From: Mukesh Rathor <mukesh.rathor@oracle.com>
To: Tim Deegan <tim@xen.org>
Cc: "Xen-devel@lists.xensource.com" <Xen-devel@lists.xensource.com>
Subject: Re: [PATCH 14/18 V2]: PVH xen: add xenmem_add_foreign_to_pmap()
Date: Fri, 5 Apr 2013 19:07:03 -0700 [thread overview]
Message-ID: <20130405190703.1b5f8a79@mantra.us.oracle.com> (raw)
In-Reply-To: <20130321174146.GQ12338@ocelot.phlegethon.org>
On Thu, 21 Mar 2013 17:41:46 +0000
Tim Deegan <tim@xen.org> wrote:
> At 17:58 -0700 on 15 Mar (1363370311), Mukesh Rathor wrote:
> > In this patch, a new function, xenmem_add_foreign_to_pmap(), is
> > added to map pages from foreign guest into current dom0 for domU
> > creation. Also, allow XENMEM_remove_from_physmap to remove
> > p2m_map_foreign pages. Note, in this path, we must release the
> > refcount that was taken during the map phase.
> >
> > Changes in V2:
> > - Move the XENMEM_remove_from_physmap changes here instead of
> > prev patch
> > - Move grant changes from this to one of the next patches.
> > - In xenmem_add_foreign_to_pmap(), do locked get_gfn
> > - Fail the mappings for qemu mapping pages for memory not there.
> >
> > Signed-off-by: Mukesh Rathor <mukesh.rathor@oracle.com>
> > ---
> > xen/arch/x86/mm.c | 74
> > ++++++++++++++++++++++++++++++++++++++++++++++++--
> > xen/common/memory.c | 44 +++++++++++++++++++++++++++--- 2 files
> > changed, 110 insertions(+), 8 deletions(-)
> >
> > diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
> > index 6603752..dbac811 100644
> > --- a/xen/arch/x86/mm.c
> > +++ b/xen/arch/x86/mm.c
> > @@ -4266,6 +4266,66 @@ static int handle_iomem_range(unsigned long
> > s, unsigned long e, void *p) return 0;
> > }
> >
> > +/*
> > + * Add frames from foreign domain to current domain's physmap.
> > Similar to
> > + * XENMAPSPACE_gmfn but the frame is foreign being mapped into
> > current,
> > + * and is not removed from foreign domain.
> > + * Usage: libxl on pvh dom0 creating a guest and doing
> > privcmd_ioctl_mmap.
> > + * Side Effect: the mfn for fgfn will be refcounted so it is not
> > lost
> > + * while mapped here. The refcnt is released in
> > do_memory_op()
> > + * via XENMEM_remove_from_physmap.
> > + * Returns: 0 ==> success
> > + */
> > +static int xenmem_add_foreign_to_pmap(domid_t foreign_domid,
> > + unsigned long fgfn, unsigned
> > long gpfn) +{
> > + p2m_type_t p2mt, p2mt_prev;
> > + int rc = -EINVAL;
> > + unsigned long prev_mfn, mfn = 0;
> > + struct domain *fdom, *currd = current->domain;
> > +
> > + if ( (fdom = get_pg_owner(foreign_domid)) == NULL )
> > + return -EPERM;
> > +
> > + mfn = mfn_x(get_gfn_query(fdom, fgfn, &p2mt));
> > + if ( !mfn_valid(mfn) || !p2m_is_valid(p2mt) )
> > + goto out_rc;
> > +
> > + if ( !get_page_from_pagenr(mfn, fdom) )
> > + goto out_rc;
>
> I think you can use get_page_from_gfn() here instead of doing the
> translation and the get_page() by hand. That way you don't need to
> worry about the put_gfn(). Which is just as well, as otherwise the
> second get_gfn() might deadlock if fdom == currd.
please see below.
> > + /* Remove previously mapped page if it is present. */
> > + prev_mfn = mfn_x(get_gfn(currd, gpfn, &p2mt_prev));
> > + if ( mfn_valid(prev_mfn) )
> > + {
> > + if ( is_xen_heap_mfn(prev_mfn) )
> > + /* Xen heap frames are simply unhooked from this phys
> > slot */
> > + guest_physmap_remove_page(currd, gpfn, prev_mfn, 0);
> > + else
> > + /* Normal domain memory is freed, to avoid leaking
> > memory. */
> > + guest_remove_page(currd, gpfn);
> > + }
> > + put_gfn(currd, gpfn);
>
> Again, without the p2m lock held, another CPU could populate gpfn
> between here and set_foreign_p2m_entry().
Ok, I suppose I should move the put_gfn. Here's what I got now:
/*
* Add frames from foreign domain to current domain's physmap. Similar to
* XENMAPSPACE_gmfn but the frame is foreign being mapped into current,
* and is not removed from foreign domain.
* Usage: libxl on pvh dom0 creating a guest and doing privcmd_ioctl_mmap.
* Side Effect: the mfn for fgfn will be refcounted so it is not lost
* while mapped here. The refcnt is released in do_memory_op()
* via XENMEM_remove_from_physmap.
* Returns: 0 ==> success
*/
static int xenmem_add_foreign_to_pmap(domid_t foreign_domid,
unsigned long fgfn, unsigned long gpfn)
{
p2m_type_t p2mt, p2mt_prev;
int rc = -EINVAL;
unsigned long prev_mfn, mfn = 0;
struct domain *fdom, *currd = current->domain;
struct page_info *page = NULL;
if ( currd->domain_id == foreign_domid || foreign_domid == DOMID_SELF )
return -EINVAL;
if ( !IS_PRIV(currd) || (fdom = get_pg_owner(foreign_domid)) == NULL )
return -EPERM;
page = get_page_from_gfn(fdom, fgfn, &p2mt, P2M_ALLOC);
if ( !page || !p2m_is_valid(p2mt) )
{
if ( page )
put_page(page);
put_pg_owner(fdom);
return rc;
}
/* Remove previously mapped page if it is present. */
prev_mfn = mfn_x(get_gfn(currd, gpfn, &p2mt_prev));
if ( mfn_valid(prev_mfn) )
{
if ( is_xen_heap_mfn(prev_mfn) )
/* Xen heap frames are simply unhooked from this phys slot */
guest_physmap_remove_page(currd, gpfn, prev_mfn, 0);
else
/* Normal domain memory is freed, to avoid leaking memory. */
guest_remove_page(currd, gpfn);
}
/*
* Create the new mapping. Can't use guest_physmap_add_page() because it
* will update the m2p table which will result in mfn -> gpfn of dom0
* and not fgfn of domU.
*/
if ( set_foreign_p2m_entry(currd, gpfn, _mfn(mfn)) == 0 )
{
dprintk(XENLOG_WARNING,
"guest_physmap_add_page failed. gpfn:%lx mfn:%lx fgfn:%lx\n",
gpfn, mfn, fgfn);
put_page(page);
}
else
rc = 0;
/*
* We must do this put_gfn after set_foreign_p2m_entry so another cpu
* doesn't populate the gpfn before us.
*/
put_gfn(currd, gpfn);
put_pg_owner(fdom);
return rc;
}
next prev parent reply other threads:[~2013-04-06 2:07 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2013-03-16 0:58 [PATCH 14/18 V2]: PVH xen: add xenmem_add_foreign_to_pmap() Mukesh Rathor
2013-03-21 17:41 ` Tim Deegan
2013-04-06 2:07 ` Mukesh Rathor [this message]
2013-04-09 0:17 ` Mukesh Rathor
2013-04-09 1:58 ` Mukesh Rathor
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20130405190703.1b5f8a79@mantra.us.oracle.com \
--to=mukesh.rathor@oracle.com \
--cc=Xen-devel@lists.xensource.com \
--cc=tim@xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).