[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v3][PATCH 1/1] xen:vtd: missing RMRR mapping while share EPT
>>> On 25.07.14 at 10:45, <tiejun.chen@xxxxxxxxx> wrote: > On 2014/7/25 16:07, Jan Beulich wrote: >>>>> On 25.07.14 at 08:47, <tiejun.chen@xxxxxxxxx> wrote: >>>> So I think it would be prudent to at least try to detect a clash here >>>> and return an error. >>> >>> Could we check if this pte already present like this? >>> >>> @@ -1870,6 +1872,16 @@ static int rmrr_identity_mapping(struct domain *d, >>> if ( iommu_use_hap_pt(d) ) >>> { >>> ASSERT(!iommu_passthrough || !is_hardware_domain(d)); >>> + /* get last level pte */ >>> + pg_maddr = addr_to_dma_page_maddr(d, ((paddr_t)gfn << >>> PAGE_SHIFT_4K), 0); >>> + page = (struct dma_pte *)map_vtd_domain_page(pg_maddr); >>> + pte = page + address_level_offset(addr, 1); >>> + if ( dma_pte_present(*pte) ) >>> + { >>> + printk(XENLOG_ERR VTDPREFIX >>> + "Overlapping RMRRs at %"PRIx64".\n", >>> (paddr_t)base_gfn); >>> + return -1; >>> + } >>> if ( set_mmio_p2m_entry(d, base_pfn, _mfn(base_pfn)) ) >>> return -1; >>> } >> >> I think you'd be better off using P2M functions here, even more so >> considering that you're in an iommu_use_hap_pt() guarded code >> section. > > Are you pointing p2m->get_entry? Sort of. For the check to really be meaningful the get and set would need to be done without the respective lock dropped intermediately. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |