[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH 2/2] arm/xen: Add misuse warning to virt_to_gfn
On Tue, 25 Aug 2020, Jan Beulich wrote: > On 25.08.2020 11:31, Simon Leiner wrote: > > --- a/include/xen/arm/page.h > > +++ b/include/xen/arm/page.h > > @@ -76,7 +76,11 @@ static inline unsigned long bfn_to_pfn(unsigned long bfn) > > #define bfn_to_local_pfn(bfn) bfn_to_pfn(bfn) > > > > /* VIRT <-> GUEST conversion */ > > -#define virt_to_gfn(v) (pfn_to_gfn(virt_to_phys(v) >> > > XEN_PAGE_SHIFT)) > > +#define virt_to_gfn(v) > > \ > > + ({ \ > > + WARN_ON_ONCE(is_vmalloc_addr(v)); \ > > + pfn_to_gfn(virt_to_phys(v) >> XEN_PAGE_SHIFT); \ > > + }) > > Shouldn't such a check cover more than just the vmalloc range, > i.e. everything outside of what __va() can validly return? Keep in mind that this patch is meant as sister patch to https://marc.info/?l=xen-devel&m=159834800203817 so it makes sense to check for vmalloc addresses specifically. That said, I am not aware of a good way to implement the __va test you are suggesting.
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |