Message ID | b70cc7c0854a6a25b00624b5fa83684a20916ca3.1617706782.git.hongyxia@amazon.com (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | switch to domheap for Xen page tables | expand |
On 06.04.2021 13:05, Hongyan Xia wrote: > From: Wei Liu <wei.liu2@citrix.com> > > Rewrite those functions to use the new APIs. Modify its callers to unmap > the pointer returned. Since alloc_xen_pagetable_new() is almost never > useful unless accompanied by page clearing and a mapping, introduce a > helper alloc_map_clear_xen_pt() for this sequence. > > Signed-off-by: Wei Liu <wei.liu2@citrix.com> > Signed-off-by: Hongyan Xia <hongyxia@amazon.com> > > --- > Changed in v9: > - use domain_page_map_to_mfn() around the L3 table locking logic. > - remove vmap_to_mfn() changes since we now use xen_map_to_mfn(). > > Changed in v8: > - s/virtual address/linear address/. > - BUG_ON() on NULL return in vmap_to_mfn(). > > Changed in v7: > - remove a comment. > - use l1e_get_mfn() instead of converting things back and forth. > - add alloc_map_clear_xen_pt(). I realize this was in v7 already, but at v6 time the name I suggested was void *alloc_mapped_pagetable(mfn_t *mfn); "alloc_map_clear_xen", for my taste at least, is too strange. It doesn't really matter whether it's a page table for Xen's own use (it typically will be), so "xen" could be dropped. Clearing of a page table ought to also be the rule rather than the exception, so I'd see "clear" also dropped. I'd be fine with alloc_map_pt() or about any intermediate variant between that and my originally suggested name. > @@ -5108,7 +5140,8 @@ int map_pages_to_xen( > unsigned int flags) > { > bool locking = system_state > SYS_STATE_boot; > - l2_pgentry_t *pl2e, ol2e; > + l3_pgentry_t *pl3e = NULL, ol3e; > + l2_pgentry_t *pl2e = NULL, ol2e; > l1_pgentry_t *pl1e, ol1e; > unsigned int i; > int rc = -ENOMEM; > @@ -5132,15 +5165,16 @@ int map_pages_to_xen( > > while ( nr_mfns != 0 ) > { > - l3_pgentry_t *pl3e, ol3e; > - > + /* Clean up the previous iteration. */ > L3T_UNLOCK(current_l3page); > + UNMAP_DOMAIN_PAGE(pl3e); > + UNMAP_DOMAIN_PAGE(pl2e); Doing this here suggests the lower-case equivalent is needed at the out label, even without looking at the rest of the function (doing so confirms the suspicion, as there's at least one "goto out" with pl2e clearly still mapped). > @@ -5305,6 +5339,8 @@ int map_pages_to_xen( > pl1e = virt_to_xen_l1e(virt); > if ( pl1e == NULL ) > goto out; > + > + UNMAP_DOMAIN_PAGE(pl1e); > } Unmapping the page right after mapping it looks suspicious. I see that further down we have pl1e = l2e_to_l1e(*pl2e) + l1_table_offset(virt); but don't you need to also change that? Actually, you do in patch 2, but the latest then the double mapping should imo be avoided. > @@ -5505,6 +5542,7 @@ int populate_pt_range(unsigned long virt, unsigned long nr_mfns) > int modify_xen_mappings(unsigned long s, unsigned long e, unsigned int nf) > { > bool locking = system_state > SYS_STATE_boot; > + l3_pgentry_t *pl3e = NULL; > l2_pgentry_t *pl2e; > l1_pgentry_t *pl1e; > unsigned int i; And here we have the opposite situation: You don't set pl2e to NULL and the function only uses l3e_to_l2e() to initialize the variable, yet ... > @@ -5761,6 +5799,8 @@ int modify_xen_mappings(unsigned long s, unsigned long e, unsigned int nf) > > out: > L3T_UNLOCK(current_l3page); > + unmap_domain_page(pl2e); > + unmap_domain_page(pl3e); ... here you try to unmap it. Did the two respective hunks somehow magically get swapped? > --- a/xen/common/vmap.c > +++ b/xen/common/vmap.c > @@ -1,6 +1,7 @@ > #ifdef VMAP_VIRT_START > #include <xen/bitmap.h> > #include <xen/cache.h> > +#include <xen/domain_page.h> Why is this needed? (Looks like a now stale change.) Jan
On Tue, 2021-04-20 at 14:17 +0200, Jan Beulich wrote: > On 06.04.2021 13:05, Hongyan Xia wrote: > > From: Wei Liu <wei.liu2@citrix.com> > > > > Rewrite those functions to use the new APIs. Modify its callers to > > unmap > > the pointer returned. Since alloc_xen_pagetable_new() is almost > > never > > useful unless accompanied by page clearing and a mapping, introduce > > a > > helper alloc_map_clear_xen_pt() for this sequence. > > > > Signed-off-by: Wei Liu <wei.liu2@citrix.com> > > Signed-off-by: Hongyan Xia <hongyxia@amazon.com> > > > > --- > > Changed in v9: > > - use domain_page_map_to_mfn() around the L3 table locking logic. > > - remove vmap_to_mfn() changes since we now use xen_map_to_mfn(). > > > > Changed in v8: > > - s/virtual address/linear address/. > > - BUG_ON() on NULL return in vmap_to_mfn(). > > > > Changed in v7: > > - remove a comment. > > - use l1e_get_mfn() instead of converting things back and forth. > > - add alloc_map_clear_xen_pt(). > > I realize this was in v7 already, but at v6 time the name I suggested > was > > void *alloc_mapped_pagetable(mfn_t *mfn); > > "alloc_map_clear_xen", for my taste at least, is too strange. It > doesn't really matter whether it's a page table for Xen's own use > (it typically will be), so "xen" could be dropped. Clearing of a > page table ought to also be the rule rather than the exception, so > I'd see "clear" also dropped. I'd be fine with alloc_map_pt() or > about any intermediate variant between that and my originally > suggested name. Sounds reasonable. I will go with alloc_mapped_pagetable(). > > > @@ -5108,7 +5140,8 @@ int map_pages_to_xen( > > unsigned int flags) > > { > > bool locking = system_state > SYS_STATE_boot; > > - l2_pgentry_t *pl2e, ol2e; > > + l3_pgentry_t *pl3e = NULL, ol3e; > > + l2_pgentry_t *pl2e = NULL, ol2e; > > l1_pgentry_t *pl1e, ol1e; > > unsigned int i; > > int rc = -ENOMEM; > > @@ -5132,15 +5165,16 @@ int map_pages_to_xen( > > > > while ( nr_mfns != 0 ) > > { > > - l3_pgentry_t *pl3e, ol3e; > > - > > + /* Clean up the previous iteration. */ > > L3T_UNLOCK(current_l3page); > > + UNMAP_DOMAIN_PAGE(pl3e); > > + UNMAP_DOMAIN_PAGE(pl2e); > > Doing this here suggests the lower-case equivalent is needed at the > out label, even without looking at the rest of the function (doing > so confirms the suspicion, as there's at least one "goto out" with > pl2e clearly still mapped). > > > @@ -5305,6 +5339,8 @@ int map_pages_to_xen( > > pl1e = virt_to_xen_l1e(virt); > > if ( pl1e == NULL ) > > goto out; > > + > > + UNMAP_DOMAIN_PAGE(pl1e); > > } > > Unmapping the page right after mapping it looks suspicious. I see > that > further down we have > > pl1e = l2e_to_l1e(*pl2e) + l1_table_offset(virt); > > but don't you need to also change that? Actually, you do in patch 2, > but the latest then the double mapping should imo be avoided. I would say the code was already suspicious to begin with, since pl1e would be overwritten immediately below even before this patch. The purpose of the virt_to_xen_l1e() is only to populate the L1 table. Performance-wise the double map should be pretty harmless since the mapping is in the cache, so I actually prefer it as is. Alternatively, I can initialise pl1e to NULL at the beginning of the block and only do the pl1e = l2e_to_l1e(*pl2e) + l1_table_offset(virt); when the pl1e is still NULL. If you are okay I will go with this. > > > @@ -5505,6 +5542,7 @@ int populate_pt_range(unsigned long virt, > > unsigned long nr_mfns) > > int modify_xen_mappings(unsigned long s, unsigned long e, unsigned > > int nf) > > { > > bool locking = system_state > SYS_STATE_boot; > > + l3_pgentry_t *pl3e = NULL; > > l2_pgentry_t *pl2e; > > l1_pgentry_t *pl1e; > > unsigned int i; > > And here we have the opposite situation: You don't set pl2e to NULL > and the function only uses l3e_to_l2e() to initialize the variable, > yet ... > > > @@ -5761,6 +5799,8 @@ int modify_xen_mappings(unsigned long s, > > unsigned long e, unsigned int nf) > > > > out: > > L3T_UNLOCK(current_l3page); > > + unmap_domain_page(pl2e); > > + unmap_domain_page(pl3e); > > ... here you try to unmap it. Did the two respective hunks somehow > magically get swapped? Since the +-3 contexts of the two hunks are exactly the same, I have strong suspicion what you said is exactly what happened. Thank you for spotting this. > > > --- a/xen/common/vmap.c > > +++ b/xen/common/vmap.c > > @@ -1,6 +1,7 @@ > > #ifdef VMAP_VIRT_START > > #include <xen/bitmap.h> > > #include <xen/cache.h> > > +#include <xen/domain_page.h> > > Why is this needed? (Looks like a now stale change.) Stale change indeed. Will be removed. Hongyan
On 21.04.2021 13:33, Hongyan Xia wrote: > On Tue, 2021-04-20 at 14:17 +0200, Jan Beulich wrote: >> On 06.04.2021 13:05, Hongyan Xia wrote: >>> @@ -5305,6 +5339,8 @@ int map_pages_to_xen( >>> pl1e = virt_to_xen_l1e(virt); >>> if ( pl1e == NULL ) >>> goto out; >>> + >>> + UNMAP_DOMAIN_PAGE(pl1e); >>> } >> >> Unmapping the page right after mapping it looks suspicious. I see >> that >> further down we have >> >> pl1e = l2e_to_l1e(*pl2e) + l1_table_offset(virt); >> >> but don't you need to also change that? Actually, you do in patch 2, >> but the latest then the double mapping should imo be avoided. > > I would say the code was already suspicious to begin with, since pl1e > would be overwritten immediately below even before this patch. The > purpose of the virt_to_xen_l1e() is only to populate the L1 table. > > Performance-wise the double map should be pretty harmless since the > mapping is in the cache, so I actually prefer it as is. Alternatively, > I can initialise pl1e to NULL at the beginning of the block and only do > the > > pl1e = l2e_to_l1e(*pl2e) + l1_table_offset(virt); > > when the pl1e is still NULL. If you are okay I will go with this. I'd prefer this alternative, indeed, as it'll make the overall code look less odd. Albeit maybe not here, but in the subsequent patch. Jan
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c index afb4febf6f4e..9705fed195f1 100644 --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -4915,8 +4915,28 @@ void free_xen_pagetable_new(mfn_t mfn) free_xenheap_page(mfn_to_virt(mfn_x(mfn))); } +void *alloc_map_clear_xen_pt(mfn_t *pmfn) +{ + mfn_t mfn = alloc_xen_pagetable_new(); + void *ret; + + if ( mfn_eq(mfn, INVALID_MFN) ) + return NULL; + + if ( pmfn ) + *pmfn = mfn; + ret = map_domain_page(mfn); + clear_page(ret); + + return ret; +} + static DEFINE_SPINLOCK(map_pgdir_lock); +/* + * For virt_to_xen_lXe() functions, they take a linear address and return a + * pointer to Xen's LX entry. Caller needs to unmap the pointer. + */ static l3_pgentry_t *virt_to_xen_l3e(unsigned long v) { l4_pgentry_t *pl4e; @@ -4925,33 +4945,33 @@ static l3_pgentry_t *virt_to_xen_l3e(unsigned long v) if ( !(l4e_get_flags(*pl4e) & _PAGE_PRESENT) ) { bool locking = system_state > SYS_STATE_boot; - l3_pgentry_t *l3t = alloc_xen_pagetable(); + mfn_t l3mfn; + l3_pgentry_t *l3t = alloc_map_clear_xen_pt(&l3mfn); if ( !l3t ) return NULL; - clear_page(l3t); + UNMAP_DOMAIN_PAGE(l3t); if ( locking ) spin_lock(&map_pgdir_lock); if ( !(l4e_get_flags(*pl4e) & _PAGE_PRESENT) ) { - l4_pgentry_t l4e = l4e_from_paddr(__pa(l3t), __PAGE_HYPERVISOR); + l4_pgentry_t l4e = l4e_from_mfn(l3mfn, __PAGE_HYPERVISOR); l4e_write(pl4e, l4e); efi_update_l4_pgtable(l4_table_offset(v), l4e); - l3t = NULL; + l3mfn = INVALID_MFN; } if ( locking ) spin_unlock(&map_pgdir_lock); - if ( l3t ) - free_xen_pagetable(l3t); + free_xen_pagetable_new(l3mfn); } - return l4e_to_l3e(*pl4e) + l3_table_offset(v); + return map_l3t_from_l4e(*pl4e) + l3_table_offset(v); } static l2_pgentry_t *virt_to_xen_l2e(unsigned long v) { - l3_pgentry_t *pl3e; + l3_pgentry_t *pl3e, l3e; pl3e = virt_to_xen_l3e(v); if ( !pl3e ) @@ -4960,31 +4980,37 @@ static l2_pgentry_t *virt_to_xen_l2e(unsigned long v) if ( !(l3e_get_flags(*pl3e) & _PAGE_PRESENT) ) { bool locking = system_state > SYS_STATE_boot; - l2_pgentry_t *l2t = alloc_xen_pagetable(); + mfn_t l2mfn; + l2_pgentry_t *l2t = alloc_map_clear_xen_pt(&l2mfn); if ( !l2t ) + { + unmap_domain_page(pl3e); return NULL; - clear_page(l2t); + } + UNMAP_DOMAIN_PAGE(l2t); if ( locking ) spin_lock(&map_pgdir_lock); if ( !(l3e_get_flags(*pl3e) & _PAGE_PRESENT) ) { - l3e_write(pl3e, l3e_from_paddr(__pa(l2t), __PAGE_HYPERVISOR)); - l2t = NULL; + l3e_write(pl3e, l3e_from_mfn(l2mfn, __PAGE_HYPERVISOR)); + l2mfn = INVALID_MFN; } if ( locking ) spin_unlock(&map_pgdir_lock); - if ( l2t ) - free_xen_pagetable(l2t); + free_xen_pagetable_new(l2mfn); } BUG_ON(l3e_get_flags(*pl3e) & _PAGE_PSE); - return l3e_to_l2e(*pl3e) + l2_table_offset(v); + l3e = *pl3e; + unmap_domain_page(pl3e); + + return map_l2t_from_l3e(l3e) + l2_table_offset(v); } l1_pgentry_t *virt_to_xen_l1e(unsigned long v) { - l2_pgentry_t *pl2e; + l2_pgentry_t *pl2e, l2e; pl2e = virt_to_xen_l2e(v); if ( !pl2e ) @@ -4993,26 +5019,32 @@ l1_pgentry_t *virt_to_xen_l1e(unsigned long v) if ( !(l2e_get_flags(*pl2e) & _PAGE_PRESENT) ) { bool locking = system_state > SYS_STATE_boot; - l1_pgentry_t *l1t = alloc_xen_pagetable(); + mfn_t l1mfn; + l1_pgentry_t *l1t = alloc_map_clear_xen_pt(&l1mfn); if ( !l1t ) + { + unmap_domain_page(pl2e); return NULL; - clear_page(l1t); + } + UNMAP_DOMAIN_PAGE(l1t); if ( locking ) spin_lock(&map_pgdir_lock); if ( !