WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

[Xen-devel] Re: [PATCH] xen-gntdev: Fix unmap notify on PV domains

To: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
Subject: [Xen-devel] Re: [PATCH] xen-gntdev: Fix unmap notify on PV domains
From: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
Date: Tue, 8 Feb 2011 17:58:56 -0500
Cc: jeremy@xxxxxxxx, xen-devel@xxxxxxxxxxxxxxxxxxx, Ian.Campbell@xxxxxxxxxx
Delivery-date: Tue, 08 Feb 2011 15:01:32 -0800
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <4D514FAE.4000709@xxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
References: <1296753544-13323-1-git-send-email-dgdegra@xxxxxxxxxxxxx> <20110207231416.GA12956@xxxxxxxxxxxx> <4D514FAE.4000709@xxxxxxxxxxxxx>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
User-agent: Mutt/1.5.20 (2009-06-14)
On Tue, Feb 08, 2011 at 09:14:06AM -0500, Daniel De Graaf wrote:
> In paravirtualized guests, the struct page* for mappings is only a
> placeholder, and cannot be used to access the granted memory. Use the
> userspace mapping that we have set up in order to implement
> UNMAP_NOTIFY_CLEAR_BYTE.
>     
> Signed-off-by: Daniel De Graaf <dgdegra@xxxxxxxxxxxxx>
> 
> diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c
> index 06de2c0..2b67f15 100644
> --- a/drivers/xen/gntdev.c
> +++ b/drivers/xen/gntdev.c
> @@ -287,7 +287,12 @@ static int unmap_grant_pages(struct grant_map *map, int 
> offset, int pages)
>  
>       if (map->notify.flags & UNMAP_NOTIFY_CLEAR_BYTE) {
>               int pgno = (map->notify.addr >> PAGE_SHIFT);
> -             if (pgno >= offset && pgno < offset + pages) {
> +             if (pgno >= offset && pgno < offset + pages && use_ptemod) {
> +                     void __user *tmp;
> +                     tmp = map->vma->vm_start + map->notify.addr;
> +                     copy_to_user(tmp, &err, 1);

The compiler really hates that. You could use a uninitialized_value macro
to ignore it.

> +                     map->notify.flags &= ~UNMAP_NOTIFY_CLEAR_BYTE;
> +             } else if (pgno >= offset && pgno < offset + pages) {
>                       uint8_t *tmp = kmap(map->pages[pgno]);
>                       tmp[map->notify.addr & (PAGE_SIZE-1)] = 0;
>                       kunmap(map->pages[pgno]);
> @@ -296,7 +301,7 @@ static int unmap_grant_pages(struct grant_map *map, int 
> offset, int pages)
>       }
>  
>       pr_debug("map %d+%d [%d+%d]\n", map->index, map->count, offset, pages);
> -     err = gnttab_unmap_refs(map->unmap_ops + offset, map->pages, pages);
> +     err = gnttab_unmap_refs(map->unmap_ops + offset, map->pages + offset, 
> pages);
>       if (err)
>               return err;
>  

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel

<Prev in Thread] Current Thread [Next in Thread>