[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v14 02/17] libxc: Move temporary grant table mapping to end of memory



Ccing tools maintainers.

On 04/11/13 13:14, George Dunlap wrote:
> From: Roger Pau Monnà <roger.pau@xxxxxxxxxx>
> 
> In order to set up the grant table for HVM guests, libxc needs to map
> the grant table temporarily.  At the moment, it does this by adding the
> grant page to the HVM guest's p2m table in the MMIO hole (at gfn 0xFFFFE),
> then mapping that gfn, setting up the table, then unmapping the gfn and
> removing it from the p2m table.
> 
> This breaks with PVH guests with 4G or more of ram, because there is
> no MMIO hole; so it ends up clobbering a valid RAM p2m entry, then
> leaving a "hole" when it removes the grant map from the p2m table.
> Since the guest thinks this is normal ram, when it maps it and tries
> to access the page, it crashes.
> 
> This patch maps the page at max_gfn+1 instead.
> 
> Signed-off-by: Roger Pau Monnà <roger.pau@xxxxxxxxxx>
> ---
>  tools/libxc/xc_dom.h      |    3 ---
>  tools/libxc/xc_dom_boot.c |   14 ++++++++++++--
>  2 files changed, 12 insertions(+), 5 deletions(-)
> 
> diff --git a/tools/libxc/xc_dom.h b/tools/libxc/xc_dom.h
> index 86e23ee..935b49e 100644
> --- a/tools/libxc/xc_dom.h
> +++ b/tools/libxc/xc_dom.h
> @@ -18,9 +18,6 @@
>  
>  #define INVALID_P2M_ENTRY   ((xen_pfn_t)-1)
>  
> -/* Scrach PFN for temporary mappings in HVM */
> -#define SCRATCH_PFN_GNTTAB 0xFFFFE
> -
>  /* --- typedefs and structs ---------------------------------------- */
>  
>  typedef uint64_t xen_vaddr_t;
> diff --git a/tools/libxc/xc_dom_boot.c b/tools/libxc/xc_dom_boot.c
> index 71e1897..fdfeaf8 100644
> --- a/tools/libxc/xc_dom_boot.c
> +++ b/tools/libxc/xc_dom_boot.c
> @@ -361,17 +361,27 @@ int xc_dom_gnttab_hvm_seed(xc_interface *xch, domid_t 
> domid,
>                             domid_t xenstore_domid)
>  {
>      int rc;
> +    xen_pfn_t max_gfn;
>      struct xen_add_to_physmap xatp = {
>          .domid = domid,
>          .space = XENMAPSPACE_grant_table,
>          .idx   = 0,
> -        .gpfn  = SCRATCH_PFN_GNTTAB
>      };
>      struct xen_remove_from_physmap xrfp = {
>          .domid = domid,
> -        .gpfn  = SCRATCH_PFN_GNTTAB
>      };
>  
> +    max_gfn = xc_domain_maximum_gpfn(xch, domid);
> +    if ( max_gfn <= 0 ) {
> +        xc_dom_panic(xch, XC_INTERNAL_ERROR,
> +                     "%s: failed to get max gfn "
> +                     "[errno=%d]\n",
> +                     __FUNCTION__, errno);
> +        return -1;
> +    }
> +    xatp.gpfn = max_gfn + 1;
> +    xrfp.gpfn = max_gfn + 1;
> +
>      rc = do_memory_op(xch, XENMEM_add_to_physmap, &xatp, sizeof(xatp));
>      if ( rc != 0 )
>      {
> 


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.