFT; trace_xen_remap_bucket(address_index); - pfns = g_new0(xen_pfn_t, nb_pfn); + if (grant) { + refs = g_new0(uint32_t, nb_pfn); + } else { + pfns = g_new0(xen_pfn_t, nb_pfn); + } err = g_new0(int, nb_pfn); if (entry->vaddr_base != NULL) { @@ -207,21 +235,51 @@ static void xen_remap_bucket(MapCache *mc, g_free(entry->valid_mapping); entry->valid_mapping = NULL; - for (i = 0; i < nb_pfn; i++) { - pfns[i] = (address_index << (mc->bucket_shift - XC_PAGE_SHIFT)) + i; + if (grant) { + hwaddr grant_base = address_index - (ram_offset >> XC_PAGE_SHIFT); + + for (i = 0; i < nb_pfn; i++) { + refs[i] = grant_base + i; + } + } else { + for (i = 0; i < nb_pfn; i++) { + pfns[i] = (address_index << (mc->bucket_shift - XC_PAGE_SHIFT)) + i; + } } - /* - * If the caller has requested the mapping at a specific address use - * MAP_FIXED to make sure it's honored. - */ + entry->flags &= ~XEN_MAPCACHE_ENTRY_GRANT; + if (!dummy) { - vaddr_base = xenforeignmemory_map2(xen_fmem, xen_domid, vaddr, - PROT_READ | PROT_WRITE, - vaddr ? MAP_FIXED : 0, - nb_pfn, pfns, err); + if (grant) { + int prot = PROT_READ; + + if (is_write) { + prot |= PROT_WRITE; + } + + entry->flags |= XEN_MAPCACHE_ENTRY_GRANT; + assert(vaddr == NULL); + vaddr_base = xengnttab_map_domain_grant_refs(xen_region_gnttabdev, + nb_pfn, + xen_domid, refs, + prot); + } else { + /* + * If the caller has requested the mapping at a specific address use + * MAP_FIXED to make sure it's honored. + * + * We don't yet support upgrading mappings from RO to RW, to handle + * models using ordinary address_space_rw(), foreign mappings ignore + * is_write and are always mapped RW. + */ + vaddr_base = xenforeignmemory_map2(xen_fmem, xen_domid, vaddr, + PROT_READ | PROT_WRITE, + vaddr ? MAP_FIXED : 0, + nb_pfn, pfns, err); + } if (vaddr_base == NULL) { - perror("xenforeignmemory_map2"); + perror(grant ? "xengnttab_map_domain_grant_refs" + : "xenforeignmemory_map2"); exit(-1); } } else { @@ -260,15 +318,13 @@ static void xen_remap_bucket(MapCache *mc, bitmap_set(entry->valid_mapping, i, 1); } } - - g_free(pfns); - g_free(err); } static uint8_t *xen_map_cache_unlocked(MapCache *mc, hwaddr phys_addr, hwaddr size, ram_addr_t ram_offset, - uint8_t lock, bool dma, bool is_write) + uint8_t lock, bool dma, + bool grant, bool is_write) { MapCacheEntry *entry, *pentry = NULL, *free_entry = NULL, *free_pentry = NULL; @@ -340,7 +396,7 @@ tryagain: entry = g_new0(MapCacheEntry, 1); pentry->next = entry; xen_remap_bucket(mc, entry, NULL, cache_size, address_index, dummy, - ram_offset); + grant, is_write, ram_offset); } else if (!entry->lock) { if (!entry->vaddr_base || entry->paddr_index != address_index || entry->size != cache_size || @@ -348,7 +404,7 @@ tryagain: test_bit_size >> XC_PAGE_SHIFT, entry->valid_mapping)) { xen_remap_bucket(mc, entry, NULL, cache_size, address_index, dummy, - ram_offset); + grant, is_write, ram_offset); } } @@ -399,12 +455,26 @@ uint8_t *xen_map_cache(MemoryRegion *mr, uint8_t lock, bool dma, bool is_write) { + bool grant = xen_mr_is_grants(mr); + MapCache *mc = grant ? mapcache_grants : mapcache; uint8_t *p; - mapcache_lock(mapcache); - p = xen_map_cache_unlocked(mapcache, phys_addr, size, ram_addr_offset, - lock, dma, is_write); - mapcache_unlock(mapcache); + if (grant && !lock) { + /* + * Grants are only supported via address_space_map(). Anything + * else is considered a user/guest error. + * + * QEMU generally doesn't expect these mappings to ever fail, so + * if this happens we report an error message and abort(). + */ + error_report("Tried to access a grant reference without mapping it."); + abort(); + } + + mapcache_lock(mc); + p = xen_map_cache_unlocked(mc, phys_addr, size, ram_addr_offset, + lock, dma, grant, is_write); + mapcache_unlock(mc); return p; } @@ -449,7 +519,14 @@ static ram_addr_t xen_ram_addr_from_mapcache_single(MapCache *mc, void *ptr) ram_addr_t xen_ram_addr_from_mapcache(void *ptr) { - return xen_ram_addr_from_mapcache_single(mapcache, ptr); + ram_addr_t addr; + + addr = xen_ram_addr_from_mapcache_single(mapcache, ptr); + if (addr == RAM_ADDR_INVALID) { + addr = xen_ram_addr_from_mapcache_single(mapcache_grants, ptr); + } + + return addr; } static void xen_invalidate_map_cache_entry_unlocked(MapCache *mc, @@ -460,6 +537,7 @@ static void xen_invalidate_map_cache_entry_unlocked(MapCache *mc, hwaddr paddr_index; hwaddr size; int found = 0; + int rc; QTAILQ_FOREACH(reventry, &mc->locked_entries, next) { if (reventry->vaddr_req == buffer) { @@ -502,7 +580,14 @@ static void xen_invalidate_map_cache_entry_unlocked(MapCache *mc, } ram_block_notify_remove(entry->vaddr_base, entry->size, entry->size); - if (munmap(entry->vaddr_base, entry->size) != 0) { + if (entry->flags & XEN_MAPCACHE_ENTRY_GRANT) { + rc = xengnttab_unmap(xen_region_gnttabdev, entry->vaddr_base, + entry->size >> mc->bucket_shift); + } else { + rc = munmap(entry->vaddr_base, entry->size); + } + + if (rc) { perror("unmap fails"); exit(-1); } @@ -521,14 +606,24 @@ typedef struct XenMapCacheData { uint8_t *buffer; } XenMapCacheData; +static void xen_invalidate_map_cache_entry_single(MapCache *mc, uint8_t *buffer) +{ + mapcache_lock(mc); + xen_invalidate_map_cache_entry_unlocked(mc, buffer); + mapcache_unlock(mc); +} + +static void xen_invalidate_map_cache_entry_all(uint8_t *buffer) +{ + xen_invalidate_map_cache_entry_single(mapcache, buffer); + xen_invalidate_map_cache_entry_single(mapcache_grants, buffer); +} + static void xen_invalidate_map_cache_entry_bh(void *opaque) { XenMapCacheData *data = opaque; - mapcache_lock(mapcache); - xen_invalidate_map_cache_entry_unlocked(mapcache, data->buffer); - mapcache_unlock(mapcache); - + xen_invalidate_map_cache_entry_all(data->buffer); aio_co_wake(data->co); } @@ -543,9 +638,7 @@ void coroutine_mixed_fn xen_invalidate_map_cache_entry(uint8_t *buffer) xen_invalidate_map_cache_entry_bh, &data); qemu_coroutine_yield(); } else { - mapcache_lock(mapcache); - xen_invalidate_map_cache_entry_unlocked(mapcache, buffer); - mapcache_unlock(mapcache); + xen_invalidate_map_cache_entry_all(buffer); } } @@ -597,6 +690,7 @@ void xen_invalidate_map_cache(void) bdrv_drain_all(); xen_invalidate_map_cache_single(mapcache); + xen_invalidate_map_cache_single(mapcache_grants); } static uint8_t *xen_replace_cache_entry_unlocked(MapCache *mc, @@ -632,13 +726,16 @@ static uint8_t *xen_replace_cache_entry_unlocked(MapCache *mc, return NULL; } + assert((entry->flags & XEN_MAPCACHE_ENTRY_GRANT) == 0); + address_index = new_phys_addr >> mc->bucket_shift; address_offset = new_phys_addr & (mc->bucket_size - 1); trace_xen_replace_cache_entry_dummy(old_phys_addr, new_phys_addr); xen_remap_bucket(mc, entry, entry->vaddr_base, - cache_size, address_index, false, old_phys_addr); + cache_size, address_index, false, + false, false, old_phys_addr); if (!test_bits(address_offset >> XC_PAGE_SHIFT, test_bit_size >> XC_PAGE_SHIFT, entry->valid_mapping)) { diff --git a/include/hw/xen/xen-hvm-common.h b/include/hw/xen/xen-hvm-common.h index 65a51aac2e..3d796235dc 100644 --- a/include/hw/xen/xen-hvm-common.h +++ b/include/hw/xen/xen-hvm-common.h @@ -16,6 +16,7 @@ #include extern MemoryRegion xen_memory; +extern MemoryRegion xen_grants; extern MemoryListener xen_io_listener; extern DeviceListener xen_device_listener; @@ -29,6 +30,8 @@ extern DeviceListener xen_device_listener; do { } while (0) #endif +#define XEN_GRANT_ADDR_OFF (1ULL << 63) + static inline uint32_t xen_vcpu_eport(shared_iopage_t *shared_page, int i) { return shared_page->vcpu_ioreq[i].vp_eport; diff --git a/include/sysemu/xen.h b/include/sysemu/xen.h index 3445888e39..d70eacfbe2 100644 --- a/include/sysemu/xen.h +++ b/include/sysemu/xen.h @@ -50,4 +50,5 @@ static inline void xen_ram_alloc(ram_addr_t ram_addr, ram_addr_t size, #endif /* CONFIG_XEN_IS_POSSIBLE */ bool xen_mr_is_memory(MemoryRegion *mr); +bool xen_mr_is_grants(MemoryRegion *mr); #endif From patchwork Wed Jun 12 21:29:40 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Stefano Stabellini X-Patchwork-Id: 1947129 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=amd.com header.i=@amd.com header.a=rsa-sha256 header.s=selector1 header.b=dYfCYD1h; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=nongnu.org (client-ip=209.51.188.17; helo=lists.gnu.org; envelope-from=qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org; receiver=patchwork.ozlabs.org) Received: from lists.gnu.org (lists.gnu.org [209.51.188.17]) (using TLSv1.2 with cipher ECDHE-ECDSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4VzzHB5pFXz20Pb for ; Thu, 13 Jun 2024 07:30:46 +1000 (AEST) Received: from localhost ([::1] helo=lists1p.gnu.org) by lists.gnu.org with esmtp (Exim 4.90_1) (envelope-from ) id 1sHVXz-0001mV-Th; Wed, 12 Jun 2024 17:30:23 -0400 Received: from eggs.gnu.org ([2001:470:142:3::10]) by lists.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXx-0001lI-LU for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:21 -0400 Received: from mail-co1nam11on20601.outbound.protection.outlook.com ([2a01:111:f403:2416::601] helo=NAM11-CO1-obe.outbound.protection.outlook.com) by eggs.gnu.org with esmtps (TLS1.2:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.90_1) (envelope-from ) id 1sHVXv-0002pP-Rk for qemu-devel@nongnu.org; Wed, 12 Jun 2024 17:30:21 -0400 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=cGouXfDUR4is1wE367BxdWSA6foMKLV5+SjrFMhTbPwbmPD5gm7KBXLZibcvToli1ehmAr9efXo98OqgJdVXeaU3Py83ROITr7CseSR6npWGNl+xWYH0c0v53IkQkcpL7aaIlrw5D9mKlg1HTuJw/N7b+/CIL3FFJiFpdfDQ3oGH08VEvrlqs+dEnVOb5k4+24MizmiATTv86rCPvFdcwH3IdmRC3pUTmaNh0zns+sajIJYCrNqfMNVCzn/Mngzvf0NBLkPLKA4WU8EtazAKL9TCU17WWSa0jaZC7f1Cb8ryY0eiLbMitqNRgL8VL2u3ZTs+wrc8+O7I1ZFyImnhQg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=FS/ufF98+CmPb5JwYQeOLBlumDraNZo+bqd94MBYUeY=; b=ktK84kz7CIwZ4cEkPzG98Bul/M7LBKAQQH4jdog6lRxBh/AW+4H4Ntuuxh0E+Mvn6y8UDNN169tZPBDgcBvJI4P/xmUWyXBnIZUBuZXX9mUCS/5oD1k4vF058kYrDx4Pf+27mDPFQEO6qBxV53pmuPe+YMA72XcumiysYbXCMESFBrdgtGQfoIH7Np2a+d17FMbIOMOsS6gspnpq1lqLkIIt7bbr4CKn2U9a1ipNtKSp/oGUXRy7aoqdLlnZHnvy4gQUi0hKFnSi1jOz2e4Z9L3NkzhnlxY164V2RPe0rTZazaQ9LKsgQpYy/kKj4CgDud3IjG8/pmzsXePFvvM3AA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=nongnu.org smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=amd.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FS/ufF98+CmPb5JwYQeOLBlumDraNZo+bqd94MBYUeY=; b=dYfCYD1hNCoNMa+PcWLqba4NzY8HsVeGy5nXYy/caf6c09W9tRFbNdtCsKmk2Rrea4JodICi31RZO6BOgRyzAGzIy34EHRIv0kEXHYWqiBFKHZcmhA1+50G2vYFsrriust6N2TsD9GmOvAIuSim1pXYJ0ASo1UUGNzMYyVkhzx4= Received: from PH7P220CA0042.NAMP220.PROD.OUTLOOK.COM (2603:10b6:510:32b::25) by DS0PR12MB8415.namprd12.prod.outlook.com (2603:10b6:8:fc::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.20; Wed, 12 Jun 2024 21:30:14 +0000 Received: from CY4PEPF0000EE3A.namprd03.prod.outlook.com (2603:10b6:510:32b:cafe::36) by PH7P220CA0042.outlook.office365.com (2603:10b6:510:32b::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7677.21 via Frontend Transport; Wed, 12 Jun 2024 21:30:14 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 165.204.84.17) smtp.mailfrom=amd.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=amd.com; Received-SPF: Pass (protection.outlook.com: domain of amd.com designates 165.204.84.17 as permitted sender) receiver=protection.outlook.com; client-ip=165.204.84.17; helo=SATLEXMB03.amd.com; pr=C Received: from SATLEXMB03.amd.com (165.204.84.17) by CY4PEPF0000EE3A.mail.protection.outlook.com (10.167.242.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7677.15 via Frontend Transport; Wed, 12 Jun 2024 21:30:13 +0000 Received: from SATLEXMB04.amd.com (10.181.40.145) by SATLEXMB03.amd.com (10.181.40.144) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.39; Wed, 12 Jun 2024 16:30:12 -0500 Received: from smtp.xilinx.com (10.180.168.240) by SATLEXMB04.amd.com (10.181.40.145) with Microsoft SMTP Server id 15.1.2507.39 via Frontend Transport; Wed, 12 Jun 2024 16:30:06 -0500 From: Stefano Stabellini To: CC: , , , , "Edgar E. Iglesias" , Manos Pitsidianakis , =?utf-8?q?Philippe_Ma?= =?utf-8?q?thieu-Daud=C3=A9?= Subject: [PULL 5/5] hw/arm: xen: Enable use of grant mappings Date: Wed, 12 Jun 2024 16:29:40 -0500 Message-ID: <20240612212940.2178248-5-stefano.stabellini@amd.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: References: MIME-Version: 1.0 Received-SPF: None (SATLEXMB03.amd.com: stefano.stabellini@amd.com does not designate permitted sender hosts) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: CY4PEPF0000EE3A:EE_|DS0PR12MB8415:EE_ X-MS-Office365-Filtering-Correlation-Id: ace430e1-71d8-4c30-c73e-08dc8b26d8be X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; ARA:13230034|376008|1800799018|82310400020|36860700007; X-Microsoft-Antispam-Message-Info: =?utf-8?q?5A7WWdelTrMbpOm9D0NltIaicJwh6GI?= =?utf-8?q?hXr6ZF6Nu83gZHhkSBoi728vAbRqds9xOoRDS1L0IUGWqu1ERyGWMcVSDnuMxeeeI?= =?utf-8?q?y9j1fy254kNsqVp25fO2zkFMymzb87mGMbFEZ/HNXHKDPij98DSO2RADJMdg4Tg9T?= =?utf-8?q?lPJntFxwJzUGG9xA9U+UUBiwIU+3SnsUUMHPTPncSBqm12eO4MxZZQafWgj6xcHJF?= =?utf-8?q?KKK0qI8LYkRpGaT0pzMdwnpNBtzTCkNvNjEHq4dUUVBj8p85yYxLq39ZMS6YhYJwq?= =?utf-8?q?YInLuIK78jDpz1n+/X97bQn787k6CI57Aa5EF8U6QeGxiMXxRduDz4FWZebZah9Nu?= =?utf-8?q?kJB6OuIUrlTMMpyhNTb7quzNhHTBdDbeljdL0sg57XGg8wWlmdvwG2/pnQMoRQwaJ?= =?utf-8?q?yHKvQ5j8biv213zapvEiyZ+uyZYjn4GfOGf2mI/KnfTZfIWetq58R83ZxxJYUtMVX?= =?utf-8?q?3/UXpDkDvR1ohnxm5eusZwy1vv1PR3V3/wy6QT3xD1zKDb6qqKr2VcABghYhg6hAJ?= =?utf-8?q?Z1Zx9oyCeIC1CxgMWb7g5vtEwaXBjHHMSfvUFEuhkeMXXsO93io7WSvH81n7Kzzxy?= =?utf-8?q?jx4MbmYI+zvGACCkKmpLRdzxGIcjk/ugIMpmBaWBcaSHAK8xF8B3dtwAJK47g92Fm?= =?utf-8?q?X5RpXp7nzkt6N6YtBl8xxeAByaxRmDfN9/G0rbvcdf2V/gAu4C6djwIHOV3JtoRVk?= =?utf-8?q?e4wSUHLtKrwloG6azhV+6Cay6MpSLOqgUBEjK0sjnJgTniIFn224YYLIiTdb/bO+C?= =?utf-8?q?x09BrmW4AuC9QnmW9g1LDF+/H6bEn5PIqjunqlut1e9p2HNOFBfzSsYPPJC4hoEXG?= =?utf-8?q?J+guamsSR9IwQY4v2c7hKAp9WqX4EP7OLMa68gqbubySvvHYkIfvynI364NYysN2G?= =?utf-8?q?av50pdYv7IMxY1zWAuOsEmHkLx3dur+23GY+9mhWNkIcM7WF+Ny9q0NHkQYARRFaO?= =?utf-8?q?68gSQgHayAX6djXqhAKjfnu0dHqXP3tI0skxG3KK/kI29C1qohOA6WI+6frzf6UVG?= =?utf-8?q?TzGgwI1fHJ/FgklEs0GgOIa6spcTNy/29FJeb73J4hQ58gexMj+exTfECZr1tLvlA?= =?utf-8?q?AFgAWj/1c7mpiRVBpxkdZ64GsnJrgzQVHLqeHRa3VK6mTu4ykJONCVD+P630eCYN4?= =?utf-8?q?hoqQPWaz1Wydxdt7JE0YT+2WqzLHbtIdJ1aWHRRVDU1dvKbpvfrY66wLBfEObh1Le?= =?utf-8?q?euj1tpjInMZizByqbOhQqc9bZdi79H/SqrSkDsDNVhPCBd8XxPjpDzbGDxN6TURQW?= =?utf-8?q?RzouBtGgPW1dKBXSNQAx3mrFm5CeIXk8pfsYSmoyl3+dwSykOzM02VGQh0mVXczBN?= =?utf-8?q?BH0inZmWH+hfEBfyO5UB5BPvaoj7c4Dohg=3D=3D?= X-Forefront-Antispam-Report: CIP:165.204.84.17; CTRY:US; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:SATLEXMB03.amd.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230034)(376008)(1800799018)(82310400020)(36860700007); DIR:OUT; SFP:1101; X-OriginatorOrg: amd.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 12 Jun 2024 21:30:13.8043 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: ace430e1-71d8-4c30-c73e-08dc8b26d8be X-MS-Exchange-CrossTenant-Id: 3dd8961f-e488-4e60-8e11-a82d994e183d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=3dd8961f-e488-4e60-8e11-a82d994e183d; Ip=[165.204.84.17]; Helo=[SATLEXMB03.amd.com] X-MS-Exchange-CrossTenant-AuthSource: CY4PEPF0000EE3A.namprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR12MB8415 Received-SPF: permerror client-ip=2a01:111:f403:2416::601; envelope-from=stefano.stabellini@amd.com; helo=NAM11-CO1-obe.outbound.protection.outlook.com X-Spam_score_int: -22 X-Spam_score: -2.3 X-Spam_bar: -- X-Spam_report: (-2.3 / 5.0 requ) BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.143, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_HELO_PASS=-0.001, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01 autolearn=ham autolearn_force=no X-Spam_action: no action X-BeenThere: qemu-devel@nongnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org Sender: qemu-devel-bounces+incoming=patchwork.ozlabs.org@nongnu.org From: "Edgar E. Iglesias" Signed-off-by: Edgar E. Iglesias Reviewed-by: Stefano Stabellini Reviewed-by: Manos Pitsidianakis Reviewed-by: Philippe Mathieu-Daudé --- hw/arm/xen_arm.c | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/hw/arm/xen_arm.c b/hw/arm/xen_arm.c index 15fa7dfa84..6fad829ede 100644 --- a/hw/arm/xen_arm.c +++ b/hw/arm/xen_arm.c @@ -125,6 +125,11 @@ static void xen_init_ram(MachineState *machine) GUEST_RAM1_BASE, ram_size[1]); memory_region_add_subregion(sysmem, GUEST_RAM1_BASE, &ram_hi); } + + /* Setup support for grants. */ + memory_region_init_ram(&xen_grants, NULL, "xen.grants", block_len, + &error_fatal); + memory_region_add_subregion(sysmem, XEN_GRANT_ADDR_OFF, &xen_grants); } void arch_handle_ioreq(XenIOState *state, ioreq_t *req)