|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] xen: privcmd: do not return pages which we have failed to unmap
On Fri, 6 Dec 2013, Konrad Rzeszutek Wilk wrote:
> On Fri, Dec 06, 2013 at 05:58:25PM +0000, Stefano Stabellini wrote:
> > On Wed, 4 Dec 2013, Ian Campbell wrote:
> > > >From 900f1e903bacf376800b078aef03e8d5ff524562 Mon Sep 17 00:00:00 2001
> > > From: Ian Campbell <ian.campbell@xxxxxxxxxx>
> > > Date: Wed, 4 Dec 2013 14:19:52 +0000
> > > Subject: [PATCH] xen: privcmd: do not return pages which we have failed to
> > > unmap
> > >
> > > This failure represents a hypervisor issue, but if it does occur then
> > > nothing
> > > good can come of returning pages which still refer to a foreign owned page
> > > into the general allocation pool.
> > >
> > > Instead we are forced to leak them. Log that we have done so.
> > >
> > > The potential for failure only exists for autotranslated guest (e.g. ARM
> > > and
> > > x86 PVH).
> > >
> > > Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
> > > Cc: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
> > > Cc: Boris Ostrovsky <boris.ostrovsky@xxxxxxxxxx>
> > > Cc: David Vrabel <david.vrabel@xxxxxxxxxx>
> > > Cc: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
> > > Cc: xen-devel@xxxxxxxxxxxxxxxxxxxx
> > > ---
> > > v2: Don't leak the actual pages array as well
> > > Log rc
> >
> >
> > Acked-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx>
> >
> > Konrad, you can go ahead and add it to xentip, unless you would rather
> > have me do it.
>
> Why don't you do it. Thanks!
done
> >
> > > drivers/xen/privcmd.c | 9 +++++++--
> > > 1 file changed, 7 insertions(+), 2 deletions(-)
> > >
> > > diff --git a/drivers/xen/privcmd.c b/drivers/xen/privcmd.c
> > > index 8e74590..569a13b 100644
> > > --- a/drivers/xen/privcmd.c
> > > +++ b/drivers/xen/privcmd.c
> > > @@ -533,12 +533,17 @@ static void privcmd_close(struct vm_area_struct
> > > *vma)
> > > {
> > > struct page **pages = vma->vm_private_data;
> > > int numpgs = (vma->vm_end - vma->vm_start) >> PAGE_SHIFT;
> > > + int rc;
> > >
> > > if (!xen_feature(XENFEAT_auto_translated_physmap) || !numpgs || !pages)
> > > return;
> > >
> > > - xen_unmap_domain_mfn_range(vma, numpgs, pages);
> > > - free_xenballooned_pages(numpgs, pages);
> > > + rc = xen_unmap_domain_mfn_range(vma, numpgs, pages);
> > > + if (rc == 0)
> > > + free_xenballooned_pages(numpgs, pages);
> > > + else
> > > + pr_crit("unable to unmap MFN range: leaking %d pages. rc=%d\n",
> > > + numpgs, rc);
> > > kfree(pages);
> > > }
> > >
> > > --
> > > 1.7.10.4
> > >
> > >
> > >
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |