[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [hybrid]: code review for function mapping pfn to foreign mfn
Hi, I wrote up some code to map/unmap pfn to mfn for hybrid. I wonder if anyone can please look at it and give any comments. I tested it and seems to work ok. Basically, the library, xl running in hybrid dom0, needs to map domU pages during guest creation. I tried using existing add to physmap, mmu_update, but nothing was feasible. So wrote this. Its called from privcmd_ioctl_mmap_batch(). thanks, Mukesh /* add frames from foreign domain to current domain physmap. Similar to * XENMEM_add_to_physmap but the mfn frame is foreign, is being mapped into * current privileged domain, and is not removed from foreign domain. * Usage: libxl when creating guest in hybrid dom0 doing privcmd_ioctl_mmap * Return: 0 success */ static long _add_foreign_to_pmap_batch(XEN_GUEST_HANDLE(void) arg) { struct xen_add_to_foreign_pmap_batch pmapb; unsigned long rc=0, i, prev_mfn, mfn = 0; struct domain *fdom, *currd = current->domain; p2m_type_t p2mt; if ( copy_from_guest(&pmapb, arg, 1) ) return -EFAULT; fdom = get_pg_owner(pmapb.foreign_domid); if ( fdom== NULL ) { put_pg_owner(fdom); return -EPERM; } for (i=0; (rc == 0) && (i < pmapb.count); i++) { unsigned long fgmfn = pmapb.gmfn+i, gpfn = pmapb.gpfn+i; mfn = mfn_x(gfn_to_mfn_query(p2m_get_hostp2m(fdom), fgmfn, &p2mt)); if ( !p2m_is_valid(p2mt) ) rc = -EINVAL; if ( !rc && !get_page_from_pagenr(mfn, fdom) ) rc = -EPERM; if (!rc) put_page(mfn_to_page(mfn)); else break; /* Remove previously mapped page if it was present. */ prev_mfn = gmfn_to_mfn(currd, gpfn); if ( mfn_valid(prev_mfn) ) { if ( is_xen_heap_mfn(prev_mfn) ) /* Xen heap frames are simply unhooked from this phys slot */ guest_physmap_remove_page(currd, gpfn, prev_mfn, 0); else /* Normal domain memory is freed, to avoid leaking memory. */ guest_remove_page(currd, gpfn); } /* Map at new location. */ /* Can't use guest_physmap_add_page() because it will update the m2p * table so mfn ---> gpfn in dom0 and not gpfn of domU. */ /* rc = guest_physmap_add_page(currd, gpfn, mfn, 0); */ rc = set_mmio_p2m_entry(p2m_get_hostp2m(currd), gpfn, mfn); if (rc==0) { printk("guest_physmap_add_page failed.gpfn:%lx mfn:%lx fgmfn:%lx\n", gpfn, mfn, fgmfn); rc == -EINVAL; } else rc = 0; } pmapb.count = i; copy_to_guest(arg, &pmapb, 1); put_pg_owner(fdom); return rc; } static long noinline _rem_foreign_pmap_batch(XEN_GUEST_HANDLE(void) arg) { xen_pfn_t gmfn; struct xen_rem_foreign_pmap_batch pmapb; p2m_type_t p2mt; int i, rc=0; struct domain *currd = current->domain; if ( copy_from_guest(&pmapb, arg, 1) ) return -EFAULT; for ( gmfn=pmapb.s_gpfn, i=0; i < pmapb.count; i++, gmfn++ ) { mfn_t mfn = mfn_x(gfn_to_mfn(p2m_get_hostp2m(currd), gmfn, &p2mt)); if ( unlikely(!mfn_valid(mfn)) ) { gdprintk(XENLOG_INFO, "%s: Domain:%u gmfn:%lx invalid\n", __FUNCTION__, currd->domain_id, gmfn); rc = -EINVAL; break; } /* guest_physmap_remove_page(currd, gmfn, mfn, 0); */ clear_mmio_p2m_entry(p2m_get_hostp2m(currd), gmfn); } pmapb.count = i; copy_to_guest(arg, &pmapb, 1); return rc; } _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |