public inbox for kvm@vger.kernel.org
 help / color / mirror / Atom feed
From: Jan Kiszka <jan.kiszka@siemens.com>
To: Alexander Graf <agraf@suse.de>
Cc: kvm-devel <kvm@vger.kernel.org>, Avi Kivity <avi@redhat.com>,
	kvm-ppc <kvm-ppc@vger.kernel.org>,
	"arnd@arndb.de" <arnd@arndb.de>
Subject: Re: [PATCH] Enable 32bit dirty log pointers on 64bit host
Date: Fri, 23 Oct 2009 11:15:34 +0200	[thread overview]
Message-ID: <4AE17436.6020107@siemens.com> (raw)
In-Reply-To: <A11D55C3-4D93-4C0C-9C4E-03EE8C17AE0C@suse.de>

Alexander Graf wrote:
> On 23.10.2009, at 10:41, Jan Kiszka wrote:
> 
>> Alexander Graf wrote:
>>> From: Arnd Bergmann <arnd@arndb.de>
>>>
>>> With big endian userspace, we can't quite figure out if a pointer
>>> is 32 bit (shifted >> 32) or 64 bit when we read a 64 bit pointer.
>>>
>>> This is what happens with dirty logging. To get the pointer  
>>> interpreted
>>> correctly, we thus need Arnd's patch to implement a compat layer for
>>> the ioctl:
>>>
>>> A better way to do this is to add a separate compat_ioctl() method  
>>> that
>>> converts this for you.
>>>
>>> From: Arnd Bergmann <arnd@arndb.de>
>>> Signed-off-by: Arnd Bergmann <arnd@arndb.de>
>>> Acked-by: Alexander Graf <agraf@suse.de>
>>>
>>> ---
>>>
>>> Changes from Arnd's example version:
>>>
>>>  - s/log.log/log/ (Avi)
>>>  - use sizeof(compat_log) (Avi)
>>>  - compile fixes
>>> ---
>>> virt/kvm/kvm_main.c |   49 +++++++++++++++++++++++++++++++++++++++++ 
>>> +++++++-
>>> 1 files changed, 48 insertions(+), 1 deletions(-)
>>>
>>> diff --git a/virt/kvm/kvm_main.c b/virt/kvm/kvm_main.c
>>> index cac69c4..54a272f 100644
>>> --- a/virt/kvm/kvm_main.c
>>> +++ b/virt/kvm/kvm_main.c
>>> @@ -43,6 +43,7 @@
>>> #include <linux/swap.h>
>>> #include <linux/bitops.h>
>>> #include <linux/spinlock.h>
>>> +#include <linux/compat.h>
>>>
>>> #include <asm/processor.h>
>>> #include <asm/io.h>
>>> @@ -1542,6 +1543,52 @@ out:
>>> 	return r;
>>> }
>>>
>>> +#ifdef CONFIG_COMPAT
>>> +struct compat_kvm_dirty_log {
>>> +	__u32 slot;
>>> +	__u32 padding1;
>>> +	union {
>>> +		compat_uptr_t dirty_bitmap; /* one bit per page */
>>> +		__u64 padding2;
>>> +	};
>>> +};
>>> +
>>> +static long kvm_vm_compat_ioctl(struct file *filp,
>>> +			   unsigned int ioctl, unsigned long arg)
>>> +{
>>> +	struct kvm *kvm = filp->private_data;
>>> +	int r;
>>> +
>>> +	if (kvm->mm != current->mm)
>>> +		return -EIO;
>>> +	switch (ioctl) {
>>> +	case KVM_GET_DIRTY_LOG: {
>>> +		struct compat_kvm_dirty_log compat_log;
>>> +		struct kvm_dirty_log log;
>>> +
>>> +		r = -EFAULT;
>>> +		if (copy_from_user(&compat_log, (void __user *)arg,
>>> +				   sizeof(compat_log)))
>>> +			goto out;
>>> +		log.slot	 = compat_log.slot;
>>> +		log.padding1	 = compat_log.padding1;
>>> +		log.padding2	 = compat_log.padding2;
>>> +		log.dirty_bitmap = compat_ptr(compat_log.dirty_bitmap);
>>> +
>>> +		r = kvm_vm_ioctl_get_dirty_log(kvm, &log);
>>> +		if (r)
>>> +			goto out;
>>> +		break;
>>> +	}
>>> +	default:
>>> +		r = kvm_vm_ioctl(filp, ioctl, arg);
>>> +	}
>>> +
>>> +out:
>>> +	return r;
>>> +}
>>> +#endif
>>> +
>>> static int kvm_vm_fault(struct vm_area_struct *vma, struct vm_fault  
>>> *vmf)
>>> {
>>> 	struct page *page[1];
>>> @@ -1576,7 +1623,7 @@ static int kvm_vm_mmap(struct file *file,  
>>> struct vm_area_struct *vma)
>>> static struct file_operations kvm_vm_fops = {
>>> 	.release        = kvm_vm_release,
>>> 	.unlocked_ioctl = kvm_vm_ioctl,
>>> -	.compat_ioctl   = kvm_vm_ioctl,
>>> +	.compat_ioctl   = kvm_vm_compat_ioctl,
>> This fails in the absence of CONFIG_COMPAT.
> 
> 
> So should it rather be
> 
> #ifdef CONFIG_COMPAT
> 	.compat_ioctl = kvm_vm_compat_ioctl,
> #else
> 	.compat_ioctl = kvm_vm_ioctl,
> #endif
> 
> or
> 
> #ifdef CONFIG_COMPAT
> 	.compat_ioctl = kvm_vm_compat_ioctl,
> #endif
> 
> ?

I would say the latter as .compat_ioctl should simply be unused in case
of !CONFIG_COMPAT.

Jan

-- 
Siemens AG, Corporate Technology, CT SE 2
Corporate Competence Center Embedded Linux

  reply	other threads:[~2009-10-23  9:15 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2009-10-21 14:08 [PATCH] Enable 32bit dirty log pointers on 64bit host Alexander Graf
2009-10-22 10:23 ` Avi Kivity
2009-10-22 10:25   ` Alexander Graf
     [not found]     ` <03CB8BC3-B33F-4253-A259-A1517A099698-l3A5Bk7waGM@public.gmane.org>
2009-10-22 10:32       ` Avi Kivity
2009-10-22 20:39 ` Marcelo Tosatti
2009-10-23  8:41 ` Jan Kiszka
     [not found]   ` <4AE16C50.1060806-kv7WeFo6aLtBDgjK7y7TUQ@public.gmane.org>
2009-10-23  9:12     ` Alexander Graf
2009-10-23  9:15       ` Jan Kiszka [this message]
  -- strict thread matches above, loose matches on Subject: below --
2009-10-22 12:19 Alexander Graf

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=4AE17436.6020107@siemens.com \
    --to=jan.kiszka@siemens.com \
    --cc=agraf@suse.de \
    --cc=arnd@arndb.de \
    --cc=avi@redhat.com \
    --cc=kvm-ppc@vger.kernel.org \
    --cc=kvm@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox