[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 24/24] xen/arm: create_xen_entries: Use typesafe MFN
On Tue, 13 Jun 2017, Julien Grall wrote: > Add a bit more safety when using create_xen_entries. > > Also when destroying/modifying mapping, the MFN is currently not used. > Rather than passing _mfn(0) use INVALID_MFN to stay consistent with the > other usage. > > Signed-off-by: Julien Grall <julien.grall@xxxxxxx> Reviewed-by: Stefano Stabellini <sstabellini@xxxxxxxxxx> > --- > xen/arch/arm/mm.c | 19 ++++++++++--------- > 1 file changed, 10 insertions(+), 9 deletions(-) > > diff --git a/xen/arch/arm/mm.c b/xen/arch/arm/mm.c > index 2ff1688f3f..8cb0559972 100644 > --- a/xen/arch/arm/mm.c > +++ b/xen/arch/arm/mm.c > @@ -980,7 +980,7 @@ enum xenmap_operation { > > static int create_xen_entries(enum xenmap_operation op, > unsigned long virt, > - unsigned long mfn, > + mfn_t mfn, > unsigned long nr_mfns, > unsigned int ai) > { > @@ -989,7 +989,7 @@ static int create_xen_entries(enum xenmap_operation op, > lpae_t pte; > lpae_t *third = NULL; > > - for(; addr < addr_end; addr += PAGE_SIZE, mfn++) > + for(; addr < addr_end; addr += PAGE_SIZE, mfn = mfn_add(mfn, 1)) > { > if ( !xen_second[second_linear_offset(addr)].pt.valid || > !xen_second[second_linear_offset(addr)].pt.table ) > @@ -1010,13 +1010,13 @@ static int create_xen_entries(enum xenmap_operation > op, > case RESERVE: > if ( third[third_table_offset(addr)].pt.valid ) > { > - printk("create_xen_entries: trying to replace an > existing mapping addr=%lx mfn=%lx\n", > - addr, mfn); > + printk("create_xen_entries: trying to replace an > existing mapping addr=%lx mfn=%"PRI_mfn"\n", > + addr, mfn_x(mfn)); > return -EINVAL; > } > if ( op == RESERVE ) > break; > - pte = mfn_to_xen_entry(_mfn(mfn), ai); > + pte = mfn_to_xen_entry(mfn, ai); > pte.pt.table = 1; > write_pte(&third[third_table_offset(addr)], pte); > break; > @@ -1061,24 +1061,25 @@ int map_pages_to_xen(unsigned long virt, > unsigned long nr_mfns, > unsigned int flags) > { > - return create_xen_entries(INSERT, virt, mfn, nr_mfns, flags); > + return create_xen_entries(INSERT, virt, _mfn(mfn), nr_mfns, flags); > } > > int populate_pt_range(unsigned long virt, unsigned long mfn, > unsigned long nr_mfns) > { > - return create_xen_entries(RESERVE, virt, mfn, nr_mfns, 0); > + return create_xen_entries(RESERVE, virt, _mfn(mfn), nr_mfns, 0); > } > > int destroy_xen_mappings(unsigned long v, unsigned long e) > { > - return create_xen_entries(REMOVE, v, 0, (e - v) >> PAGE_SHIFT, 0); > + return create_xen_entries(REMOVE, v, INVALID_MFN, (e - v) >> PAGE_SHIFT, > 0); > } > > int modify_xen_mappings(unsigned long s, unsigned long e, unsigned int flags) > { > ASSERT((flags & (PTE_NX | PTE_RO)) == flags); > - return create_xen_entries(MODIFY, s, 0, (e - s) >> PAGE_SHIFT, flags); > + return create_xen_entries(MODIFY, s, INVALID_MFN, (e - s) >> PAGE_SHIFT, > + flags); > } > > enum mg { mg_clear, mg_ro, mg_rw, mg_rx }; > -- > 2.11.0 > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |