[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-devel] [PATCH 4/4] fix XENMEM_add_to_physmap_range preemption handling
Just like for all other hypercalls we shouldn't be modifying the input structure - all of the fields are, even if not explicitly documented, just inputs (the one OUT one really refers to the memory pointed to by that handle rather than the handle itself). Signed-off-by: Jan Beulich <jbeulich@xxxxxxxx> --- a/xen/common/memory.c +++ b/xen/common/memory.c @@ -599,11 +599,21 @@ static int xenmem_add_to_physmap(struct } static int xenmem_add_to_physmap_range(struct domain *d, - struct xen_add_to_physmap_range *xatpr) + struct xen_add_to_physmap_range *xatpr, + unsigned int start) { + unsigned int done = 0; int rc; - while ( xatpr->size > 0 ) + if ( xatpr->size < start ) + return -EILSEQ; + + guest_handle_add_offset(xatpr->idxs, start); + guest_handle_add_offset(xatpr->gpfns, start); + guest_handle_add_offset(xatpr->errs, start); + xatpr->size -= start; + + while ( xatpr->size > done ) { xen_ulong_t idx; xen_pfn_t gpfn; @@ -633,12 +643,11 @@ static int xenmem_add_to_physmap_range(s guest_handle_add_offset(xatpr->idxs, 1); guest_handle_add_offset(xatpr->gpfns, 1); guest_handle_add_offset(xatpr->errs, 1); - xatpr->size--; /* Check for continuation if it's not the last interation. */ - if ( xatpr->size > 0 && hypercall_preempt_check() ) + if ( xatpr->size > ++done && hypercall_preempt_check() ) { - rc = -EAGAIN; + rc = start + done; goto out; } } @@ -819,6 +828,13 @@ long do_memory_op(unsigned long cmd, XEN struct xen_add_to_physmap_range xatpr; struct domain *d; + BUILD_BUG_ON((typeof(xatpr.size))-1 > + (UINT_MAX >> MEMOP_EXTENT_SHIFT)); + + /* Check for faked input. */ + if ( start_extent != (typeof(xatpr.size))start_extent ) + return -EDOM; + if ( copy_from_guest(&xatpr, arg, 1) || !guest_handle_okay(xatpr.idxs, xatpr.size) || !guest_handle_okay(xatpr.gpfns, xatpr.size) || @@ -836,18 +852,14 @@ long do_memory_op(unsigned long cmd, XEN return rc; } - rc = xenmem_add_to_physmap_range(d, &xatpr); + rc = xenmem_add_to_physmap_range(d, &xatpr, start_extent); rcu_unlock_domain(d); - if ( rc == -EAGAIN ) - { - if ( !__copy_to_guest(arg, &xatpr, 1) ) - rc = hypercall_create_continuation( - __HYPERVISOR_memory_op, "ih", op, arg); - else - rc = -EFAULT; - } + if ( rc > 0 ) + rc = hypercall_create_continuation( + __HYPERVISOR_memory_op, "lh", + op | (rc << MEMOP_EXTENT_SHIFT), arg); return rc; } Attachment:
xatpr-preemption.patch _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |