|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2] nested SVM: adjust guest handling of structure mappings
>>> On 11.11.13 at 12:25, Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote:
> On 11/11/13 11:07, Jan Beulich wrote:
>> @@ -360,10 +360,12 @@ static int nsvm_vmrun_permissionmap(stru
>> svm->ns_iomap_pa = ns_vmcb->_iopm_base_pa;
>>
>> ns_viomap = hvm_map_guest_frame_ro(svm->ns_iomap_pa >> PAGE_SHIFT, 0);
>> - ASSERT(ns_viomap != NULL);
>> - ioport_80 = test_bit(0x80, ns_viomap);
>> - ioport_ed = test_bit(0xed, ns_viomap);
>> - hvm_unmap_guest_frame(ns_viomap, 0);
>> + if ( ns_viomap )
>> + {
>> + ioport_80 = test_bit(0x80, ns_viomap);
>> + ioport_ed = test_bit(0xed, ns_viomap);
>> + hvm_unmap_guest_frame(ns_viomap, 0);
>> + }
>
> Should we not bail on an error here, similar to the failure of
> hvm_copy_from_guest just out of context above?
It seemed less intrusive (to the guest) to simply disallow (direct)
access to these ports in that case.
>> - io_bitmap = hvm_map_guest_frame_ro(gfn, 0);
>> - if (io_bitmap == NULL) {
>> - gdprintk(XENLOG_ERR,
>> - "IOIO intercept: mapping of permission map failed\n");
>> - return NESTEDHVM_VMEXIT_ERROR;
>> + for ( io_bitmap = hvm_map_guest_frame_ro(gfn, 0); ; )
>
> This needs further checking for NULL.
Indeed, thanks for spotting.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |