162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0 262306a36Sopenharmony_ci 362306a36Sopenharmony_ci/* 462306a36Sopenharmony_ci * Xen leaves the responsibility for maintaining p2m mappings to the 562306a36Sopenharmony_ci * guests themselves, but it must also access and update the p2m array 662306a36Sopenharmony_ci * during suspend/resume when all the pages are reallocated. 762306a36Sopenharmony_ci * 862306a36Sopenharmony_ci * The logical flat p2m table is mapped to a linear kernel memory area. 962306a36Sopenharmony_ci * For accesses by Xen a three-level tree linked via mfns only is set up to 1062306a36Sopenharmony_ci * allow the address space to be sparse. 1162306a36Sopenharmony_ci * 1262306a36Sopenharmony_ci * Xen 1362306a36Sopenharmony_ci * | 1462306a36Sopenharmony_ci * p2m_top_mfn 1562306a36Sopenharmony_ci * / \ 1662306a36Sopenharmony_ci * p2m_mid_mfn p2m_mid_mfn 1762306a36Sopenharmony_ci * / / 1862306a36Sopenharmony_ci * p2m p2m p2m ... 1962306a36Sopenharmony_ci * 2062306a36Sopenharmony_ci * The p2m_mid_mfn pages are mapped by p2m_top_mfn_p. 2162306a36Sopenharmony_ci * 2262306a36Sopenharmony_ci * The p2m_top_mfn level is limited to 1 page, so the maximum representable 2362306a36Sopenharmony_ci * pseudo-physical address space is: 2462306a36Sopenharmony_ci * P2M_TOP_PER_PAGE * P2M_MID_PER_PAGE * P2M_PER_PAGE pages 2562306a36Sopenharmony_ci * 2662306a36Sopenharmony_ci * P2M_PER_PAGE depends on the architecture, as a mfn is always 2762306a36Sopenharmony_ci * unsigned long (8 bytes on 64-bit, 4 bytes on 32), leading to 2862306a36Sopenharmony_ci * 512 and 1024 entries respectively. 2962306a36Sopenharmony_ci * 3062306a36Sopenharmony_ci * In short, these structures contain the Machine Frame Number (MFN) of the PFN. 3162306a36Sopenharmony_ci * 3262306a36Sopenharmony_ci * However not all entries are filled with MFNs. Specifically for all other 3362306a36Sopenharmony_ci * leaf entries, or for the top root, or middle one, for which there is a void 3462306a36Sopenharmony_ci * entry, we assume it is "missing". So (for example) 3562306a36Sopenharmony_ci * pfn_to_mfn(0x90909090)=INVALID_P2M_ENTRY. 3662306a36Sopenharmony_ci * We have a dedicated page p2m_missing with all entries being 3762306a36Sopenharmony_ci * INVALID_P2M_ENTRY. This page may be referenced multiple times in the p2m 3862306a36Sopenharmony_ci * list/tree in case there are multiple areas with P2M_PER_PAGE invalid pfns. 3962306a36Sopenharmony_ci * 4062306a36Sopenharmony_ci * We also have the possibility of setting 1-1 mappings on certain regions, so 4162306a36Sopenharmony_ci * that: 4262306a36Sopenharmony_ci * pfn_to_mfn(0xc0000)=0xc0000 4362306a36Sopenharmony_ci * 4462306a36Sopenharmony_ci * The benefit of this is, that we can assume for non-RAM regions (think 4562306a36Sopenharmony_ci * PCI BARs, or ACPI spaces), we can create mappings easily because we 4662306a36Sopenharmony_ci * get the PFN value to match the MFN. 4762306a36Sopenharmony_ci * 4862306a36Sopenharmony_ci * For this to work efficiently we have one new page p2m_identity. All entries 4962306a36Sopenharmony_ci * in p2m_identity are set to INVALID_P2M_ENTRY type (Xen toolstack only 5062306a36Sopenharmony_ci * recognizes that and MFNs, no other fancy value). 5162306a36Sopenharmony_ci * 5262306a36Sopenharmony_ci * On lookup we spot that the entry points to p2m_identity and return the 5362306a36Sopenharmony_ci * identity value instead of dereferencing and returning INVALID_P2M_ENTRY. 5462306a36Sopenharmony_ci * If the entry points to an allocated page, we just proceed as before and 5562306a36Sopenharmony_ci * return the PFN. If the PFN has IDENTITY_FRAME_BIT set we unmask that in 5662306a36Sopenharmony_ci * appropriate functions (pfn_to_mfn). 5762306a36Sopenharmony_ci * 5862306a36Sopenharmony_ci * The reason for having the IDENTITY_FRAME_BIT instead of just returning the 5962306a36Sopenharmony_ci * PFN is that we could find ourselves where pfn_to_mfn(pfn)==pfn for a 6062306a36Sopenharmony_ci * non-identity pfn. To protect ourselves against we elect to set (and get) the 6162306a36Sopenharmony_ci * IDENTITY_FRAME_BIT on all identity mapped PFNs. 6262306a36Sopenharmony_ci */ 6362306a36Sopenharmony_ci 6462306a36Sopenharmony_ci#include <linux/init.h> 6562306a36Sopenharmony_ci#include <linux/export.h> 6662306a36Sopenharmony_ci#include <linux/list.h> 6762306a36Sopenharmony_ci#include <linux/hash.h> 6862306a36Sopenharmony_ci#include <linux/sched.h> 6962306a36Sopenharmony_ci#include <linux/seq_file.h> 7062306a36Sopenharmony_ci#include <linux/memblock.h> 7162306a36Sopenharmony_ci#include <linux/slab.h> 7262306a36Sopenharmony_ci#include <linux/vmalloc.h> 7362306a36Sopenharmony_ci 7462306a36Sopenharmony_ci#include <asm/cache.h> 7562306a36Sopenharmony_ci#include <asm/setup.h> 7662306a36Sopenharmony_ci#include <linux/uaccess.h> 7762306a36Sopenharmony_ci 7862306a36Sopenharmony_ci#include <asm/xen/page.h> 7962306a36Sopenharmony_ci#include <asm/xen/hypercall.h> 8062306a36Sopenharmony_ci#include <asm/xen/hypervisor.h> 8162306a36Sopenharmony_ci#include <xen/balloon.h> 8262306a36Sopenharmony_ci#include <xen/grant_table.h> 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci#include "multicalls.h" 8562306a36Sopenharmony_ci#include "xen-ops.h" 8662306a36Sopenharmony_ci 8762306a36Sopenharmony_ci#define P2M_MID_PER_PAGE (PAGE_SIZE / sizeof(unsigned long *)) 8862306a36Sopenharmony_ci#define P2M_TOP_PER_PAGE (PAGE_SIZE / sizeof(unsigned long **)) 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_ci#define MAX_P2M_PFN (P2M_TOP_PER_PAGE * P2M_MID_PER_PAGE * P2M_PER_PAGE) 9162306a36Sopenharmony_ci 9262306a36Sopenharmony_ci#define PMDS_PER_MID_PAGE (P2M_MID_PER_PAGE / PTRS_PER_PTE) 9362306a36Sopenharmony_ci 9462306a36Sopenharmony_ciunsigned long *xen_p2m_addr __read_mostly; 9562306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(xen_p2m_addr); 9662306a36Sopenharmony_ciunsigned long xen_p2m_size __read_mostly; 9762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(xen_p2m_size); 9862306a36Sopenharmony_ciunsigned long xen_max_p2m_pfn __read_mostly; 9962306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(xen_max_p2m_pfn); 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci#ifdef CONFIG_XEN_MEMORY_HOTPLUG_LIMIT 10262306a36Sopenharmony_ci#define P2M_LIMIT CONFIG_XEN_MEMORY_HOTPLUG_LIMIT 10362306a36Sopenharmony_ci#else 10462306a36Sopenharmony_ci#define P2M_LIMIT 0 10562306a36Sopenharmony_ci#endif 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_cistatic DEFINE_SPINLOCK(p2m_update_lock); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_cistatic unsigned long *p2m_mid_missing_mfn; 11062306a36Sopenharmony_cistatic unsigned long *p2m_top_mfn; 11162306a36Sopenharmony_cistatic unsigned long **p2m_top_mfn_p; 11262306a36Sopenharmony_cistatic unsigned long *p2m_missing; 11362306a36Sopenharmony_cistatic unsigned long *p2m_identity; 11462306a36Sopenharmony_cistatic pte_t *p2m_missing_pte; 11562306a36Sopenharmony_cistatic pte_t *p2m_identity_pte; 11662306a36Sopenharmony_ci 11762306a36Sopenharmony_ci/* 11862306a36Sopenharmony_ci * Hint at last populated PFN. 11962306a36Sopenharmony_ci * 12062306a36Sopenharmony_ci * Used to set HYPERVISOR_shared_info->arch.max_pfn so the toolstack 12162306a36Sopenharmony_ci * can avoid scanning the whole P2M (which may be sized to account for 12262306a36Sopenharmony_ci * hotplugged memory). 12362306a36Sopenharmony_ci */ 12462306a36Sopenharmony_cistatic unsigned long xen_p2m_last_pfn; 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_cistatic inline unsigned p2m_top_index(unsigned long pfn) 12762306a36Sopenharmony_ci{ 12862306a36Sopenharmony_ci BUG_ON(pfn >= MAX_P2M_PFN); 12962306a36Sopenharmony_ci return pfn / (P2M_MID_PER_PAGE * P2M_PER_PAGE); 13062306a36Sopenharmony_ci} 13162306a36Sopenharmony_ci 13262306a36Sopenharmony_cistatic inline unsigned p2m_mid_index(unsigned long pfn) 13362306a36Sopenharmony_ci{ 13462306a36Sopenharmony_ci return (pfn / P2M_PER_PAGE) % P2M_MID_PER_PAGE; 13562306a36Sopenharmony_ci} 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_cistatic void p2m_top_mfn_init(unsigned long *top) 13862306a36Sopenharmony_ci{ 13962306a36Sopenharmony_ci unsigned i; 14062306a36Sopenharmony_ci 14162306a36Sopenharmony_ci for (i = 0; i < P2M_TOP_PER_PAGE; i++) 14262306a36Sopenharmony_ci top[i] = virt_to_mfn(p2m_mid_missing_mfn); 14362306a36Sopenharmony_ci} 14462306a36Sopenharmony_ci 14562306a36Sopenharmony_cistatic void p2m_top_mfn_p_init(unsigned long **top) 14662306a36Sopenharmony_ci{ 14762306a36Sopenharmony_ci unsigned i; 14862306a36Sopenharmony_ci 14962306a36Sopenharmony_ci for (i = 0; i < P2M_TOP_PER_PAGE; i++) 15062306a36Sopenharmony_ci top[i] = p2m_mid_missing_mfn; 15162306a36Sopenharmony_ci} 15262306a36Sopenharmony_ci 15362306a36Sopenharmony_cistatic void p2m_mid_mfn_init(unsigned long *mid, unsigned long *leaf) 15462306a36Sopenharmony_ci{ 15562306a36Sopenharmony_ci unsigned i; 15662306a36Sopenharmony_ci 15762306a36Sopenharmony_ci for (i = 0; i < P2M_MID_PER_PAGE; i++) 15862306a36Sopenharmony_ci mid[i] = virt_to_mfn(leaf); 15962306a36Sopenharmony_ci} 16062306a36Sopenharmony_ci 16162306a36Sopenharmony_cistatic void p2m_init(unsigned long *p2m) 16262306a36Sopenharmony_ci{ 16362306a36Sopenharmony_ci unsigned i; 16462306a36Sopenharmony_ci 16562306a36Sopenharmony_ci for (i = 0; i < P2M_PER_PAGE; i++) 16662306a36Sopenharmony_ci p2m[i] = INVALID_P2M_ENTRY; 16762306a36Sopenharmony_ci} 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_cistatic void p2m_init_identity(unsigned long *p2m, unsigned long pfn) 17062306a36Sopenharmony_ci{ 17162306a36Sopenharmony_ci unsigned i; 17262306a36Sopenharmony_ci 17362306a36Sopenharmony_ci for (i = 0; i < P2M_PER_PAGE; i++) 17462306a36Sopenharmony_ci p2m[i] = IDENTITY_FRAME(pfn + i); 17562306a36Sopenharmony_ci} 17662306a36Sopenharmony_ci 17762306a36Sopenharmony_cistatic void * __ref alloc_p2m_page(void) 17862306a36Sopenharmony_ci{ 17962306a36Sopenharmony_ci if (unlikely(!slab_is_available())) { 18062306a36Sopenharmony_ci void *ptr = memblock_alloc(PAGE_SIZE, PAGE_SIZE); 18162306a36Sopenharmony_ci 18262306a36Sopenharmony_ci if (!ptr) 18362306a36Sopenharmony_ci panic("%s: Failed to allocate %lu bytes align=0x%lx\n", 18462306a36Sopenharmony_ci __func__, PAGE_SIZE, PAGE_SIZE); 18562306a36Sopenharmony_ci 18662306a36Sopenharmony_ci return ptr; 18762306a36Sopenharmony_ci } 18862306a36Sopenharmony_ci 18962306a36Sopenharmony_ci return (void *)__get_free_page(GFP_KERNEL); 19062306a36Sopenharmony_ci} 19162306a36Sopenharmony_ci 19262306a36Sopenharmony_cistatic void __ref free_p2m_page(void *p) 19362306a36Sopenharmony_ci{ 19462306a36Sopenharmony_ci if (unlikely(!slab_is_available())) { 19562306a36Sopenharmony_ci memblock_free(p, PAGE_SIZE); 19662306a36Sopenharmony_ci return; 19762306a36Sopenharmony_ci } 19862306a36Sopenharmony_ci 19962306a36Sopenharmony_ci free_page((unsigned long)p); 20062306a36Sopenharmony_ci} 20162306a36Sopenharmony_ci 20262306a36Sopenharmony_ci/* 20362306a36Sopenharmony_ci * Build the parallel p2m_top_mfn and p2m_mid_mfn structures 20462306a36Sopenharmony_ci * 20562306a36Sopenharmony_ci * This is called both at boot time, and after resuming from suspend: 20662306a36Sopenharmony_ci * - At boot time we're called rather early, and must use alloc_bootmem*() 20762306a36Sopenharmony_ci * to allocate memory. 20862306a36Sopenharmony_ci * 20962306a36Sopenharmony_ci * - After resume we're called from within stop_machine, but the mfn 21062306a36Sopenharmony_ci * tree should already be completely allocated. 21162306a36Sopenharmony_ci */ 21262306a36Sopenharmony_civoid __ref xen_build_mfn_list_list(void) 21362306a36Sopenharmony_ci{ 21462306a36Sopenharmony_ci unsigned long pfn, mfn; 21562306a36Sopenharmony_ci pte_t *ptep; 21662306a36Sopenharmony_ci unsigned int level, topidx, mididx; 21762306a36Sopenharmony_ci unsigned long *mid_mfn_p; 21862306a36Sopenharmony_ci 21962306a36Sopenharmony_ci if (xen_start_info->flags & SIF_VIRT_P2M_4TOOLS) 22062306a36Sopenharmony_ci return; 22162306a36Sopenharmony_ci 22262306a36Sopenharmony_ci /* Pre-initialize p2m_top_mfn to be completely missing */ 22362306a36Sopenharmony_ci if (p2m_top_mfn == NULL) { 22462306a36Sopenharmony_ci p2m_mid_missing_mfn = alloc_p2m_page(); 22562306a36Sopenharmony_ci p2m_mid_mfn_init(p2m_mid_missing_mfn, p2m_missing); 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ci p2m_top_mfn_p = alloc_p2m_page(); 22862306a36Sopenharmony_ci p2m_top_mfn_p_init(p2m_top_mfn_p); 22962306a36Sopenharmony_ci 23062306a36Sopenharmony_ci p2m_top_mfn = alloc_p2m_page(); 23162306a36Sopenharmony_ci p2m_top_mfn_init(p2m_top_mfn); 23262306a36Sopenharmony_ci } else { 23362306a36Sopenharmony_ci /* Reinitialise, mfn's all change after migration */ 23462306a36Sopenharmony_ci p2m_mid_mfn_init(p2m_mid_missing_mfn, p2m_missing); 23562306a36Sopenharmony_ci } 23662306a36Sopenharmony_ci 23762306a36Sopenharmony_ci for (pfn = 0; pfn < xen_max_p2m_pfn && pfn < MAX_P2M_PFN; 23862306a36Sopenharmony_ci pfn += P2M_PER_PAGE) { 23962306a36Sopenharmony_ci topidx = p2m_top_index(pfn); 24062306a36Sopenharmony_ci mididx = p2m_mid_index(pfn); 24162306a36Sopenharmony_ci 24262306a36Sopenharmony_ci mid_mfn_p = p2m_top_mfn_p[topidx]; 24362306a36Sopenharmony_ci ptep = lookup_address((unsigned long)(xen_p2m_addr + pfn), 24462306a36Sopenharmony_ci &level); 24562306a36Sopenharmony_ci BUG_ON(!ptep || level != PG_LEVEL_4K); 24662306a36Sopenharmony_ci mfn = pte_mfn(*ptep); 24762306a36Sopenharmony_ci ptep = (pte_t *)((unsigned long)ptep & ~(PAGE_SIZE - 1)); 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci /* Don't bother allocating any mfn mid levels if 25062306a36Sopenharmony_ci * they're just missing, just update the stored mfn, 25162306a36Sopenharmony_ci * since all could have changed over a migrate. 25262306a36Sopenharmony_ci */ 25362306a36Sopenharmony_ci if (ptep == p2m_missing_pte || ptep == p2m_identity_pte) { 25462306a36Sopenharmony_ci BUG_ON(mididx); 25562306a36Sopenharmony_ci BUG_ON(mid_mfn_p != p2m_mid_missing_mfn); 25662306a36Sopenharmony_ci p2m_top_mfn[topidx] = virt_to_mfn(p2m_mid_missing_mfn); 25762306a36Sopenharmony_ci pfn += (P2M_MID_PER_PAGE - 1) * P2M_PER_PAGE; 25862306a36Sopenharmony_ci continue; 25962306a36Sopenharmony_ci } 26062306a36Sopenharmony_ci 26162306a36Sopenharmony_ci if (mid_mfn_p == p2m_mid_missing_mfn) { 26262306a36Sopenharmony_ci mid_mfn_p = alloc_p2m_page(); 26362306a36Sopenharmony_ci p2m_mid_mfn_init(mid_mfn_p, p2m_missing); 26462306a36Sopenharmony_ci 26562306a36Sopenharmony_ci p2m_top_mfn_p[topidx] = mid_mfn_p; 26662306a36Sopenharmony_ci } 26762306a36Sopenharmony_ci 26862306a36Sopenharmony_ci p2m_top_mfn[topidx] = virt_to_mfn(mid_mfn_p); 26962306a36Sopenharmony_ci mid_mfn_p[mididx] = mfn; 27062306a36Sopenharmony_ci } 27162306a36Sopenharmony_ci} 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_civoid xen_setup_mfn_list_list(void) 27462306a36Sopenharmony_ci{ 27562306a36Sopenharmony_ci BUG_ON(HYPERVISOR_shared_info == &xen_dummy_shared_info); 27662306a36Sopenharmony_ci 27762306a36Sopenharmony_ci if (xen_start_info->flags & SIF_VIRT_P2M_4TOOLS) 27862306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.pfn_to_mfn_frame_list_list = ~0UL; 27962306a36Sopenharmony_ci else 28062306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.pfn_to_mfn_frame_list_list = 28162306a36Sopenharmony_ci virt_to_mfn(p2m_top_mfn); 28262306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.max_pfn = xen_p2m_last_pfn; 28362306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_generation = 0; 28462306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_vaddr = (unsigned long)xen_p2m_addr; 28562306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_cr3 = 28662306a36Sopenharmony_ci xen_pfn_to_cr3(virt_to_mfn(swapper_pg_dir)); 28762306a36Sopenharmony_ci} 28862306a36Sopenharmony_ci 28962306a36Sopenharmony_ci/* Set up p2m_top to point to the domain-builder provided p2m pages */ 29062306a36Sopenharmony_civoid __init xen_build_dynamic_phys_to_machine(void) 29162306a36Sopenharmony_ci{ 29262306a36Sopenharmony_ci unsigned long pfn; 29362306a36Sopenharmony_ci 29462306a36Sopenharmony_ci xen_p2m_addr = (unsigned long *)xen_start_info->mfn_list; 29562306a36Sopenharmony_ci xen_p2m_size = ALIGN(xen_start_info->nr_pages, P2M_PER_PAGE); 29662306a36Sopenharmony_ci 29762306a36Sopenharmony_ci for (pfn = xen_start_info->nr_pages; pfn < xen_p2m_size; pfn++) 29862306a36Sopenharmony_ci xen_p2m_addr[pfn] = INVALID_P2M_ENTRY; 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_ci xen_max_p2m_pfn = xen_p2m_size; 30162306a36Sopenharmony_ci} 30262306a36Sopenharmony_ci 30362306a36Sopenharmony_ci#define P2M_TYPE_IDENTITY 0 30462306a36Sopenharmony_ci#define P2M_TYPE_MISSING 1 30562306a36Sopenharmony_ci#define P2M_TYPE_PFN 2 30662306a36Sopenharmony_ci#define P2M_TYPE_UNKNOWN 3 30762306a36Sopenharmony_ci 30862306a36Sopenharmony_cistatic int xen_p2m_elem_type(unsigned long pfn) 30962306a36Sopenharmony_ci{ 31062306a36Sopenharmony_ci unsigned long mfn; 31162306a36Sopenharmony_ci 31262306a36Sopenharmony_ci if (pfn >= xen_p2m_size) 31362306a36Sopenharmony_ci return P2M_TYPE_IDENTITY; 31462306a36Sopenharmony_ci 31562306a36Sopenharmony_ci mfn = xen_p2m_addr[pfn]; 31662306a36Sopenharmony_ci 31762306a36Sopenharmony_ci if (mfn == INVALID_P2M_ENTRY) 31862306a36Sopenharmony_ci return P2M_TYPE_MISSING; 31962306a36Sopenharmony_ci 32062306a36Sopenharmony_ci if (mfn & IDENTITY_FRAME_BIT) 32162306a36Sopenharmony_ci return P2M_TYPE_IDENTITY; 32262306a36Sopenharmony_ci 32362306a36Sopenharmony_ci return P2M_TYPE_PFN; 32462306a36Sopenharmony_ci} 32562306a36Sopenharmony_ci 32662306a36Sopenharmony_cistatic void __init xen_rebuild_p2m_list(unsigned long *p2m) 32762306a36Sopenharmony_ci{ 32862306a36Sopenharmony_ci unsigned int i, chunk; 32962306a36Sopenharmony_ci unsigned long pfn; 33062306a36Sopenharmony_ci unsigned long *mfns; 33162306a36Sopenharmony_ci pte_t *ptep; 33262306a36Sopenharmony_ci pmd_t *pmdp; 33362306a36Sopenharmony_ci int type; 33462306a36Sopenharmony_ci 33562306a36Sopenharmony_ci p2m_missing = alloc_p2m_page(); 33662306a36Sopenharmony_ci p2m_init(p2m_missing); 33762306a36Sopenharmony_ci p2m_identity = alloc_p2m_page(); 33862306a36Sopenharmony_ci p2m_init(p2m_identity); 33962306a36Sopenharmony_ci 34062306a36Sopenharmony_ci p2m_missing_pte = alloc_p2m_page(); 34162306a36Sopenharmony_ci paravirt_alloc_pte(&init_mm, __pa(p2m_missing_pte) >> PAGE_SHIFT); 34262306a36Sopenharmony_ci p2m_identity_pte = alloc_p2m_page(); 34362306a36Sopenharmony_ci paravirt_alloc_pte(&init_mm, __pa(p2m_identity_pte) >> PAGE_SHIFT); 34462306a36Sopenharmony_ci for (i = 0; i < PTRS_PER_PTE; i++) { 34562306a36Sopenharmony_ci set_pte(p2m_missing_pte + i, 34662306a36Sopenharmony_ci pfn_pte(PFN_DOWN(__pa(p2m_missing)), PAGE_KERNEL_RO)); 34762306a36Sopenharmony_ci set_pte(p2m_identity_pte + i, 34862306a36Sopenharmony_ci pfn_pte(PFN_DOWN(__pa(p2m_identity)), PAGE_KERNEL_RO)); 34962306a36Sopenharmony_ci } 35062306a36Sopenharmony_ci 35162306a36Sopenharmony_ci for (pfn = 0; pfn < xen_max_p2m_pfn; pfn += chunk) { 35262306a36Sopenharmony_ci /* 35362306a36Sopenharmony_ci * Try to map missing/identity PMDs or p2m-pages if possible. 35462306a36Sopenharmony_ci * We have to respect the structure of the mfn_list_list 35562306a36Sopenharmony_ci * which will be built just afterwards. 35662306a36Sopenharmony_ci * Chunk size to test is one p2m page if we are in the middle 35762306a36Sopenharmony_ci * of a mfn_list_list mid page and the complete mid page area 35862306a36Sopenharmony_ci * if we are at index 0 of the mid page. Please note that a 35962306a36Sopenharmony_ci * mid page might cover more than one PMD, e.g. on 32 bit PAE 36062306a36Sopenharmony_ci * kernels. 36162306a36Sopenharmony_ci */ 36262306a36Sopenharmony_ci chunk = (pfn & (P2M_PER_PAGE * P2M_MID_PER_PAGE - 1)) ? 36362306a36Sopenharmony_ci P2M_PER_PAGE : P2M_PER_PAGE * P2M_MID_PER_PAGE; 36462306a36Sopenharmony_ci 36562306a36Sopenharmony_ci type = xen_p2m_elem_type(pfn); 36662306a36Sopenharmony_ci i = 0; 36762306a36Sopenharmony_ci if (type != P2M_TYPE_PFN) 36862306a36Sopenharmony_ci for (i = 1; i < chunk; i++) 36962306a36Sopenharmony_ci if (xen_p2m_elem_type(pfn + i) != type) 37062306a36Sopenharmony_ci break; 37162306a36Sopenharmony_ci if (i < chunk) 37262306a36Sopenharmony_ci /* Reset to minimal chunk size. */ 37362306a36Sopenharmony_ci chunk = P2M_PER_PAGE; 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci if (type == P2M_TYPE_PFN || i < chunk) { 37662306a36Sopenharmony_ci /* Use initial p2m page contents. */ 37762306a36Sopenharmony_ci mfns = alloc_p2m_page(); 37862306a36Sopenharmony_ci copy_page(mfns, xen_p2m_addr + pfn); 37962306a36Sopenharmony_ci ptep = populate_extra_pte((unsigned long)(p2m + pfn)); 38062306a36Sopenharmony_ci set_pte(ptep, 38162306a36Sopenharmony_ci pfn_pte(PFN_DOWN(__pa(mfns)), PAGE_KERNEL)); 38262306a36Sopenharmony_ci continue; 38362306a36Sopenharmony_ci } 38462306a36Sopenharmony_ci 38562306a36Sopenharmony_ci if (chunk == P2M_PER_PAGE) { 38662306a36Sopenharmony_ci /* Map complete missing or identity p2m-page. */ 38762306a36Sopenharmony_ci mfns = (type == P2M_TYPE_MISSING) ? 38862306a36Sopenharmony_ci p2m_missing : p2m_identity; 38962306a36Sopenharmony_ci ptep = populate_extra_pte((unsigned long)(p2m + pfn)); 39062306a36Sopenharmony_ci set_pte(ptep, 39162306a36Sopenharmony_ci pfn_pte(PFN_DOWN(__pa(mfns)), PAGE_KERNEL_RO)); 39262306a36Sopenharmony_ci continue; 39362306a36Sopenharmony_ci } 39462306a36Sopenharmony_ci 39562306a36Sopenharmony_ci /* Complete missing or identity PMD(s) can be mapped. */ 39662306a36Sopenharmony_ci ptep = (type == P2M_TYPE_MISSING) ? 39762306a36Sopenharmony_ci p2m_missing_pte : p2m_identity_pte; 39862306a36Sopenharmony_ci for (i = 0; i < PMDS_PER_MID_PAGE; i++) { 39962306a36Sopenharmony_ci pmdp = populate_extra_pmd( 40062306a36Sopenharmony_ci (unsigned long)(p2m + pfn) + i * PMD_SIZE); 40162306a36Sopenharmony_ci set_pmd(pmdp, __pmd(__pa(ptep) | _KERNPG_TABLE)); 40262306a36Sopenharmony_ci } 40362306a36Sopenharmony_ci } 40462306a36Sopenharmony_ci} 40562306a36Sopenharmony_ci 40662306a36Sopenharmony_civoid __init xen_vmalloc_p2m_tree(void) 40762306a36Sopenharmony_ci{ 40862306a36Sopenharmony_ci static struct vm_struct vm; 40962306a36Sopenharmony_ci unsigned long p2m_limit; 41062306a36Sopenharmony_ci 41162306a36Sopenharmony_ci xen_p2m_last_pfn = xen_max_p2m_pfn; 41262306a36Sopenharmony_ci 41362306a36Sopenharmony_ci p2m_limit = (phys_addr_t)P2M_LIMIT * 1024 * 1024 * 1024 / PAGE_SIZE; 41462306a36Sopenharmony_ci vm.flags = VM_ALLOC; 41562306a36Sopenharmony_ci vm.size = ALIGN(sizeof(unsigned long) * max(xen_max_p2m_pfn, p2m_limit), 41662306a36Sopenharmony_ci PMD_SIZE * PMDS_PER_MID_PAGE); 41762306a36Sopenharmony_ci vm_area_register_early(&vm, PMD_SIZE * PMDS_PER_MID_PAGE); 41862306a36Sopenharmony_ci pr_notice("p2m virtual area at %p, size is %lx\n", vm.addr, vm.size); 41962306a36Sopenharmony_ci 42062306a36Sopenharmony_ci xen_max_p2m_pfn = vm.size / sizeof(unsigned long); 42162306a36Sopenharmony_ci 42262306a36Sopenharmony_ci xen_rebuild_p2m_list(vm.addr); 42362306a36Sopenharmony_ci 42462306a36Sopenharmony_ci xen_p2m_addr = vm.addr; 42562306a36Sopenharmony_ci xen_p2m_size = xen_max_p2m_pfn; 42662306a36Sopenharmony_ci 42762306a36Sopenharmony_ci xen_inv_extra_mem(); 42862306a36Sopenharmony_ci} 42962306a36Sopenharmony_ci 43062306a36Sopenharmony_ciunsigned long get_phys_to_machine(unsigned long pfn) 43162306a36Sopenharmony_ci{ 43262306a36Sopenharmony_ci pte_t *ptep; 43362306a36Sopenharmony_ci unsigned int level; 43462306a36Sopenharmony_ci 43562306a36Sopenharmony_ci if (unlikely(pfn >= xen_p2m_size)) { 43662306a36Sopenharmony_ci if (pfn < xen_max_p2m_pfn) 43762306a36Sopenharmony_ci return xen_chk_extra_mem(pfn); 43862306a36Sopenharmony_ci 43962306a36Sopenharmony_ci return IDENTITY_FRAME(pfn); 44062306a36Sopenharmony_ci } 44162306a36Sopenharmony_ci 44262306a36Sopenharmony_ci ptep = lookup_address((unsigned long)(xen_p2m_addr + pfn), &level); 44362306a36Sopenharmony_ci BUG_ON(!ptep || level != PG_LEVEL_4K); 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_ci /* 44662306a36Sopenharmony_ci * The INVALID_P2M_ENTRY is filled in both p2m_*identity 44762306a36Sopenharmony_ci * and in p2m_*missing, so returning the INVALID_P2M_ENTRY 44862306a36Sopenharmony_ci * would be wrong. 44962306a36Sopenharmony_ci */ 45062306a36Sopenharmony_ci if (pte_pfn(*ptep) == PFN_DOWN(__pa(p2m_identity))) 45162306a36Sopenharmony_ci return IDENTITY_FRAME(pfn); 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ci return xen_p2m_addr[pfn]; 45462306a36Sopenharmony_ci} 45562306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(get_phys_to_machine); 45662306a36Sopenharmony_ci 45762306a36Sopenharmony_ci/* 45862306a36Sopenharmony_ci * Allocate new pmd(s). It is checked whether the old pmd is still in place. 45962306a36Sopenharmony_ci * If not, nothing is changed. This is okay as the only reason for allocating 46062306a36Sopenharmony_ci * a new pmd is to replace p2m_missing_pte or p2m_identity_pte by a individual 46162306a36Sopenharmony_ci * pmd. 46262306a36Sopenharmony_ci */ 46362306a36Sopenharmony_cistatic pte_t *alloc_p2m_pmd(unsigned long addr, pte_t *pte_pg) 46462306a36Sopenharmony_ci{ 46562306a36Sopenharmony_ci pte_t *ptechk; 46662306a36Sopenharmony_ci pte_t *pte_newpg[PMDS_PER_MID_PAGE]; 46762306a36Sopenharmony_ci pmd_t *pmdp; 46862306a36Sopenharmony_ci unsigned int level; 46962306a36Sopenharmony_ci unsigned long flags; 47062306a36Sopenharmony_ci unsigned long vaddr; 47162306a36Sopenharmony_ci int i; 47262306a36Sopenharmony_ci 47362306a36Sopenharmony_ci /* Do all allocations first to bail out in error case. */ 47462306a36Sopenharmony_ci for (i = 0; i < PMDS_PER_MID_PAGE; i++) { 47562306a36Sopenharmony_ci pte_newpg[i] = alloc_p2m_page(); 47662306a36Sopenharmony_ci if (!pte_newpg[i]) { 47762306a36Sopenharmony_ci for (i--; i >= 0; i--) 47862306a36Sopenharmony_ci free_p2m_page(pte_newpg[i]); 47962306a36Sopenharmony_ci 48062306a36Sopenharmony_ci return NULL; 48162306a36Sopenharmony_ci } 48262306a36Sopenharmony_ci } 48362306a36Sopenharmony_ci 48462306a36Sopenharmony_ci vaddr = addr & ~(PMD_SIZE * PMDS_PER_MID_PAGE - 1); 48562306a36Sopenharmony_ci 48662306a36Sopenharmony_ci for (i = 0; i < PMDS_PER_MID_PAGE; i++) { 48762306a36Sopenharmony_ci copy_page(pte_newpg[i], pte_pg); 48862306a36Sopenharmony_ci paravirt_alloc_pte(&init_mm, __pa(pte_newpg[i]) >> PAGE_SHIFT); 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci pmdp = lookup_pmd_address(vaddr); 49162306a36Sopenharmony_ci BUG_ON(!pmdp); 49262306a36Sopenharmony_ci 49362306a36Sopenharmony_ci spin_lock_irqsave(&p2m_update_lock, flags); 49462306a36Sopenharmony_ci 49562306a36Sopenharmony_ci ptechk = lookup_address(vaddr, &level); 49662306a36Sopenharmony_ci if (ptechk == pte_pg) { 49762306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_generation++; 49862306a36Sopenharmony_ci wmb(); /* Tools are synchronizing via p2m_generation. */ 49962306a36Sopenharmony_ci set_pmd(pmdp, 50062306a36Sopenharmony_ci __pmd(__pa(pte_newpg[i]) | _KERNPG_TABLE)); 50162306a36Sopenharmony_ci wmb(); /* Tools are synchronizing via p2m_generation. */ 50262306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_generation++; 50362306a36Sopenharmony_ci pte_newpg[i] = NULL; 50462306a36Sopenharmony_ci } 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_ci spin_unlock_irqrestore(&p2m_update_lock, flags); 50762306a36Sopenharmony_ci 50862306a36Sopenharmony_ci if (pte_newpg[i]) { 50962306a36Sopenharmony_ci paravirt_release_pte(__pa(pte_newpg[i]) >> PAGE_SHIFT); 51062306a36Sopenharmony_ci free_p2m_page(pte_newpg[i]); 51162306a36Sopenharmony_ci } 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_ci vaddr += PMD_SIZE; 51462306a36Sopenharmony_ci } 51562306a36Sopenharmony_ci 51662306a36Sopenharmony_ci return lookup_address(addr, &level); 51762306a36Sopenharmony_ci} 51862306a36Sopenharmony_ci 51962306a36Sopenharmony_ci/* 52062306a36Sopenharmony_ci * Fully allocate the p2m structure for a given pfn. We need to check 52162306a36Sopenharmony_ci * that both the top and mid levels are allocated, and make sure the 52262306a36Sopenharmony_ci * parallel mfn tree is kept in sync. We may race with other cpus, so 52362306a36Sopenharmony_ci * the new pages are installed with cmpxchg; if we lose the race then 52462306a36Sopenharmony_ci * simply free the page we allocated and use the one that's there. 52562306a36Sopenharmony_ci */ 52662306a36Sopenharmony_ciint xen_alloc_p2m_entry(unsigned long pfn) 52762306a36Sopenharmony_ci{ 52862306a36Sopenharmony_ci unsigned topidx; 52962306a36Sopenharmony_ci unsigned long *top_mfn_p, *mid_mfn; 53062306a36Sopenharmony_ci pte_t *ptep, *pte_pg; 53162306a36Sopenharmony_ci unsigned int level; 53262306a36Sopenharmony_ci unsigned long flags; 53362306a36Sopenharmony_ci unsigned long addr = (unsigned long)(xen_p2m_addr + pfn); 53462306a36Sopenharmony_ci unsigned long p2m_pfn; 53562306a36Sopenharmony_ci 53662306a36Sopenharmony_ci ptep = lookup_address(addr, &level); 53762306a36Sopenharmony_ci BUG_ON(!ptep || level != PG_LEVEL_4K); 53862306a36Sopenharmony_ci pte_pg = (pte_t *)((unsigned long)ptep & ~(PAGE_SIZE - 1)); 53962306a36Sopenharmony_ci 54062306a36Sopenharmony_ci if (pte_pg == p2m_missing_pte || pte_pg == p2m_identity_pte) { 54162306a36Sopenharmony_ci /* PMD level is missing, allocate a new one */ 54262306a36Sopenharmony_ci ptep = alloc_p2m_pmd(addr, pte_pg); 54362306a36Sopenharmony_ci if (!ptep) 54462306a36Sopenharmony_ci return -ENOMEM; 54562306a36Sopenharmony_ci } 54662306a36Sopenharmony_ci 54762306a36Sopenharmony_ci if (p2m_top_mfn && pfn < MAX_P2M_PFN) { 54862306a36Sopenharmony_ci topidx = p2m_top_index(pfn); 54962306a36Sopenharmony_ci top_mfn_p = &p2m_top_mfn[topidx]; 55062306a36Sopenharmony_ci mid_mfn = READ_ONCE(p2m_top_mfn_p[topidx]); 55162306a36Sopenharmony_ci 55262306a36Sopenharmony_ci BUG_ON(virt_to_mfn(mid_mfn) != *top_mfn_p); 55362306a36Sopenharmony_ci 55462306a36Sopenharmony_ci if (mid_mfn == p2m_mid_missing_mfn) { 55562306a36Sopenharmony_ci /* Separately check the mid mfn level */ 55662306a36Sopenharmony_ci unsigned long missing_mfn; 55762306a36Sopenharmony_ci unsigned long mid_mfn_mfn; 55862306a36Sopenharmony_ci unsigned long old_mfn; 55962306a36Sopenharmony_ci 56062306a36Sopenharmony_ci mid_mfn = alloc_p2m_page(); 56162306a36Sopenharmony_ci if (!mid_mfn) 56262306a36Sopenharmony_ci return -ENOMEM; 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_ci p2m_mid_mfn_init(mid_mfn, p2m_missing); 56562306a36Sopenharmony_ci 56662306a36Sopenharmony_ci missing_mfn = virt_to_mfn(p2m_mid_missing_mfn); 56762306a36Sopenharmony_ci mid_mfn_mfn = virt_to_mfn(mid_mfn); 56862306a36Sopenharmony_ci old_mfn = cmpxchg(top_mfn_p, missing_mfn, mid_mfn_mfn); 56962306a36Sopenharmony_ci if (old_mfn != missing_mfn) { 57062306a36Sopenharmony_ci free_p2m_page(mid_mfn); 57162306a36Sopenharmony_ci mid_mfn = mfn_to_virt(old_mfn); 57262306a36Sopenharmony_ci } else { 57362306a36Sopenharmony_ci p2m_top_mfn_p[topidx] = mid_mfn; 57462306a36Sopenharmony_ci } 57562306a36Sopenharmony_ci } 57662306a36Sopenharmony_ci } else { 57762306a36Sopenharmony_ci mid_mfn = NULL; 57862306a36Sopenharmony_ci } 57962306a36Sopenharmony_ci 58062306a36Sopenharmony_ci p2m_pfn = pte_pfn(READ_ONCE(*ptep)); 58162306a36Sopenharmony_ci if (p2m_pfn == PFN_DOWN(__pa(p2m_identity)) || 58262306a36Sopenharmony_ci p2m_pfn == PFN_DOWN(__pa(p2m_missing))) { 58362306a36Sopenharmony_ci /* p2m leaf page is missing */ 58462306a36Sopenharmony_ci unsigned long *p2m; 58562306a36Sopenharmony_ci 58662306a36Sopenharmony_ci p2m = alloc_p2m_page(); 58762306a36Sopenharmony_ci if (!p2m) 58862306a36Sopenharmony_ci return -ENOMEM; 58962306a36Sopenharmony_ci 59062306a36Sopenharmony_ci if (p2m_pfn == PFN_DOWN(__pa(p2m_missing))) 59162306a36Sopenharmony_ci p2m_init(p2m); 59262306a36Sopenharmony_ci else 59362306a36Sopenharmony_ci p2m_init_identity(p2m, pfn & ~(P2M_PER_PAGE - 1)); 59462306a36Sopenharmony_ci 59562306a36Sopenharmony_ci spin_lock_irqsave(&p2m_update_lock, flags); 59662306a36Sopenharmony_ci 59762306a36Sopenharmony_ci if (pte_pfn(*ptep) == p2m_pfn) { 59862306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_generation++; 59962306a36Sopenharmony_ci wmb(); /* Tools are synchronizing via p2m_generation. */ 60062306a36Sopenharmony_ci set_pte(ptep, 60162306a36Sopenharmony_ci pfn_pte(PFN_DOWN(__pa(p2m)), PAGE_KERNEL)); 60262306a36Sopenharmony_ci wmb(); /* Tools are synchronizing via p2m_generation. */ 60362306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.p2m_generation++; 60462306a36Sopenharmony_ci if (mid_mfn) 60562306a36Sopenharmony_ci mid_mfn[p2m_mid_index(pfn)] = virt_to_mfn(p2m); 60662306a36Sopenharmony_ci p2m = NULL; 60762306a36Sopenharmony_ci } 60862306a36Sopenharmony_ci 60962306a36Sopenharmony_ci spin_unlock_irqrestore(&p2m_update_lock, flags); 61062306a36Sopenharmony_ci 61162306a36Sopenharmony_ci if (p2m) 61262306a36Sopenharmony_ci free_p2m_page(p2m); 61362306a36Sopenharmony_ci } 61462306a36Sopenharmony_ci 61562306a36Sopenharmony_ci /* Expanded the p2m? */ 61662306a36Sopenharmony_ci if (pfn >= xen_p2m_last_pfn) { 61762306a36Sopenharmony_ci xen_p2m_last_pfn = ALIGN(pfn + 1, P2M_PER_PAGE); 61862306a36Sopenharmony_ci HYPERVISOR_shared_info->arch.max_pfn = xen_p2m_last_pfn; 61962306a36Sopenharmony_ci } 62062306a36Sopenharmony_ci 62162306a36Sopenharmony_ci return 0; 62262306a36Sopenharmony_ci} 62362306a36Sopenharmony_ciEXPORT_SYMBOL(xen_alloc_p2m_entry); 62462306a36Sopenharmony_ci 62562306a36Sopenharmony_ciunsigned long __init set_phys_range_identity(unsigned long pfn_s, 62662306a36Sopenharmony_ci unsigned long pfn_e) 62762306a36Sopenharmony_ci{ 62862306a36Sopenharmony_ci unsigned long pfn; 62962306a36Sopenharmony_ci 63062306a36Sopenharmony_ci if (unlikely(pfn_s >= xen_p2m_size)) 63162306a36Sopenharmony_ci return 0; 63262306a36Sopenharmony_ci 63362306a36Sopenharmony_ci if (pfn_s > pfn_e) 63462306a36Sopenharmony_ci return 0; 63562306a36Sopenharmony_ci 63662306a36Sopenharmony_ci if (pfn_e > xen_p2m_size) 63762306a36Sopenharmony_ci pfn_e = xen_p2m_size; 63862306a36Sopenharmony_ci 63962306a36Sopenharmony_ci for (pfn = pfn_s; pfn < pfn_e; pfn++) 64062306a36Sopenharmony_ci xen_p2m_addr[pfn] = IDENTITY_FRAME(pfn); 64162306a36Sopenharmony_ci 64262306a36Sopenharmony_ci return pfn - pfn_s; 64362306a36Sopenharmony_ci} 64462306a36Sopenharmony_ci 64562306a36Sopenharmony_cibool __set_phys_to_machine(unsigned long pfn, unsigned long mfn) 64662306a36Sopenharmony_ci{ 64762306a36Sopenharmony_ci pte_t *ptep; 64862306a36Sopenharmony_ci unsigned int level; 64962306a36Sopenharmony_ci 65062306a36Sopenharmony_ci /* Only invalid entries allowed above the highest p2m covered frame. */ 65162306a36Sopenharmony_ci if (unlikely(pfn >= xen_p2m_size)) 65262306a36Sopenharmony_ci return mfn == INVALID_P2M_ENTRY; 65362306a36Sopenharmony_ci 65462306a36Sopenharmony_ci /* 65562306a36Sopenharmony_ci * The interface requires atomic updates on p2m elements. 65662306a36Sopenharmony_ci * xen_safe_write_ulong() is using an atomic store via asm(). 65762306a36Sopenharmony_ci */ 65862306a36Sopenharmony_ci if (likely(!xen_safe_write_ulong(xen_p2m_addr + pfn, mfn))) 65962306a36Sopenharmony_ci return true; 66062306a36Sopenharmony_ci 66162306a36Sopenharmony_ci ptep = lookup_address((unsigned long)(xen_p2m_addr + pfn), &level); 66262306a36Sopenharmony_ci BUG_ON(!ptep || level != PG_LEVEL_4K); 66362306a36Sopenharmony_ci 66462306a36Sopenharmony_ci if (pte_pfn(*ptep) == PFN_DOWN(__pa(p2m_missing))) 66562306a36Sopenharmony_ci return mfn == INVALID_P2M_ENTRY; 66662306a36Sopenharmony_ci 66762306a36Sopenharmony_ci if (pte_pfn(*ptep) == PFN_DOWN(__pa(p2m_identity))) 66862306a36Sopenharmony_ci return mfn == IDENTITY_FRAME(pfn); 66962306a36Sopenharmony_ci 67062306a36Sopenharmony_ci return false; 67162306a36Sopenharmony_ci} 67262306a36Sopenharmony_ci 67362306a36Sopenharmony_cibool set_phys_to_machine(unsigned long pfn, unsigned long mfn) 67462306a36Sopenharmony_ci{ 67562306a36Sopenharmony_ci if (unlikely(!__set_phys_to_machine(pfn, mfn))) { 67662306a36Sopenharmony_ci int ret; 67762306a36Sopenharmony_ci 67862306a36Sopenharmony_ci ret = xen_alloc_p2m_entry(pfn); 67962306a36Sopenharmony_ci if (ret < 0) 68062306a36Sopenharmony_ci return false; 68162306a36Sopenharmony_ci 68262306a36Sopenharmony_ci return __set_phys_to_machine(pfn, mfn); 68362306a36Sopenharmony_ci } 68462306a36Sopenharmony_ci 68562306a36Sopenharmony_ci return true; 68662306a36Sopenharmony_ci} 68762306a36Sopenharmony_ci 68862306a36Sopenharmony_ciint set_foreign_p2m_mapping(struct gnttab_map_grant_ref *map_ops, 68962306a36Sopenharmony_ci struct gnttab_map_grant_ref *kmap_ops, 69062306a36Sopenharmony_ci struct page **pages, unsigned int count) 69162306a36Sopenharmony_ci{ 69262306a36Sopenharmony_ci int i, ret = 0; 69362306a36Sopenharmony_ci pte_t *pte; 69462306a36Sopenharmony_ci 69562306a36Sopenharmony_ci if (xen_feature(XENFEAT_auto_translated_physmap)) 69662306a36Sopenharmony_ci return 0; 69762306a36Sopenharmony_ci 69862306a36Sopenharmony_ci if (kmap_ops) { 69962306a36Sopenharmony_ci ret = HYPERVISOR_grant_table_op(GNTTABOP_map_grant_ref, 70062306a36Sopenharmony_ci kmap_ops, count); 70162306a36Sopenharmony_ci if (ret) 70262306a36Sopenharmony_ci goto out; 70362306a36Sopenharmony_ci } 70462306a36Sopenharmony_ci 70562306a36Sopenharmony_ci for (i = 0; i < count; i++) { 70662306a36Sopenharmony_ci unsigned long mfn, pfn; 70762306a36Sopenharmony_ci struct gnttab_unmap_grant_ref unmap[2]; 70862306a36Sopenharmony_ci int rc; 70962306a36Sopenharmony_ci 71062306a36Sopenharmony_ci /* Do not add to override if the map failed. */ 71162306a36Sopenharmony_ci if (map_ops[i].status != GNTST_okay || 71262306a36Sopenharmony_ci (kmap_ops && kmap_ops[i].status != GNTST_okay)) 71362306a36Sopenharmony_ci continue; 71462306a36Sopenharmony_ci 71562306a36Sopenharmony_ci if (map_ops[i].flags & GNTMAP_contains_pte) { 71662306a36Sopenharmony_ci pte = (pte_t *)(mfn_to_virt(PFN_DOWN(map_ops[i].host_addr)) + 71762306a36Sopenharmony_ci (map_ops[i].host_addr & ~PAGE_MASK)); 71862306a36Sopenharmony_ci mfn = pte_mfn(*pte); 71962306a36Sopenharmony_ci } else { 72062306a36Sopenharmony_ci mfn = PFN_DOWN(map_ops[i].dev_bus_addr); 72162306a36Sopenharmony_ci } 72262306a36Sopenharmony_ci pfn = page_to_pfn(pages[i]); 72362306a36Sopenharmony_ci 72462306a36Sopenharmony_ci WARN(pfn_to_mfn(pfn) != INVALID_P2M_ENTRY, "page must be ballooned"); 72562306a36Sopenharmony_ci 72662306a36Sopenharmony_ci if (likely(set_phys_to_machine(pfn, FOREIGN_FRAME(mfn)))) 72762306a36Sopenharmony_ci continue; 72862306a36Sopenharmony_ci 72962306a36Sopenharmony_ci /* 73062306a36Sopenharmony_ci * Signal an error for this slot. This in turn requires 73162306a36Sopenharmony_ci * immediate unmapping. 73262306a36Sopenharmony_ci */ 73362306a36Sopenharmony_ci map_ops[i].status = GNTST_general_error; 73462306a36Sopenharmony_ci unmap[0].host_addr = map_ops[i].host_addr, 73562306a36Sopenharmony_ci unmap[0].handle = map_ops[i].handle; 73662306a36Sopenharmony_ci map_ops[i].handle = INVALID_GRANT_HANDLE; 73762306a36Sopenharmony_ci if (map_ops[i].flags & GNTMAP_device_map) 73862306a36Sopenharmony_ci unmap[0].dev_bus_addr = map_ops[i].dev_bus_addr; 73962306a36Sopenharmony_ci else 74062306a36Sopenharmony_ci unmap[0].dev_bus_addr = 0; 74162306a36Sopenharmony_ci 74262306a36Sopenharmony_ci if (kmap_ops) { 74362306a36Sopenharmony_ci kmap_ops[i].status = GNTST_general_error; 74462306a36Sopenharmony_ci unmap[1].host_addr = kmap_ops[i].host_addr, 74562306a36Sopenharmony_ci unmap[1].handle = kmap_ops[i].handle; 74662306a36Sopenharmony_ci kmap_ops[i].handle = INVALID_GRANT_HANDLE; 74762306a36Sopenharmony_ci if (kmap_ops[i].flags & GNTMAP_device_map) 74862306a36Sopenharmony_ci unmap[1].dev_bus_addr = kmap_ops[i].dev_bus_addr; 74962306a36Sopenharmony_ci else 75062306a36Sopenharmony_ci unmap[1].dev_bus_addr = 0; 75162306a36Sopenharmony_ci } 75262306a36Sopenharmony_ci 75362306a36Sopenharmony_ci /* 75462306a36Sopenharmony_ci * Pre-populate both status fields, to be recognizable in 75562306a36Sopenharmony_ci * the log message below. 75662306a36Sopenharmony_ci */ 75762306a36Sopenharmony_ci unmap[0].status = 1; 75862306a36Sopenharmony_ci unmap[1].status = 1; 75962306a36Sopenharmony_ci 76062306a36Sopenharmony_ci rc = HYPERVISOR_grant_table_op(GNTTABOP_unmap_grant_ref, 76162306a36Sopenharmony_ci unmap, 1 + !!kmap_ops); 76262306a36Sopenharmony_ci if (rc || unmap[0].status != GNTST_okay || 76362306a36Sopenharmony_ci unmap[1].status != GNTST_okay) 76462306a36Sopenharmony_ci pr_err_once("gnttab unmap failed: rc=%d st0=%d st1=%d\n", 76562306a36Sopenharmony_ci rc, unmap[0].status, unmap[1].status); 76662306a36Sopenharmony_ci } 76762306a36Sopenharmony_ci 76862306a36Sopenharmony_ciout: 76962306a36Sopenharmony_ci return ret; 77062306a36Sopenharmony_ci} 77162306a36Sopenharmony_ci 77262306a36Sopenharmony_ciint clear_foreign_p2m_mapping(struct gnttab_unmap_grant_ref *unmap_ops, 77362306a36Sopenharmony_ci struct gnttab_unmap_grant_ref *kunmap_ops, 77462306a36Sopenharmony_ci struct page **pages, unsigned int count) 77562306a36Sopenharmony_ci{ 77662306a36Sopenharmony_ci int i, ret = 0; 77762306a36Sopenharmony_ci 77862306a36Sopenharmony_ci if (xen_feature(XENFEAT_auto_translated_physmap)) 77962306a36Sopenharmony_ci return 0; 78062306a36Sopenharmony_ci 78162306a36Sopenharmony_ci for (i = 0; i < count; i++) { 78262306a36Sopenharmony_ci unsigned long mfn = __pfn_to_mfn(page_to_pfn(pages[i])); 78362306a36Sopenharmony_ci unsigned long pfn = page_to_pfn(pages[i]); 78462306a36Sopenharmony_ci 78562306a36Sopenharmony_ci if (mfn != INVALID_P2M_ENTRY && (mfn & FOREIGN_FRAME_BIT)) 78662306a36Sopenharmony_ci set_phys_to_machine(pfn, INVALID_P2M_ENTRY); 78762306a36Sopenharmony_ci else 78862306a36Sopenharmony_ci ret = -EINVAL; 78962306a36Sopenharmony_ci } 79062306a36Sopenharmony_ci if (kunmap_ops) 79162306a36Sopenharmony_ci ret = HYPERVISOR_grant_table_op(GNTTABOP_unmap_grant_ref, 79262306a36Sopenharmony_ci kunmap_ops, count) ?: ret; 79362306a36Sopenharmony_ci 79462306a36Sopenharmony_ci return ret; 79562306a36Sopenharmony_ci} 79662306a36Sopenharmony_ci 79762306a36Sopenharmony_ci#ifdef CONFIG_XEN_DEBUG_FS 79862306a36Sopenharmony_ci#include <linux/debugfs.h> 79962306a36Sopenharmony_ci#include "debugfs.h" 80062306a36Sopenharmony_cistatic int p2m_dump_show(struct seq_file *m, void *v) 80162306a36Sopenharmony_ci{ 80262306a36Sopenharmony_ci static const char * const type_name[] = { 80362306a36Sopenharmony_ci [P2M_TYPE_IDENTITY] = "identity", 80462306a36Sopenharmony_ci [P2M_TYPE_MISSING] = "missing", 80562306a36Sopenharmony_ci [P2M_TYPE_PFN] = "pfn", 80662306a36Sopenharmony_ci [P2M_TYPE_UNKNOWN] = "abnormal"}; 80762306a36Sopenharmony_ci unsigned long pfn, first_pfn; 80862306a36Sopenharmony_ci int type, prev_type; 80962306a36Sopenharmony_ci 81062306a36Sopenharmony_ci prev_type = xen_p2m_elem_type(0); 81162306a36Sopenharmony_ci first_pfn = 0; 81262306a36Sopenharmony_ci 81362306a36Sopenharmony_ci for (pfn = 0; pfn < xen_p2m_size; pfn++) { 81462306a36Sopenharmony_ci type = xen_p2m_elem_type(pfn); 81562306a36Sopenharmony_ci if (type != prev_type) { 81662306a36Sopenharmony_ci seq_printf(m, " [0x%lx->0x%lx] %s\n", first_pfn, pfn, 81762306a36Sopenharmony_ci type_name[prev_type]); 81862306a36Sopenharmony_ci prev_type = type; 81962306a36Sopenharmony_ci first_pfn = pfn; 82062306a36Sopenharmony_ci } 82162306a36Sopenharmony_ci } 82262306a36Sopenharmony_ci seq_printf(m, " [0x%lx->0x%lx] %s\n", first_pfn, pfn, 82362306a36Sopenharmony_ci type_name[prev_type]); 82462306a36Sopenharmony_ci return 0; 82562306a36Sopenharmony_ci} 82662306a36Sopenharmony_ci 82762306a36Sopenharmony_ciDEFINE_SHOW_ATTRIBUTE(p2m_dump); 82862306a36Sopenharmony_ci 82962306a36Sopenharmony_cistatic struct dentry *d_mmu_debug; 83062306a36Sopenharmony_ci 83162306a36Sopenharmony_cistatic int __init xen_p2m_debugfs(void) 83262306a36Sopenharmony_ci{ 83362306a36Sopenharmony_ci struct dentry *d_xen = xen_init_debugfs(); 83462306a36Sopenharmony_ci 83562306a36Sopenharmony_ci d_mmu_debug = debugfs_create_dir("mmu", d_xen); 83662306a36Sopenharmony_ci 83762306a36Sopenharmony_ci debugfs_create_file("p2m", 0600, d_mmu_debug, NULL, &p2m_dump_fops); 83862306a36Sopenharmony_ci return 0; 83962306a36Sopenharmony_ci} 84062306a36Sopenharmony_cifs_initcall(xen_p2m_debugfs); 84162306a36Sopenharmony_ci#endif /* CONFIG_XEN_DEBUG_FS */ 842