|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 1/1 V3] x86/AMD: Fix nested svm crash due to assertion in __virt_to_maddr
At 09:01 +0100 on 12 Jul (1373619676), Jan Beulich wrote:
> >>> On 11.07.13 at 19:34, <suravee.suthikulpanit@xxxxxxx> wrote:
> > --- a/xen/arch/x86/mm/hap/nested_hap.c
> > +++ b/xen/arch/x86/mm/hap/nested_hap.c
> > @@ -191,6 +191,19 @@ out:
> > return rc;
> > }
> >
> > +int
> > +nestedhvm_walk_L0_p2m(struct vcpu *v, paddr_t L1_gpa, paddr_t *L0_gpa)
> > +{
> > + p2m_type_t p2mt_10;
> > + unsigned int page_order_10;
> > + p2m_access_t p2ma_10 = p2m_access_rwx;
>
> Pointless initializer?
Indeed, p2ma_10 could be left alone.
> > +
> > + return nestedhap_walk_L0_p2m ( p2m_get_hostp2m(v->domain),
>
> Extra spaces around "(".
>
> > + L1_gpa, L0_gpa,
> > + &p2mt_10, &p2ma_10, &page_order_10,
> > + 0, 0, 0);
>
> Wouldn't the caller's use of the GPA imply that you want read and
> write access here?
Yes, at least for the callers you've added.
> I'm not clear about the need for this new wrapper: Is it really
> benign to the caller what type, access, and order get returned
> here? Is it really too much of a burden to have the two call
> sites do the call here directly? The more that (see above) you'd
> really need to give the caller control over the access requested?
Yeah, I'm not sure the wrapper is needed. Can the callers just use
get_page_from_gfn() to do the translation from guest-MFN -- i.e. will we
always be in non-nested mode when we're emulating VMLOAD/VMSAVE?
Cheers,
Tim.
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |