|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [V4 PATCH 6/7] pvh dom0: Add and remove foreign pages
On 12/04/2013 01:05 AM, Mukesh Rathor wrote:
> On Wed, 04 Dec 2013 00:00:54 +0000
> Julien Grall <julien.grall@xxxxxxxxxx> wrote:
>
>>
>>
>> On 12/03/2013 02:30 AM, Mukesh Rathor wrote:
>>> In this patch, a new function, xenmem_add_foreign_to_pmap(), is
>>> added
>>
>> xenmem_add_foreign_to_p2m?
>>
>>> to map pages from foreign guest into current dom0 for domU creation.
>>> Such pages are typed p2m_map_foreign. Also, support is added here to
>>> XENMEM_remove_from_physmap to remove such pages. Note, in the remove
>>> path, we must release the refcount that was taken during the map
>>> phase.
>>
>> Your remove path is very interesting for the ARM port. For now we are
>> unable to unmap the foreign page because get_page() will always
>> return NULL (as dom0 is not the owner).
>>
>> I will give a try on ARM to see if it could resolve our problem.
>>
>
> Don't know much about ARM, is the remove path failing to compile on it?
> You can submit ARM modification patch after it's checked in?
So I have reworked common/memory.c part to be able to boot on ARM. What about
this fix:
diff --git a/xen/common/memory.c b/xen/common/memory.c
index df36d43..8ceb78b 100644
--- a/xen/common/memory.c
+++ b/xen/common/memory.c
@@ -713,9 +713,11 @@ long do_memory_op(unsigned long cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
case XENMEM_remove_from_physmap:
{
+ unsigned long mfn;
struct xen_remove_from_physmap xrfp;
struct page_info *page;
struct domain *d;
+ p2m_type_t p2mt;
if ( copy_from_guest(&xrfp, arg, 1) )
return -EFAULT;
@@ -731,11 +733,30 @@ long do_memory_op(unsigned long cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
return rc;
}
- page = get_page_from_gfn(d, xrfp.gpfn, NULL, P2M_ALLOC);
- if ( page )
+ /*
+ * if PVH, the gfn could be mapped to a mfn from foreign domain by the
+ * user space tool during domain creation. We need to check for that,
+ * free it up from the p2m, and release refcnt on it. In such a case,
+ * page would be NULL and the following call would not have refcnt'd
+ * the page. See also xenmem_add_foreign_to_pmap().
+ */
+ page = get_page_from_gfn(d, xrfp.gpfn, &p2mt, P2M_ALLOC);
+
+ if ( page || p2m_is_foreign(p2mt) )
{
- guest_physmap_remove_page(d, xrfp.gpfn, page_to_mfn(page), 0);
- put_page(page);
+ if ( page )
+ mfn = page_to_mfn(page);
+ else
+ {
+ mfn = gmfn_to_mfn(d, xrfp.gpfn);
+ page = mfn_to_page(mfn);
+
+ ASSERT(d != page_get_owner(page));
+ }
+
+ guest_physmap_remove_page(d, xrfp.gpfn, mfn, 0);
+ if (page)
+ put_page(page);
}
else
rc = -ENOENT;
This change is assuming that:
- p2m_is_foreign is defined on ARM (I have a patch for that)
- gmfn_to_mfn is defined on x86 (I don't have a patch, but the code should be
trivial?)
- ARM change in xenmem_add_to_physmap to take refcount on the foreign map
I also have a bunch of intrusive ARM patch to handle correctly foreign mapping.
Mukesh: This small fix should go to this patch:
diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c
index 177f2e5..fc5ab8f 100644
--- a/xen/arch/arm/mm.c
+++ b/xen/arch/arm/mm.c
@@ -1020,8 +1020,8 @@ static int xenmem_add_to_physmap_one(
break;
case XENMAPSPACE_gmfn_foreign:
{
- paddr_t maddr;
struct domain *od;
+ struct page_info *page;
od = rcu_lock_domain_by_any_id(foreign_domid);
if ( od == NULL )
return -ESRCH;
@@ -1033,15 +1033,17 @@ static int xenmem_add_to_physmap_one(
return rc;
}
- maddr = p2m_lookup(od, pfn_to_paddr(idx));
- if ( maddr == INVALID_PADDR )
+ /* Take refcount to the foreign domain page.
+ * Refcount will be release in XENMEM_remove_from_physmap */
+ page = get_page_from_gfn(od, idx, NULL, P2M_ALLOC);
+ if ( !page )
{
dump_p2m_lookup(od, pfn_to_paddr(idx));
rcu_unlock_domain(od);
return -EINVAL;
}
- mfn = maddr >> PAGE_SHIFT;
+ mfn = page_to_mfn(page);
t = p2m_map_foreign;
rcu_unlock_domain(od);
--
Julien Grall
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |