From: David Vrabel <david.vrabel@citrix.com>
To: xen-devel@lists.xenproject.org
Cc: Juergen Gross <jgross@suse.com>,
Boris Ostrovsky <boris.ostrovsky@oracle.com>,
David Vrabel <david.vrabel@citrix.com>
Subject: [PATCHv1 0/2] xen/privcmd: prevent page migration for hypercall buffers
Date: Wed, 3 Aug 2016 18:03:03 +0100 [thread overview]
Message-ID: <1470243785-30523-1-git-send-email-david.vrabel@citrix.com> (raw)
Currently libxencall using mlocked buffers for hypercall buffers.
This pages are subject to compaction and page migration. A userspace
process may see a hypercall fail with -EFAULT if a page backing a
hypercall buffer is in the process of being migrated.
Page migration can be prevented by taking an additional reference to
the page.
There are three possible ways to do this:
1. Add a new device which when mmap()'d populated the VMA with
suitable memory that has an additional reference. This would give
VMAs that have appropriate properties set (e.g., VM_DONTCOPY)
without having to do additional madvise() calls.
2. Add a new ioctl to privcmd to populate a VMA with suitably
ref-counted pages. However, mmap() on privcmd is already used for
foreign mappings and the VMA properties for hypercall buffers and
foreign mappings might need to be different and the handling of
unmap will need to be different. This might be tricky.
3. Add a pair of ioctls to privcmd to lock/unlock a buffer by
getting/putting an additional reference to the page. This is
what's implemented in this series.
Any thoughts on which is the best approach?
David
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
next reply other threads:[~2016-08-03 17:03 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2016-08-03 17:03 David Vrabel [this message]
2016-08-03 17:03 ` [PATCHv1 1/2] xen/prvicmd: use ENOTTY if the IOCTL is not supported David Vrabel
2016-08-04 14:26 ` Boris Ostrovsky
2016-08-03 17:03 ` [PATCHv1 2/2] xen/privcmd: add ioctls for locking/unlocking hypercall buffers David Vrabel
2016-08-04 6:52 ` Jan Beulich
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1470243785-30523-1-git-send-email-david.vrabel@citrix.com \
--to=david.vrabel@citrix.com \
--cc=boris.ostrovsky@oracle.com \
--cc=jgross@suse.com \
--cc=xen-devel@lists.xenproject.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).