[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2] xen: grant-table: Simplify get_paged_frame
On Mon, Sep 18, 2017 at 05:27:52PM +0100, Julien Grall wrote: > The implementation of get_paged_frame is currently different whether the > architecture support sharing memory or paging memory. Both > version are extremely similar so it is possible to consolidate in a > single implementation. > > The main difference is the x86 version will allow grant on foreign page > when using HVM/PVH whilst Arm does not. At the moment, on x86 foreign pages > are only allowed for PVH Dom0. It seems that foreign pages should never > be granted so deny them > > The check for shared/paged memory are now gated with the respective ifdef. > Potentially, dummy p2m_is_shared/p2m_is_paging could be implemented for > Arm. > > Signed-off-by: Julien Grall <julien.grall@xxxxxxx> > > --- > > Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > Cc: George Dunlap <George.Dunlap@xxxxxxxxxxxxx> > Cc: Ian Jackson <ian.jackson@xxxxxxxxxxxxx> > Cc: Jan Beulich <jbeulich@xxxxxxxx> > Cc: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx> > Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx> > Cc: Tim Deegan <tim@xxxxxxx> > Cc: Wei Liu <wei.liu2@xxxxxxxxxx> > > Changes in v2: > - Deny grant on foreign page (aligned with the ARM code) > - Use #ifdef rather than #if defined > - Update commit message > - Fix typo in the title > > get_page_from_gfn will be able to get reference on foreign page and as > per my understanding will allow to grant page on foreign memory. > > This was not allowed with a simple get_page(...) on the ARM > implementation (no sharing nor paging supprot) but is allowed on the x86 > implementation due to get_page_from_gfn. > > On x86, foreign pages are currently only allowed for PVH dom0, so I > think it is not a big deal for now. > > On Arm, foreign pages can be present on any domain. So this patch would > permit grant on foreing pages. > > This patch will deny granting foreign pages. Jan Beulich is happy with > it. Any other opinions? > --- > xen/common/grant_table.c | 19 ++++++++----------- > 1 file changed, 8 insertions(+), 11 deletions(-) > > diff --git a/xen/common/grant_table.c b/xen/common/grant_table.c > index c3895e6201..a6a168df6e 100644 > --- a/xen/common/grant_table.c > +++ b/xen/common/grant_table.c > @@ -259,7 +259,6 @@ static int get_paged_frame(unsigned long gfn, unsigned > long *frame, > struct domain *rd) > { > int rc = GNTST_okay; > -#if defined(P2M_PAGED_TYPES) || defined(P2M_SHARED_TYPES) > p2m_type_t p2mt; > > *page = get_page_from_gfn(rd, gfn, &p2mt, While you're at it, mind dropping the pointless brackets around readonly? > @@ -267,26 +266,24 @@ static int get_paged_frame(unsigned long gfn, unsigned > long *frame, > if ( !(*page) ) And here as well. > { > *frame = mfn_x(INVALID_MFN); > +#ifdef P2M_SHARED_TYPES > if ( p2m_is_shared(p2mt) ) > return GNTST_eagain; > +#endif > +#ifdef P2M_PAGES_TYPES > if ( p2m_is_paging(p2mt) ) > { > p2m_mem_paging_populate(rd, gfn); > return GNTST_eagain; > } > +#endif > return GNTST_bad_page; > } > + > + if ( p2m_is_foreign(p2mt) ) > + return GNTST_bad_page; You only get here when you have taken a ref on the page. You should drop the ref before returning. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |