|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v16 06/11] x86/hvm/ioreq: add a new mappable resource type...
>>> On 15.12.17 at 11:41, <paul.durrant@xxxxxxxxxx> wrote:
> +static int hvm_alloc_ioreq_mfn(struct hvm_ioreq_server *s, bool buf)
> +{
> + struct hvm_ioreq_page *iorp = buf ? &s->bufioreq : &s->ioreq;
> +
> + if ( iorp->page )
> + {
> + /*
> + * If a guest frame has already been mapped (which may happen
> + * on demand if hvm_get_ioreq_server_info() is called), then
> + * allocating a page is not permitted.
> + */
> + if ( !gfn_eq(iorp->gfn, INVALID_GFN) )
> + return -EPERM;
> +
> + return 0;
> + }
> +
> + iorp->va = alloc_xenheap_page();
> + if ( !iorp->va )
> + return -ENOMEM;
> +
> + clear_page(iorp->va);
> +
> + iorp->page = virt_to_page(iorp->va);
> + share_xen_page_with_guest(iorp->page, s->domain, XENSHARE_writable);
> + return 0;
> +}
Why the much more limited (on huge systems) Xen heap all of the
sudden?
> +static void hvm_free_ioreq_mfn(struct hvm_ioreq_server *s, bool buf)
> +{
> + struct hvm_ioreq_page *iorp = buf ? &s->bufioreq : &s->ioreq;
> +
> + if ( !iorp->page )
> + return;
> +
> + iorp->page = NULL;
> +
> + free_xenheap_page(iorp->va);
> + iorp->va = NULL;
> +}
I've looked over the code paths coming here, and I can't convince
myself that any mapping that the server has established would be
gone by the time the page is being freed. I'm likely (hopefully)
overlooking some aspect here.
> +int arch_acquire_resource(struct domain *d, unsigned int type,
> + unsigned int id, unsigned long frame,
> + unsigned int nr_frames, xen_pfn_t mfn_list[])
> +{
> + int rc;
> +
> + switch ( type )
> + {
> + case XENMEM_resource_ioreq_server:
> + {
> + ioservid_t ioservid = id;
> + unsigned int i;
> +
> + rc = -EINVAL;
> + if ( id != (unsigned int)ioservid )
> + break;
> +
> + rc = 0;
> + for ( i = 0; i < nr_frames; i++ )
> + {
> + mfn_t mfn;
> +
> + rc = hvm_get_ioreq_server_frame(d, id, frame + i, &mfn);
Neither up from here nor in the called function it is being checked
that d is actually a HVM domain.
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |