From patchwork Mon Apr 20 15:06:21 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tamas K Lengyel X-Patchwork-Id: 47363 Return-Path: X-Original-To: linaro@patches.linaro.org Delivered-To: linaro@patches.linaro.org Received: from mail-la0-f71.google.com (mail-la0-f71.google.com [209.85.215.71]) by ip-10-151-82-157.ec2.internal (Postfix) with ESMTPS id 711D720553 for ; Mon, 20 Apr 2015 15:08:45 +0000 (UTC) Received: by labgx2 with SMTP id gx2sf40006966lab.1 for ; Mon, 20 Apr 2015 08:08:44 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:delivered-to:from:to:date:message-id:in-reply-to :references:cc:subject:precedence:list-id:list-unsubscribe:list-post :list-help:list-subscribe:mime-version:content-type :content-transfer-encoding:sender:errors-to:x-original-sender :x-original-authentication-results:mailing-list:list-archive; bh=VG6njnXxSCThHfsr4rnonEBsKbc3xZ6KmU6Isbb88EE=; b=hpxiHSseTXEqVCiUoM+6O7atcKBbbFibKsxzz/yMiWdyPXcg6C6C6atKSftG/5PQwJ +Mt2Ire6dzZTcgHGRHulJsGxkvbwydUvlNv6NHKmvMt0uCjM/iWN9uBeFUF8Cp3AqkBu VzPg/2VvSwhJLTREPCvHVbPqax6iXCAVZXuwfUCEwk3xSl1sr+2XC4EQwGm4ULCds93o l09c1aiWDyg7EcrVGx+xXLsMaYIoEHbLS6mnqJWIViE6/DXSqhQGzUh6pumepROyXQJZ 7axiSLh1bx4WoHtUVTVFGXtkwP1lLOU9XebjFjoq9fG0Zc2H0krXaynVn4fHuEN/ApKW Vmew== X-Gm-Message-State: ALoCoQnNYIfzApWPkRl6E08kjdox3CF7vObacTt+/uQtzu72yeUq8OGYACdD0WcqAVxVR/qWSiTN X-Received: by 10.112.53.102 with SMTP id a6mr7453945lbp.16.1429542524307; Mon, 20 Apr 2015 08:08:44 -0700 (PDT) X-BeenThere: patchwork-forward@linaro.org Received: by 10.152.21.130 with SMTP id v2ls685997lae.98.gmail; Mon, 20 Apr 2015 08:08:44 -0700 (PDT) X-Received: by 10.112.126.162 with SMTP id mz2mr15734656lbb.97.1429542524057; Mon, 20 Apr 2015 08:08:44 -0700 (PDT) Received: from mail-lb0-f175.google.com (mail-lb0-f175.google.com. [209.85.217.175]) by mx.google.com with ESMTPS id dy9si15204049lac.58.2015.04.20.08.08.44 for (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 20 Apr 2015 08:08:44 -0700 (PDT) Received-SPF: pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.217.175 as permitted sender) client-ip=209.85.217.175; Received: by lbbzk7 with SMTP id zk7so133058052lbb.0 for ; Mon, 20 Apr 2015 08:08:44 -0700 (PDT) X-Received: by 10.112.160.227 with SMTP id xn3mr15816340lbb.112.1429542523964; Mon, 20 Apr 2015 08:08:43 -0700 (PDT) X-Forwarded-To: patchwork-forward@linaro.org X-Forwarded-For: patch@linaro.org patchwork-forward@linaro.org Delivered-To: patch@linaro.org Received: by 10.112.67.65 with SMTP id l1csp76436lbt; Mon, 20 Apr 2015 08:08:43 -0700 (PDT) X-Received: by 10.52.3.166 with SMTP id d6mr17249652vdd.69.1429542522480; Mon, 20 Apr 2015 08:08:42 -0700 (PDT) Received: from lists.xen.org (lists.xen.org. [50.57.142.19]) by mx.google.com with ESMTPS id yq12si10188505vdb.80.2015.04.20.08.08.41 (version=TLSv1 cipher=RC4-SHA bits=128/128); Mon, 20 Apr 2015 08:08:42 -0700 (PDT) Received-SPF: none (google.com: xen-devel-bounces@lists.xen.org does not designate permitted sender hosts) client-ip=50.57.142.19; Received: from localhost ([127.0.0.1] helo=lists.xen.org) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YkDI7-0005Rb-Lp; Mon, 20 Apr 2015 15:07:19 +0000 Received: from mail6.bemta5.messagelabs.com ([195.245.231.135]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1YkDI5-0005QN-Ba for xen-devel@lists.xen.org; Mon, 20 Apr 2015 15:07:17 +0000 Received: from [85.158.139.211] by server-17.bemta-5.messagelabs.com id 27/E8-09809-42615355; Mon, 20 Apr 2015 15:07:16 +0000 X-Env-Sender: tklengyel@sec.in.tum.de X-Msg-Ref: server-9.tower-206.messagelabs.com!1429542435!17219852!1 X-Originating-IP: [131.159.0.8] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 6.13.6; banners=-,-,- X-VirusChecked: Checked Received: (qmail 10698 invoked from network); 20 Apr 2015 15:07:15 -0000 Received: from mail-out1.informatik.tu-muenchen.de (HELO mail-out1.informatik.tu-muenchen.de) (131.159.0.8) by server-9.tower-206.messagelabs.com with DHE-RSA-AES256-SHA encrypted SMTP; 20 Apr 2015 15:07:15 -0000 Received: from files.sec.in.tum.de (files.sec.in.tum.de [131.159.50.1]) by services.sec.in.tum.de (Postfix) with ESMTP id B9A2A1013B8C9; Mon, 20 Apr 2015 17:07:14 +0200 (CEST) Received: from ourea.sec.in.tum.de (ourea.sec.in.tum.de [131.159.50.52]) by files.sec.in.tum.de (Postfix) with ESMTP id B7C66538821; Mon, 20 Apr 2015 17:07:14 +0200 (CEST) From: Tamas K Lengyel To: xen-devel@lists.xen.org Date: Mon, 20 Apr 2015 17:06:21 +0200 Message-Id: <1429542384-23905-7-git-send-email-tklengyel@sec.in.tum.de> X-Mailer: git-send-email 2.1.4 In-Reply-To: <1429542384-23905-1-git-send-email-tklengyel@sec.in.tum.de> References: <1429542384-23905-1-git-send-email-tklengyel@sec.in.tum.de> Cc: wei.liu2@citrix.com, ian.campbell@citrix.com, stefano.stabellini@eu.citrix.com, ian.jackson@eu.citrix.com, julien.grall@linaro.org, tim@xen.org, stefano.stabellini@citrix.com, keir@xen.org Subject: [Xen-devel] [PATCH V15 6/9] xen/arm: Implement domain_get_maximum_gpfn X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.13 Precedence: list List-Id: List-Unsubscribe: , List-Post: , List-Help: , List-Subscribe: , MIME-Version: 1.0 Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org X-Removed-Original-Auth: Dkim didn't pass. X-Original-Sender: patch@linaro.org X-Original-Authentication-Results: mx.google.com; spf=pass (google.com: domain of patch+caf_=patchwork-forward=linaro.org@linaro.org designates 209.85.217.175 as permitted sender) smtp.mail=patch+caf_=patchwork-forward=linaro.org@linaro.org Mailing-list: list patchwork-forward@linaro.org; contact patchwork-forward+owners@linaro.org X-Google-Group-Id: 836684582541 List-Archive: From: Julien Grall The function domain_get_maximum_gpfn is returning the maximum gpfn ever mapped in the guest. We can use d->arch.p2m.max_mapped_gfn for this purpose. We use this in xenaccess as to avoid the user attempting to set page permissions on pages which don't exist for the domain, as a non-arch specific sanity check. Signed-off-by: Julien Grall --- xen/arch/arm/mm.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c index 11a0be8..a91ea77 100644 --- a/xen/arch/arm/mm.c +++ b/xen/arch/arm/mm.c @@ -996,7 +996,7 @@ int page_is_ram_type(unsigned long mfn, unsigned long mem_type) unsigned long domain_get_maximum_gpfn(struct domain *d) { - return -ENOSYS; + return d->arch.p2m.max_mapped_gfn; } void share_xen_page_with_guest(struct page_info *page,