[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v10 8/9] xen: retrieve reserved pages on populate_physmap


  • To: Penny Zheng <Penny.Zheng@xxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Tue, 6 Sep 2022 08:33:51 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=TPmF2/PqohE6KhCfmaPh7Kot0HjxeHWQOTXeX2dsNPg=; b=ThBTDuAr+7m+AN9p6itHXnA3MQZLcXs2afpVPdt5YEtN3GHXDmui+Fi992X9LxTMgbLlHIJM0mOx3pDA9SZPIqtNEuSrLWt2N+eWy6oqoLsVIa3vUTrdwObiSxSfKaU/dbbPi6ILVncO96ElSqTdcu1lxL+ezVvayHGfAhlNKqOII/KiHjyQe0Gno1Hk6zJ33JJdRJaC3ox0Y33aSY0tS9hoCSMCBBXd+R1Yy9ZFpqswj2Ey7yqdZkGnt5dtqjIzZjXHoxMBL7pEc6pG9kbWmh21JIAygJusak/m32D9un7h87ZKo78ZnwzIpMT1t7oSyH+6HqXiBYR4l+a1IUFn3w==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Mtd5u3q8zVQxs3Q4q/2DFcYsEIiwqBAyQyjEFZ15Bco8qxdZqdJZ4zgz8IwliubYxsEQwOR6N1KDdw+EEC/juHWYiWaeTvxjhhLquKfoBSTIE6orm8fsQtUeDgIioYJCKCN1wFkTRZLNPeNOdamBKeN9oJBLupUaja2ni1KMJM1JOAf0OFqAp/0iQK0k424uN9tuu+JBQarO2mktEsz0Z07/CONaeRtBthM/xg4O/+rzTuzdzbJ+DpkYeqmYmbrKV7dl/MBaaA3Tv0+PsXIrUgv8ibICru/EwUhQNmUnj4u77HEuNcq9Jeq7tLl7g2pC6LbuVTRNtNcttPpDMUfpCA==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Wei Chen <Wei.Chen@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 06 Sep 2022 06:33:54 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 05.09.2022 09:08, Penny Zheng wrote:
> Hi jan 
> 
>> -----Original Message-----
>> From: Jan Beulich <jbeulich@xxxxxxxx>
>> Sent: Wednesday, August 17, 2022 6:05 PM
>> To: Penny Zheng <Penny.Zheng@xxxxxxx>
>> Cc: Wei Chen <Wei.Chen@xxxxxxx>; Andrew Cooper
>> <andrew.cooper3@xxxxxxxxxx>; George Dunlap <george.dunlap@xxxxxxxxxx>;
>> Julien Grall <julien@xxxxxxx>; Stefano Stabellini <sstabellini@xxxxxxxxxx>;
>> Wei Liu <wl@xxxxxxx>; xen-devel@xxxxxxxxxxxxxxxxxxxx
>> Subject: Re: [PATCH v10 8/9] xen: retrieve reserved pages on
>> populate_physmap
>>
>> On 16.08.2022 04:36, Penny Zheng wrote:
>>> @@ -2867,6 +2854,61 @@ int __init acquire_domstatic_pages(struct
>>> domain *d, mfn_t smfn,
>>>
>>>      return 0;
>>>  }
>>> +
>>> +/*
>>> + * Acquire nr_mfns contiguous pages, starting at #smfn, of static
>>> +memory,
>>> + * then assign them to one specific domain #d.
>>> + */
>>> +int __init acquire_domstatic_pages(struct domain *d, mfn_t smfn,
>>> +                                   unsigned int nr_mfns, unsigned int
>>> +memflags) {
>>> +    struct page_info *pg;
>>> +
>>> +    ASSERT_ALLOC_CONTEXT();
>>> +
>>> +    pg = acquire_staticmem_pages(smfn, nr_mfns, memflags);
>>> +    if ( !pg )
>>> +        return -ENOENT;
>>> +
>>> +    if ( assign_domstatic_pages(d, pg, nr_mfns, memflags) )
>>> +        return -EINVAL;
>>> +
>>> +    return 0;
>>> +}
>>> +
>>> +/*
>>> + * Acquire a page from reserved page list(resv_page_list), when
>>> +populating
>>> + * memory for static domain on runtime.
>>> + */
>>> +mfn_t acquire_reserved_page(struct domain *d, unsigned int memflags)
>>> +{
>>> +    struct page_info *page;
>>> +
>>> +    ASSERT_ALLOC_CONTEXT();
>>> +
>>> +    /* Acquire a page from reserved page list(resv_page_list). */
>>> +    spin_lock(&d->page_alloc_lock);
>>> +    page = page_list_remove_head(&d->resv_page_list);
>>> +    spin_unlock(&d->page_alloc_lock);
>>> +    if ( unlikely(!page) )
>>> +        return INVALID_MFN;
>>> +
>>> +    if ( !prepare_staticmem_pages(page, 1, memflags) )
>>> +        goto fail;
>>> +
>>> +    if ( assign_domstatic_pages(d, page, 1, memflags) )
>>> +        goto fail_assign;
>>> +
>>> +    return page_to_mfn(page);
>>> +
>>> + fail_assign:
>>> +    free_staticmem_pages(page, 1, memflags & MEMF_no_scrub);
>>
>> Doesn't this need to be !(memflags & MEMF_no_scrub)? And then - with
> 
> I got a bit confused about this flag MEMF_no_scrub, does it mean no need
> to scrub? 

Yes, as its name says.

> Since I saw that in alloc_domheap_pages(...)
>     if ( assign_page(pg, order, d, memflags) )
>     {
>         free_heap_pages(pg, order, memflags & MEMF_no_scrub);
>         return NULL;
>     }
> It doesn't contain exclamation mark too...

Hmm, you're right - on these error paths the scrubbing is needed if
the page wasn't previously scrubbed, as part of the set of pages may
have been transiently exposed to the guest (and by guessing it may
have been able to actually access the pages; I'm inclined to say it's
its own fault though if that way information is being leaked).

But ...

>> assignment having failed and with it being just a single page we're talking
>> about, the page was not exposed to the guest at any point afaict. So I don't
>> see the need for scrubbing in the first place.

while my comment wasn't really correct, as said - you don't need any
scrubbing here at all, I think.

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.