|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v4 2/7] arch, arm: add consistency checks to REMOVE p2m changes
On Tue, 25 Mar 2014, Arianna Avanzini wrote:
> Currently, the REMOVE case of the switch in apply_p2m_changes()
> does not perform any consistency check on the mapping to be removed.
> More in detail, the code does not check if the guest address to be
> unmapped is actually mapped to the machine address given as a
> parameter.
> This commit attempts to add the above-described consistency check
> to the REMOVE path of apply_p2m_changes(). This is instrumental to
> one of the following commits which implements the possibility to
> trigger the removal of p2m ranges via the memory_mapping DOMCTL
> for ARM.
>
> Signed-off-by: Arianna Avanzini <avanzini.arianna@xxxxxxxxx>
> Cc: Dario Faggioli <dario.faggioli@xxxxxxxxxx>
> Cc: Paolo Valente <paolo.valente@xxxxxxxxxx>
> Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
> Cc: Julien Grall <julien.grall@xxxxxxxxxx>
> Cc: Ian Campbell <Ian.Campbell@xxxxxxxxxxxxx>
> Cc: Jan Beulich <JBeulich@xxxxxxxx>
> Cc: Keir Fraser <keir@xxxxxxx>
> Cc: Tim Deegan <tim@xxxxxxx>
> Cc: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
> Cc: Eric Trudeau <etrudeau@xxxxxxxxxxxx>
> Cc: Viktor Kleinik <viktor.kleinik@xxxxxxxxxxxxxxx>
>
Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
>
> v4:
> - Remove useless and slow lookup and use already-available
> data from pte instead.
> - Correctly increment the local variable used to keep the
> machine address whose mapping is currently being removed.
> - Return with an error upon finding a mismatch between the
> actual machine address mapped to the guest address and
> the machine address passed as parameter, instead of just
> skipping the page.
>
> ---
> xen/arch/arm/p2m.c | 24 ++++++++++++++++++++----
> 1 file changed, 20 insertions(+), 4 deletions(-)
>
> diff --git a/xen/arch/arm/p2m.c b/xen/arch/arm/p2m.c
> index d00c882..bb0db16 100644
> --- a/xen/arch/arm/p2m.c
> +++ b/xen/arch/arm/p2m.c
> @@ -243,12 +243,13 @@ static int apply_p2m_changes(struct domain *d,
> int rc;
> struct p2m_domain *p2m = &d->arch.p2m;
> lpae_t *first = NULL, *second = NULL, *third = NULL;
> - paddr_t addr;
> + paddr_t addr, _maddr;
> unsigned long cur_first_page = ~0,
> cur_first_offset = ~0,
> cur_second_offset = ~0;
> unsigned long count = 0;
> unsigned int flush = 0;
> + unsigned long mfn;
> bool_t populate = (op == INSERT || op == ALLOCATE);
> lpae_t pte;
>
> @@ -258,6 +259,7 @@ static int apply_p2m_changes(struct domain *d,
> p2m_load_VTTBR(d);
>
> addr = start_gpaddr;
> + _maddr = maddr;
> while ( addr < end_gpaddr )
> {
> if ( cur_first_page != p2m_first_level_index(addr) )
> @@ -327,6 +329,7 @@ static int apply_p2m_changes(struct domain *d,
>
> flush |= pte.p2m.valid;
>
> + mfn = pte.p2m.base;
> /* TODO: Handle other p2m type
> *
> * It's safe to do the put_page here because page_alloc will
> @@ -335,8 +338,6 @@ static int apply_p2m_changes(struct domain *d,
> */
> if ( pte.p2m.valid && p2m_is_foreign(pte.p2m.type) )
> {
> - unsigned long mfn = pte.p2m.base;
> -
> ASSERT(mfn_valid(mfn));
> put_page(mfn_to_page(mfn));
> }
> @@ -367,9 +368,23 @@ static int apply_p2m_changes(struct domain *d,
> maddr += PAGE_SIZE;
> }
> break;
> - case RELINQUISH:
> case REMOVE:
> {
> + ASSERT(pte.p2m.valid);
> + /*
> + * Ensure that the guest address given as argument to
> + * this function is actually mapped to the specified
> + * machine address. _maddr here is the machine address
> + * given to the function, while mfn is the machine
> + * frame number actually mapped to the guest address:
> + * check if the two correspond.
> + */
> + if ( _maddr != pfn_to_paddr(mfn) )
> + return -EINVAL;
> + }
> + /* fall through */
> + case RELINQUISH:
> + {
> if ( !pte.p2m.valid )
> {
> count++;
> @@ -408,6 +423,7 @@ static int apply_p2m_changes(struct domain *d,
>
> /* Got the next page */
> addr += PAGE_SIZE;
> + _maddr += PAGE_SIZE;
> }
>
> if ( flush )
> --
> 1.9.0
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |