[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v2 07/18] x86/pv: update guest LDT mappings using the linear entries
On Wed Jan 8, 2025 at 2:26 PM GMT, Roger Pau Monne wrote: > The pv_map_ldt_shadow_page() and pv_destroy_ldt() functions rely on the L1 > table(s) that contain such mappings being stashed in the domain structure, and > thus such mappings being modified by merely updating the require L1 entries. > > Switch pv_map_ldt_shadow_page() to unconditionally use the linear recursive, > as > that logic is always called while the vCPU is running on the current pCPU. > > For pv_destroy_ldt() use the linear mappings if the vCPU is the one currently > running on the pCPU, otherwise use destroy_mappings(). > > Note this requires keeping an array with the pages currently mapped at the LDT > area, as that allows dropping the extra taken page reference when removing the > mappings. > > Signed-off-by: Roger Pau Monné <roger.pau@xxxxxxxxxx> > --- > xen/arch/x86/include/asm/domain.h | 2 ++ > xen/arch/x86/pv/descriptor-tables.c | 19 ++++++++++--------- > xen/arch/x86/pv/domain.c | 4 ++++ > xen/arch/x86/pv/mm.c | 3 ++- > 4 files changed, 18 insertions(+), 10 deletions(-) > > diff --git a/xen/arch/x86/include/asm/domain.h > b/xen/arch/x86/include/asm/domain.h > index b79d6badd71c..b659cffc7f81 100644 > --- a/xen/arch/x86/include/asm/domain.h > +++ b/xen/arch/x86/include/asm/domain.h > @@ -523,6 +523,8 @@ struct pv_vcpu > struct trap_info *trap_ctxt; > > unsigned long gdt_frames[FIRST_RESERVED_GDT_PAGE]; > + /* Max LDT entries is 8192, so 8192 * 8 = 64KiB (16 pages). */ > + mfn_t ldt_frames[16]; > unsigned long ldt_base; > unsigned int gdt_ents, ldt_ents; > > diff --git a/xen/arch/x86/pv/descriptor-tables.c > b/xen/arch/x86/pv/descriptor-tables.c > index 5a79f022ce13..95b598a4c0cf 100644 > --- a/xen/arch/x86/pv/descriptor-tables.c > +++ b/xen/arch/x86/pv/descriptor-tables.c > @@ -20,28 +20,29 @@ > */ > bool pv_destroy_ldt(struct vcpu *v) > { > - l1_pgentry_t *pl1e; > + const unsigned int nr_frames = ARRAY_SIZE(v->arch.pv.ldt_frames); > unsigned int i, mappings_dropped = 0; > - struct page_info *page; > > ASSERT(!in_irq()); > > ASSERT(v == current || !vcpu_cpu_dirty(v)); > > - pl1e = pv_ldt_ptes(v); > + destroy_perdomain_mapping(v, LDT_VIRT_START(v), nr_frames); > > - for ( i = 0; i < 16; i++ ) > + for ( i = 0; i < nr_frames; i++ ) nit: While at this, can the "unsigned int" be moved here too? > { > - if ( !(l1e_get_flags(pl1e[i]) & _PAGE_PRESENT) ) > - continue; > + mfn_t mfn = v->arch.pv.ldt_frames[i]; > + struct page_info *page; > > - page = l1e_get_page(pl1e[i]); > - l1e_write(&pl1e[i], l1e_empty()); > - mappings_dropped++; > + if ( mfn_eq(mfn, INVALID_MFN) ) > + continue; Can it really be disjoint? As in, why "continue" and not "break"?. Not that it matters in the slightest, and I prefer this form; but I'm curious. > > + v->arch.pv.ldt_frames[i] = INVALID_MFN; > + page = mfn_to_page(mfn); > ASSERT_PAGE_IS_TYPE(page, PGT_seg_desc_page); > ASSERT_PAGE_IS_DOMAIN(page, v->domain); > put_page_and_type(page); > + mappings_dropped++; > } > > return mappings_dropped; > diff --git a/xen/arch/x86/pv/domain.c b/xen/arch/x86/pv/domain.c > index 7e8bffaae9a0..32d7488cc186 100644 > --- a/xen/arch/x86/pv/domain.c > +++ b/xen/arch/x86/pv/domain.c > @@ -303,6 +303,7 @@ void pv_vcpu_destroy(struct vcpu *v) > int pv_vcpu_initialise(struct vcpu *v) > { > struct domain *d = v->domain; > + unsigned int i; > int rc; > > ASSERT(!is_idle_domain(d)); > @@ -311,6 +312,9 @@ int pv_vcpu_initialise(struct vcpu *v) > if ( rc ) > return rc; > > + for ( i = 0; i < ARRAY_SIZE(v->arch.pv.ldt_frames); i++ ) > + v->arch.pv.ldt_frames[i] = INVALID_MFN; > + I think it makes more sense to move this earlier so ldt_frames[] is initialised even if pv_vcpu_initialise() fails. It may be benign, but it looks like an accident abount to happen. Also, nit: "unsigned int i"'s scope can be restricted to the loop itself. As in, "for ( unsigned int i =..." > BUILD_BUG_ON(X86_NR_VECTORS * sizeof(*v->arch.pv.trap_ctxt) > > PAGE_SIZE); > v->arch.pv.trap_ctxt = xzalloc_array(struct trap_info, X86_NR_VECTORS); > diff --git a/xen/arch/x86/pv/mm.c b/xen/arch/x86/pv/mm.c > index 187f5f6a3e8c..4853e619f2a7 100644 > --- a/xen/arch/x86/pv/mm.c > +++ b/xen/arch/x86/pv/mm.c > @@ -86,7 +86,8 @@ bool pv_map_ldt_shadow_page(unsigned int offset) > return false; > } > > - pl1e = &pv_ldt_ptes(curr)[offset >> PAGE_SHIFT]; > + curr->arch.pv.ldt_frames[offset >> PAGE_SHIFT] = page_to_mfn(page); > + pl1e = &__linear_l1_table[l1_linear_offset(LDT_VIRT_START(curr) + > offset)]; > l1e_add_flags(gl1e, _PAGE_RW); > > l1e_write(pl1e, gl1e); Cheers, Alejandro
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |