|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 2/18 V2]: PVH xen: add XENMEM_add_to_physmap_range
On Mon, Mar 18, 2013 at 11:38:35AM +0000, Jan Beulich wrote:
> >>> On 16.03.13 at 01:20, Mukesh Rathor <mukesh.rathor@xxxxxxxxxx> wrote:
> > In this patch we add a new function xenmem_add_to_physmap_range(), and
> > change xenmem_add_to_physmap_once parameters so it can be called from
> > xenmem_add_to_physmap_range. There is no PVH specific change here.
> >
> > Changes in V2:
> > - Do not break parameter so xenmem_add_to_physmap_once() but pass in
> > struct xen_add_to_physmap.
> >
> > Signed-off-by: Mukesh Rathor <mukesh.rathor@xxxxxxxxxx>
> > ---
> > xen/arch/x86/mm.c | 82
> > +++++++++++++++++++++++++++++++++++++++++++++++++++--
> > 1 files changed, 79 insertions(+), 3 deletions(-)
>
> This continued to lack compat mode support (i.e. modification to
> xen/arch/x86/x86_64/compat/mm.c:compat_arch_memory_op()).
Do we need it? Only 64-bit kernels can use PVH - and that was from the start the
idea.
>
> > --- a/xen/arch/x86/mm.c
> > +++ b/xen/arch/x86/mm.c
> > @@ -4268,7 +4268,8 @@ static int handle_iomem_range(unsigned long s,
> > unsigned long e, void *p)
> >
> > static int xenmem_add_to_physmap_once(
> > struct domain *d,
> > - const struct xen_add_to_physmap *xatp)
> > + const struct xen_add_to_physmap *xatp,
> > + domid_t foreign_domid)
>
> So you add this new parameter but don't use it?
>
> > {
> > struct page_info *page = NULL;
> > unsigned long gfn = 0; /* gcc ... */
> > @@ -4395,7 +4396,7 @@ static int xenmem_add_to_physmap(struct domain *d,
> > start_xatp = *xatp;
> > while ( xatp->size > 0 )
> > {
> > - rc = xenmem_add_to_physmap_once(d, xatp);
> > + rc = xenmem_add_to_physmap_once(d, xatp, -1);
>
> And if it indeed is being used, please use a proper DOMID_* value
> here.
>
> > if ( rc < 0 )
> > return rc;
> >
> > @@ -4421,7 +4422,52 @@ static int xenmem_add_to_physmap(struct domain *d,
> > return rc;
> > }
> >
> > - return xenmem_add_to_physmap_once(d, xatp);
> > + return xenmem_add_to_physmap_once(d, xatp, -1);
>
> And here.
>
> > +}
> > +
> > +static noinline int xenmem_add_to_physmap_range(struct domain *d,
> > + struct xen_add_to_physmap_range
> > *xatpr)
> > +{
> > + int rc;
> > +
> > + /* Process entries in reverse order to allow continuations */
> > + while ( xatpr->size > 0 )
> > + {
> > + xen_ulong_t idx;
> > + xen_pfn_t gpfn;
> > + struct xen_add_to_physmap xatp;
> > +
> > + rc = copy_from_guest_offset(&idx, xatpr->idxs, xatpr->size-1, 1);
> > + if ( rc < 0 )
> > + goto out;
> > +
> > + rc = copy_from_guest_offset(&gpfn, xatpr->gpfns, xatpr->size-1, 1);
> > + if ( rc < 0 )
> > + goto out;
> > +
> > + xatp.space = xatpr->space;
> > + xatp.idx = idx;
> > + xatp.gpfn = gpfn;
> > + rc = xenmem_add_to_physmap_once(d, &xatp, xatpr->foreign_domid);
> > +
> > + if (rc)
> > + goto out;
>
> That doesn't seem right, together with you apparently not using
> the "errs" array altogether.
>
> > +
> > + xatpr->size--;
> > +
> > + /* Check for continuation if it's not the last interation */
> > + if ( xatpr->size > 0 && hypercall_preempt_check() )
> > + {
> > + rc = -EAGAIN;
> > + goto out;
> > + }
> > + }
> > +
> > + rc = 0;
> > +
> > +out:
> > + return rc;
> > +
> > }
> >
> > long arch_memory_op(int op, XEN_GUEST_HANDLE_PARAM(void) arg)
> > @@ -4438,6 +4484,10 @@ long arch_memory_op(int op,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> > if ( copy_from_guest(&xatp, arg, 1) )
> > return -EFAULT;
> >
> > + /* This one is only supported for add_to_physmap_range */
> > + if ( xatp.space == XENMAPSPACE_gmfn_foreign )
> > + return -EINVAL;
> > +
> > d = rcu_lock_domain_by_any_id(xatp.domid);
> > if ( d == NULL )
> > return -ESRCH;
> > @@ -4465,6 +4515,32 @@ long arch_memory_op(int op,
> > XEN_GUEST_HANDLE_PARAM(void) arg)
> > return rc;
> > }
> >
> > + case XENMEM_add_to_physmap_range:
> > + {
> > + struct xen_add_to_physmap_range xatpr;
> > + struct domain *d;
> > +
> > + if ( copy_from_guest(&xatpr, arg, 1) )
> > + return -EFAULT;
> > +
> > + rc = rcu_lock_target_domain_by_id(xatpr.domid, &d);
> > + if ( rc != 0 )
> > + return rc;
> > +
> > + rc = xenmem_add_to_physmap_range(d, &xatpr);
> > +
> > + rcu_unlock_domain(d);
> > +
> > + if ( rc && copy_to_guest(arg, &xatpr, 1) )
>
> For one, shouldn't this be "!rc"?
>
> And then you update ->size, but that one is specified to be only
> and IN field. And considering that "errs" is the only OUT one, yet
> that isn't even formally correct (because the field itself is an IN,
> its what it points to where the output goes), I don't see why you
The 'err' is not formally correct? The memory.h says:
258 /* OUT */
259
260 /* Per index error code. */
261 XEN_GUEST_HANDLE(int) errs;
262 };
or are you referring to 'size' which I agree with - it is part of
'IN'.
> would need to copy back any part of the structure.
>
> Jan
>
> > + rc = -EFAULT;
> > +
> > + if ( rc == -EAGAIN )
> > + rc = hypercall_create_continuation(
> > + __HYPERVISOR_memory_op, "ih", op, arg);
> > +
> > + return rc;
> > + }
> > +
> > case XENMEM_set_memory_map:
> > {
> > struct xen_foreign_memory_map fmap;
> > --
> > 1.7.2.3
> >
> >
> > _______________________________________________
> > Xen-devel mailing list
> > Xen-devel@xxxxxxxxxxxxx
> > http://lists.xen.org/xen-devel
>
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |