[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] [Xen-changelog] [xen stable-4.7] memory: fix return value handing of guest_remove_page()
commit ba78feae364db8c35c7afc004b3b8b27f62525d1 Author: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> AuthorDate: Tue Jun 20 16:17:34 2017 +0200 Commit: Jan Beulich <jbeulich@xxxxxxxx> CommitDate: Tue Jun 20 16:17:34 2017 +0200 memory: fix return value handing of guest_remove_page() Despite the description in mm.h, guest_remove_page() previously returned 0 for paging errors. Switch guest_remove_page() to having regular 0/-error semantics, and propagate the return values from clear_mmio_p2m_entry() and mem_sharing_unshare_page() to the callers (although decrease_reservation() is the only caller which currently cares). This is part of XSA-222. Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> Reviewed-by: Jan Beulich <jbeulich@xxxxxxxx> master commit: b614f642c35da5184416787352f51a6379a92628 master date: 2017-06-20 14:39:56 +0200 --- xen/common/memory.c | 34 +++++++++++++++++++++------------- xen/include/xen/mm.h | 3 +-- 2 files changed, 22 insertions(+), 15 deletions(-) diff --git a/xen/common/memory.c b/xen/common/memory.c index e7e1b36..8986cad 100644 --- a/xen/common/memory.c +++ b/xen/common/memory.c @@ -244,6 +244,7 @@ int guest_remove_page(struct domain *d, unsigned long gmfn) p2m_type_t p2mt; #endif unsigned long mfn; + int rc; #ifdef CONFIG_X86 mfn = mfn_x(get_gfn_query(d, gmfn, &p2mt)); @@ -261,13 +262,15 @@ int guest_remove_page(struct domain *d, unsigned long gmfn) put_page(page); } p2m_mem_paging_drop_page(d, gmfn, p2mt); - return 1; + + return 0; } if ( p2mt == p2m_mmio_direct ) { - clear_mmio_p2m_entry(d, gmfn, _mfn(mfn), 0); + rc = clear_mmio_p2m_entry(d, gmfn, _mfn(mfn), PAGE_ORDER_4K); put_gfn(d, gmfn); - return 1; + + return rc; } #else mfn = gmfn_to_mfn(d, gmfn); @@ -277,21 +280,25 @@ int guest_remove_page(struct domain *d, unsigned long gmfn) put_gfn(d, gmfn); gdprintk(XENLOG_INFO, "Domain %u page number %lx invalid\n", d->domain_id, gmfn); - return 0; + + return -EINVAL; } #ifdef CONFIG_X86 if ( p2m_is_shared(p2mt) ) { - /* Unshare the page, bail out on error. We unshare because - * we might be the only one using this shared page, and we - * need to trigger proper cleanup. Once done, this is - * like any other page. */ - if ( mem_sharing_unshare_page(d, gmfn, 0) ) + /* + * Unshare the page, bail out on error. We unshare because we + * might be the only one using this shared page, and we need to + * trigger proper cleanup. Once done, this is like any other page. + */ + rc = mem_sharing_unshare_page(d, gmfn, 0); + if ( rc ) { put_gfn(d, gmfn); (void)mem_sharing_notify_enomem(d, gmfn, 0); - return 0; + + return rc; } /* Maybe the mfn changed */ mfn = mfn_x(get_gfn_query_unlocked(d, gmfn, &p2mt)); @@ -304,7 +311,8 @@ int guest_remove_page(struct domain *d, unsigned long gmfn) { put_gfn(d, gmfn); gdprintk(XENLOG_INFO, "Bad page free for domain %u\n", d->domain_id); - return 0; + + return -ENXIO; } if ( test_and_clear_bit(_PGT_pinned, &page->u.inuse.type_info) ) @@ -327,7 +335,7 @@ int guest_remove_page(struct domain *d, unsigned long gmfn) put_page(page); put_gfn(d, gmfn); - return 1; + return 0; } static void decrease_reservation(struct memop_args *a) @@ -371,7 +379,7 @@ static void decrease_reservation(struct memop_args *a) continue; for ( j = 0; j < (1 << a->extent_order); j++ ) - if ( !guest_remove_page(a->domain, gmfn + j) ) + if ( guest_remove_page(a->domain, gmfn + j) ) goto out; } diff --git a/xen/include/xen/mm.h b/xen/include/xen/mm.h index 3cf646a..193b993 100644 --- a/xen/include/xen/mm.h +++ b/xen/include/xen/mm.h @@ -509,8 +509,7 @@ int xenmem_add_to_physmap_one(struct domain *d, unsigned int space, union xen_add_to_physmap_batch_extra extra, unsigned long idx, xen_pfn_t gpfn); -/* Returns 1 on success, 0 on error, negative if the ring - * for event propagation is full in the presence of paging */ +/* Returns 0 on success, or negative on error. */ int guest_remove_page(struct domain *d, unsigned long gmfn); #define RAM_TYPE_CONVENTIONAL 0x00000001 -- generated by git-patchbot for /home/xen/git/xen.git#stable-4.7 _______________________________________________ Xen-changelog mailing list Xen-changelog@xxxxxxxxxxxxx https://lists.xenproject.org/xen-changelog
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |