[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH XEN v5 09/23] tools: Refactor hypercall calling wrappers into libxencall.
On 09/11/15 12:00, Ian Campbell wrote: > diff --git a/tools/libs/call/linux.c b/tools/libs/call/linux.c > new file mode 100644 > index 0000000..906ca7e > --- /dev/null > +++ b/tools/libs/call/linux.c > @@ -0,0 +1,132 @@ > +/* > + * This library is free software; you can redistribute it and/or > + * modify it under the terms of the GNU Lesser General Public > + * License as published by the Free Software Foundation; > + * version 2.1 of the License. > + * > + * This library is distributed in the hope that it will be useful, > + * but WITHOUT ANY WARRANTY; without even the implied warranty of > + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU > + * Lesser General Public License for more details. > + * > + * You should have received a copy of the GNU Lesser General Public > + * License along with this library; If not, see > <http://www.gnu.org/licenses/>. > + * > + * Split out from xc_linus_osdep.c: > + * > + * Copyright 2006 Sun Microsystems, Inc. All rights reserved. > + */ > + > +#include <errno.h> > +#include <fcntl.h> > +#include <unistd.h> > + > +#include <sys/mman.h> > +#include <sys/ioctl.h> > + > +#include "private.h" > + > +int osdep_xencall_open(xencall_handle *xcall) > +{ > + int flags, saved_errno; > + int fd = open("/proc/xen/privcmd", O_RDWR); I know this is a straight copy, but these new libraries really should start with the PVOps interface of /dev/xen/privcmd before falling back to the older classic-linux interfaces under /proc Ideally, once all these library improvements are done, there should be no need to mount xenfs in a Linux PVops domain. > + > + if ( fd == -1 ) > + { > + PERROR("Could not obtain handle on privileged command interface"); > + return -1; > + } > + > + /* Although we return the file handle as the 'xc handle' the API > + does not specify / guarentee that this integer is in fact > + a file handle. Thus we must take responsiblity to ensure > + it doesn't propagate (ie leak) outside the process */ Again, I know this is a straight copy, but it is racy. The open() call needs O_CLOEXEC. There might be some issues here to do with older versions of libc. > + if ( (flags = fcntl(fd, F_GETFD)) < 0 ) > + { > + PERROR("Could not get file handle flags"); > + goto error; > + } > + > + flags |= FD_CLOEXEC; > + > + if ( fcntl(fd, F_SETFD, flags) < 0 ) > + { > + PERROR("Could not set file handle flags"); > + goto error; > + } > + > + xcall->fd = fd; > + return 0; > + > + error: > + saved_errno = errno; > + close(fd); > + errno = saved_errno; > + return -1; > +} > + > +int osdep_xencall_close(xencall_handle *xcall) > +{ > + int fd = xcall->fd; > + if (fd == -1) > + return 0; > + return close(fd); > +} > + > +int osdep_hypercall(xencall_handle *xcall, privcmd_hypercall_t *hypercall) > +{ > + return ioctl(xcall->fd, IOCTL_PRIVCMD_HYPERCALL, hypercall); > +} > + > +void *osdep_alloc_pages(xencall_handle *xcall, unsigned int npages) > +{ > + size_t size = npages * PAGE_SIZE; > + void *p; > + int rc, saved_errno; > + > + /* Address returned by mmap is page aligned. */ > + p = mmap(NULL, size, PROT_READ|PROT_WRITE, > MAP_PRIVATE|MAP_ANONYMOUS|MAP_LOCKED, -1, 0); > + if ( p == MAP_FAILED ) > + { > + PERROR("xc_alloc_hypercall_buffer: mmap failed"); > + return NULL; > + } > + > + /* Do not copy the VMA to child process on fork. Avoid the page being COW > + on hypercall. */ > + rc = madvise(p, npages * PAGE_SIZE, MADV_DONTFORK); This also seems racy, although it is unclear from the manpages how to avoid the race. ~Andrew > + if ( rc < 0 ) > + { > + PERROR("xc_alloc_hypercall_buffer: madvise failed"); > + goto out; > + } > + > + return p; > + > +out: > + saved_errno = errno; > + (void)munmap(p, size); > + errno = saved_errno; > + return NULL; > +} > + > +void osdep_free_pages(xencall_handle *xcall, void *ptr, unsigned int npages) > +{ > + int saved_errno = errno; > + /* Recover the VMA flags. Maybe it's not necessary */ > + madvise(ptr, npages * PAGE_SIZE, MADV_DOFORK); > + > + munmap(ptr, npages * PAGE_SIZE); > + /* We MUST propagate the hypercall errno, not unmap call's. */ > + errno = saved_errno; > +} > + > +/* > + * Local variables: > + * mode: C > + * c-file-style: "BSD" > + * c-basic-offset: 4 > + * tab-width: 4 > + * indent-tabs-mode: nil > + * End: > + */ _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |