[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCHv5 13/14] xen/gntdev: mark userspace PTEs as special on x86 PV guests
On Tue, 27 Jan 2015, David Vrabel wrote: > In an x86 PV guest, get_user_pages_fast() on a userspace address range > containing foreign mappings does not work correctly because the M2P > lookup of the MFN from a userspace PTE may return the wrong page. > > Force get_user_pages_fast() to fail on such addresses by marking the PTEs > as special. > > If Xen has XENFEAT_gnttab_map_avail_bits (available since at least > 4.0), we can do so efficiently in the grant map hypercall. Otherwise, > it needs to be done afterwards. This is both inefficient and racy > (the mapping is visible to the task before we fixup the PTEs), but > will be fine for well-behaved applications that do not use the mapping > until after the mmap() system call returns. > > Guests with XENFEAT_auto_translated_physmap (ARM and x86 HVM or PVH) > do not need this since get_user_pages() has always worked correctly > for them. > > Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx> Reviewed-by: Stefano Stabellini <stefano.stabellini@xxxxxxxxxxxxx> > drivers/xen/gntdev.c | 30 ++++++++++++++++++++++++++++++ > include/xen/interface/features.h | 6 ++++++ > include/xen/interface/grant_table.h | 7 +++++++ > 3 files changed, 43 insertions(+) > > diff --git a/drivers/xen/gntdev.c b/drivers/xen/gntdev.c > index bccc54a..ebc80ba 100644 > --- a/drivers/xen/gntdev.c > +++ b/drivers/xen/gntdev.c > @@ -244,6 +244,14 @@ static int find_grant_ptes(pte_t *pte, pgtable_t token, > BUG_ON(pgnr >= map->count); > pte_maddr = arbitrary_virt_to_machine(pte).maddr; > > + /* > + * Set the PTE as special to force get_user_pages_fast() fall > + * back to the slow path. If this is not supported as part of > + * the grant map, it will be done afterwards. > + */ > + if (xen_feature(XENFEAT_gnttab_map_avail_bits)) > + flags |= (1 << _GNTMAP_guest_avail0); > + > gnttab_set_map_op(&map->map_ops[pgnr], pte_maddr, flags, > map->grants[pgnr].ref, > map->grants[pgnr].domid); > @@ -252,6 +260,13 @@ static int find_grant_ptes(pte_t *pte, pgtable_t token, > return 0; > } > > +static int set_grant_ptes_as_special(pte_t *pte, pgtable_t token, > + unsigned long addr, void *data) > +{ > + set_pte_at(current->mm, addr, pte, pte_mkspecial(*pte)); > + return 0; > +} > + > static int map_grant_pages(struct grant_map *map) > { > int i, err = 0; > @@ -840,6 +855,21 @@ static int gntdev_mmap(struct file *flip, struct > vm_area_struct *vma) > if (err) > goto out_put_map; > } > + } else { > + /* > + * If the PTEs were not made special by the grant map > + * hypercall, do so here. > + * > + * This is racy since the mapping is already visible > + * to userspace but userspace should be well-behaved > + * enough to not touch it until the mmap() call > + * returns. > + */ > + if (!xen_feature(XENFEAT_gnttab_map_avail_bits)) { > + apply_to_page_range(vma->vm_mm, vma->vm_start, > + vma->vm_end - vma->vm_start, > + set_grant_ptes_as_special, NULL); > + } > } > > return 0; > diff --git a/include/xen/interface/features.h > b/include/xen/interface/features.h > index 131a6cc..6ad3d11 100644 > --- a/include/xen/interface/features.h > +++ b/include/xen/interface/features.h > @@ -41,6 +41,12 @@ > /* x86: Does this Xen host support the MMU_PT_UPDATE_PRESERVE_AD hypercall? > */ > #define XENFEAT_mmu_pt_update_preserve_ad 5 > > +/* > + * If set, GNTTABOP_map_grant_ref honors flags to be placed into guest kernel > + * available pte bits. > + */ > +#define XENFEAT_gnttab_map_avail_bits 7 > + > /* x86: Does this Xen host support the HVM callback vector type? */ > #define XENFEAT_hvm_callback_vector 8 > > diff --git a/include/xen/interface/grant_table.h > b/include/xen/interface/grant_table.h > index bcce564..56806bc 100644 > --- a/include/xen/interface/grant_table.h > +++ b/include/xen/interface/grant_table.h > @@ -526,6 +526,13 @@ DEFINE_GUEST_HANDLE_STRUCT(gnttab_cache_flush); > #define GNTMAP_contains_pte (1<<_GNTMAP_contains_pte) > > /* > + * Bits to be placed in guest kernel available PTE bits (architecture > + * dependent; only supported when XENFEAT_gnttab_map_avail_bits is set). > + */ > +#define _GNTMAP_guest_avail0 (16) > +#define GNTMAP_guest_avail_mask ((uint32_t)~0 << _GNTMAP_guest_avail0) > + > +/* > * Values for error status returns. All errors are -ve. > */ > #define GNTST_okay (0) /* Normal return. > */ > -- > 1.7.10.4 > > > _______________________________________________ > Xen-devel mailing list > Xen-devel@xxxxxxxxxxxxx > http://lists.xen.org/xen-devel > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |