From patchwork Wed May 10 22:57:02 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Zhang, Xiong Y" X-Patchwork-Id: 9719305 Return-Path: Received: from mail.wl.linuxfoundation.org (pdx-wl-mail.web.codeaurora.org [172.30.200.125]) by pdx-korg-patchwork.web.codeaurora.org (Postfix) with ESMTP id 1580960365 for ; Wed, 10 May 2017 06:55:33 +0000 (UTC) Received: from mail.wl.linuxfoundation.org (localhost [127.0.0.1]) by mail.wl.linuxfoundation.org (Postfix) with ESMTP id 059FC28557 for ; Wed, 10 May 2017 06:55:33 +0000 (UTC) Received: by mail.wl.linuxfoundation.org (Postfix, from userid 486) id EDE492857D; Wed, 10 May 2017 06:55:32 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on pdx-wl-mail.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=2.0 tests=BAYES_00, DATE_IN_FUTURE_12_24, RCVD_IN_DNSWL_MED autolearn=no version=3.3.1 Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.wl.linuxfoundation.org (Postfix) with ESMTPS id 6B1E728557 for ; Wed, 10 May 2017 06:55:31 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1d8LUX-0002V1-FE; Wed, 10 May 2017 06:52:57 +0000 Received: from mail6.bemta3.messagelabs.com ([195.245.230.39]) by lists.xenproject.org with esmtp (Exim 4.84_2) (envelope-from ) id 1d8LUW-0002Uv-30 for xen-devel@lists.xen.org; Wed, 10 May 2017 06:52:56 +0000 Received: from [85.158.137.68] by server-13.bemta-3.messagelabs.com id B2/42-01870-7C8B2195; Wed, 10 May 2017 06:52:55 +0000 X-Brightmail-Tracker: H4sIAAAAAAAAA+NgFvrBLMWRWlGSWpSXmKPExsXS1tbhqHtsh1C kwYHLWhZLPi5mcWD0OLr7N1MAYxRrZl5SfkUCa8a7a02sBYe0KlrbZzI1MO5U6GLk5BASmM4o 8WSZE4gtIcArcWTZDFYI219i1cMVLBA1LYwSt3orQWw2AW2JtX9PsXUxcnGICMxilLhy5RMbS IJZwFli5qzrjCC2sECARO/up+wgNouAqsTjV9OYQGxeATeJx+8uQC2Qk7h5rpMZxOYUsJP4/e cgUC8H0DJbiW9TpCYw8i5gZFjFqF6cWlSWWqRrqJdUlJmeUZKbmJmja2hgrJebWlycmJ6ak5h UrJecn7uJERgKDECwg3H5R6dDjJIcTEqivD7FApFCfEn5KZUZicUZ8UWlOanFhxhlODiUJHiD tgtFCgkWpaanVqRl5gCDEiYtwcGjJMLLDZLmLS5IzC3OTIdInWLU5dg19917JiGWvPy8VClx3 tkgRQIgRRmleXAjYBFyiVFWSpiXEegoIZ6C1KLczBJU+VeM4hyMSsK8vSBTeDLzSuA2vQI6gg noiEAGAZAjShIRUlINjKVTiniaDyuonkueJbLs6/7YU+zHmndY13O4fjSaNqF36VPtvffa7nE UlwRtnFgXXySxeOXr31NmXlxUsouh/M+TUotdUxhqzK7lJXt2Sq15UbZpY5TnVjft+1fdEvWY Ti/+7OR/fh2fY1PGp1VsWna8+eZTNdN8rgTKqRsFbWvcrdGnLLbupxJLcUaioRZzUXEiAK+EE HeLAgAA X-Env-Sender: xiong.y.zhang@intel.com X-Msg-Ref: server-8.tower-31.messagelabs.com!1494399172!99670300!1 X-Originating-IP: [134.134.136.65] X-SpamReason: No, hits=2.8 required=7.0 tests=BODY_RANDOM_LONG, DATE_IN_FUTURE_12_24 X-StarScan-Received: X-StarScan-Version: 9.4.12; banners=-,-,- X-VirusChecked: Checked Received: (qmail 27815 invoked from network); 10 May 2017 06:52:54 -0000 Received: from mga03.intel.com (HELO mga03.intel.com) (134.134.136.65) by server-8.tower-31.messagelabs.com with DHE-RSA-AES256-GCM-SHA384 encrypted SMTP; 10 May 2017 06:52:54 -0000 Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 09 May 2017 23:52:51 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.38,318,1491289200"; d="scan'208";a="855061153" Received: from test-optiplex-7040.bj.intel.com ([10.238.154.174]) by FMSMGA003.fm.intel.com with ESMTP; 09 May 2017 23:52:49 -0700 From: Xiong Zhang To: george.dunlap@citrix.com, JBeulich@suse.com, andrew.cooper3@citrix.com, paul.durrant@citrix.com, zhiyuan.lv@intel.com, yu.c.zhang@linux.intel.com Date: Thu, 11 May 2017 06:57:02 +0800 Message-Id: <1494457022-5199-1-git-send-email-xiong.y.zhang@intel.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: References: Cc: Xiong Zhang , xen-devel@lists.xen.org Subject: [Xen-devel] [PATCH V3] x86/ioreq_server: Make p2m_finish_type_change actually work X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Virus-Scanned: ClamAV using ClamSMTP Commit 6d774a951696 ("x86/ioreq server: synchronously reset outstanding p2m_ioreq_server entries when an ioreq server unmaps") introduced p2m_finish_type_change(), which was meant to synchronously finish a previously initiated type change over a gpfn range. It did this by calling get_entry(), checking if it was the appropriate type, and then calling set_entry(). Unfortunately, a previous commit (1679e0df3df6 "x86/ioreq server: asynchronously reset outstanding p2m_ioreq_server entries") modified get_entry() to always return the new type after the type change, meaning that p2m_finish_type_change() never changed any entries. Which means when an ioreq server was detached and then re-attached (as happens in XenGT on reboot) the re-attach failed. Fix this by using the existing p2m-specific recalculation logic instead of doing a read-check-write loop. Fix: 'commit 6d774a951696 ("x86/ioreq server: synchronously reset outstanding p2m_ioreq_server entries when an ioreq server unmaps")' v1: Add ioreq_pre_recalc query flag to get the old p2m_type.(Jan) v2: Add p2m->recalc() hook to change gfn p2m_type. (George) v3: Make commit message clearer. (George) Signed-off-by: Xiong Zhang Signed-off-by: Yu Zhang Reviewed-by: George Dunlap --- xen/arch/x86/hvm/dm.c | 3 +-- xen/arch/x86/mm/p2m-ept.c | 1 + xen/arch/x86/mm/p2m-pt.c | 1 + xen/arch/x86/mm/p2m.c | 12 ++---------- xen/include/asm-x86/p2m.h | 5 +++-- 5 files changed, 8 insertions(+), 14 deletions(-) diff --git a/xen/arch/x86/hvm/dm.c b/xen/arch/x86/hvm/dm.c index d72b7bd..c1627ec 100644 --- a/xen/arch/x86/hvm/dm.c +++ b/xen/arch/x86/hvm/dm.c @@ -412,8 +412,7 @@ static int dm_op(domid_t domid, first_gfn <= p2m->max_mapped_pfn ) { /* Iterate p2m table for 256 gfns each time. */ - p2m_finish_type_change(d, _gfn(first_gfn), 256, - p2m_ioreq_server, p2m_ram_rw); + p2m_finish_type_change(d, _gfn(first_gfn), 256); first_gfn += 256; diff --git a/xen/arch/x86/mm/p2m-ept.c b/xen/arch/x86/mm/p2m-ept.c index f37a1f2..09efba7 100644 --- a/xen/arch/x86/mm/p2m-ept.c +++ b/xen/arch/x86/mm/p2m-ept.c @@ -1238,6 +1238,7 @@ int ept_p2m_init(struct p2m_domain *p2m) p2m->set_entry = ept_set_entry; p2m->get_entry = ept_get_entry; + p2m->recalc = resolve_misconfig; p2m->change_entry_type_global = ept_change_entry_type_global; p2m->change_entry_type_range = ept_change_entry_type_range; p2m->memory_type_changed = ept_memory_type_changed; diff --git a/xen/arch/x86/mm/p2m-pt.c b/xen/arch/x86/mm/p2m-pt.c index 5079b59..2eddeee 100644 --- a/xen/arch/x86/mm/p2m-pt.c +++ b/xen/arch/x86/mm/p2m-pt.c @@ -1153,6 +1153,7 @@ void p2m_pt_init(struct p2m_domain *p2m) { p2m->set_entry = p2m_pt_set_entry; p2m->get_entry = p2m_pt_get_entry; + p2m->recalc = do_recalc; p2m->change_entry_type_global = p2m_pt_change_entry_type_global; p2m->change_entry_type_range = p2m_pt_change_entry_type_range; p2m->write_p2m_entry = paging_write_p2m_entry; diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c index 1d57e5c..2bad2e1 100644 --- a/xen/arch/x86/mm/p2m.c +++ b/xen/arch/x86/mm/p2m.c @@ -1013,26 +1013,18 @@ void p2m_change_type_range(struct domain *d, /* Synchronously modify the p2m type for a range of gfns from ot to nt. */ void p2m_finish_type_change(struct domain *d, - gfn_t first_gfn, unsigned long max_nr, - p2m_type_t ot, p2m_type_t nt) + gfn_t first_gfn, unsigned long max_nr) { struct p2m_domain *p2m = p2m_get_hostp2m(d); - p2m_type_t t; unsigned long gfn = gfn_x(first_gfn); unsigned long last_gfn = gfn + max_nr - 1; - ASSERT(ot != nt); - ASSERT(p2m_is_changeable(ot) && p2m_is_changeable(nt)); - p2m_lock(p2m); last_gfn = min(last_gfn, p2m->max_mapped_pfn); while ( gfn <= last_gfn ) { - get_gfn_query_unlocked(d, gfn, &t); - - if ( t == ot ) - p2m_change_type_one(d, gfn, t, nt); + p2m->recalc(p2m, gfn); gfn++; } diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h index 7574a9b..081639c 100644 --- a/xen/include/asm-x86/p2m.h +++ b/xen/include/asm-x86/p2m.h @@ -246,6 +246,8 @@ struct p2m_domain { p2m_query_t q, unsigned int *page_order, bool_t *sve); + int (*recalc)(struct p2m_domain *p2m, + unsigned long gfn); void (*enable_hardware_log_dirty)(struct p2m_domain *p2m); void (*disable_hardware_log_dirty)(struct p2m_domain *p2m); void (*flush_hardware_cached_dirty)(struct p2m_domain *p2m); @@ -609,8 +611,7 @@ int p2m_change_type_one(struct domain *d, unsigned long gfn, /* Synchronously change the p2m type for a range of gfns */ void p2m_finish_type_change(struct domain *d, gfn_t first_gfn, - unsigned long max_nr, - p2m_type_t ot, p2m_type_t nt); + unsigned long max_nr); /* Report a change affecting memory types. */ void p2m_memory_type_changed(struct domain *d);