(l2e_get_flags(*pl2e) & _PAGE_PRESENT) ) { - l2e_write(pl2e, l2e_from_paddr(__pa(l1t), __PAGE_HYPERVISOR)); - l1t = NULL; + l2e_write(pl2e, l2e_from_mfn(l1mfn, __PAGE_HYPERVISOR)); + l1mfn = INVALID_MFN; } if ( locking ) spin_unlock(&map_pgdir_lock); - if ( l1t ) - free_xen_pagetable(l1t); + free_xen_pagetable_new(l1mfn); } BUG_ON(l2e_get_flags(*pl2e) & _PAGE_PSE); - return l2e_to_l1e(*pl2e) + l1_table_offset(v); + l2e = *pl2e; + unmap_domain_page(pl2e); + + return map_l1t_from_l2e(l2e) + l1_table_offset(v); } /* Convert to from superpage-mapping flags for map_pages_to_xen(). */ @@ -5069,7 +5101,7 @@ mfn_t xen_map_to_mfn(unsigned long va) L3T_INIT(l3page); CHECK_MAPPED(pl3e); - l3page = virt_to_page(pl3e); + l3page = mfn_to_page(domain_page_map_to_mfn(pl3e)); L3T_LOCK(l3page); CHECK_MAPPED(l3e_get_flags(*pl3e) & _PAGE_PRESENT); @@ -5108,7 +5140,8 @@ int map_pages_to_xen( unsigned int flags) { bool locking = system_state > SYS_STATE_boot; - l2_pgentry_t *pl2e, ol2e; + l3_pgentry_t *pl3e = NULL, ol3e; + l2_pgentry_t *pl2e = NULL, ol2e; l1_pgentry_t *pl1e, ol1e; unsigned int i; int rc = -ENOMEM; @@ -5132,15 +5165,16 @@ int map_pages_to_xen( while ( nr_mfns != 0 ) { - l3_pgentry_t *pl3e, ol3e; - + /* Clean up the previous iteration. */ L3T_UNLOCK(current_l3page); + UNMAP_DOMAIN_PAGE(pl3e); + UNMAP_DOMAIN_PAGE(pl2e); pl3e = virt_to_xen_l3e(virt); if ( !pl3e ) goto out; - current_l3page = virt_to_page(pl3e); + current_l3page = mfn_to_page(domain_page_map_to_mfn(pl3e)); L3T_LOCK(current_l3page); ol3e = *pl3e; @@ -5305,6 +5339,8 @@ int map_pages_to_xen( pl1e = virt_to_xen_l1e(virt); if ( pl1e == NULL ) goto out; + + UNMAP_DOMAIN_PAGE(pl1e); } else if ( l2e_get_flags(*pl2e) & _PAGE_PSE ) { @@ -5482,6 +5518,7 @@ int map_pages_to_xen( out: L3T_UNLOCK(current_l3page); + unmap_domain_page(pl3e); return rc; } @@ -5505,6 +5542,7 @@ int populate_pt_range(unsigned long virt, unsigned long nr_mfns) int modify_xen_mappings(unsigned long s, unsigned long e, unsigned int nf) { bool locking = system_state > SYS_STATE_boot; + l3_pgentry_t *pl3e = NULL; l2_pgentry_t *pl2e; l1_pgentry_t *pl1e; unsigned int i; @@ -5523,15 +5561,15 @@ int modify_xen_mappings(unsigned long s, unsigned long e, unsigned int nf) while ( v < e ) { - l3_pgentry_t *pl3e; - + /* Clean up the previous iteration. */ L3T_UNLOCK(current_l3page); + UNMAP_DOMAIN_PAGE(pl3e); pl3e = virt_to_xen_l3e(v); if ( !pl3e ) goto out; - current_l3page = virt_to_page(pl3e); + current_l3page = mfn_to_page(domain_page_map_to_mfn(pl3e)); L3T_LOCK(current_l3page); if ( !(l3e_get_flags(*pl3e) & _PAGE_PRESENT) ) @@ -5761,6 +5799,8 @@ int modify_xen_mappings(unsigned long s, unsigned long e, unsigned int nf) out: L3T_UNLOCK(current_l3page); + unmap_domain_page(pl2e); + unmap_domain_page(pl3e); return rc; } diff --git a/xen/common/vmap.c b/xen/common/vmap.c index 4fd6b3067ec1..c5140ac4f6a9 100644 --- a/xen/common/vmap.c +++ b/xen/common/vmap.c @@ -1,6 +1,7 @@ #ifdef VMAP_VIRT_START #include <xen/bitmap.h> #include <xen/cache.h> +#include <xen/domain_page.h> #include <xen/init.h> #include <xen/mm.h> #include <xen/pfn.h> diff --git a/xen/include/asm-x86/mm.h b/xen/include/asm-x86/mm.h index 041c158f03f6..681aac5b7ac2 100644 --- a/xen/include/asm-x86/mm.h +++ b/xen/include/asm-x86/mm.h @@ -577,6 +577,7 @@ void *alloc_xen_pagetable(void); void free_xen_pagetable(void *v); mfn_t alloc_xen_pagetable_new(void); void free_xen_pagetable_new(mfn_t mfn); +void *alloc_map_clear_xen_pt(mfn_t *pmfn); l1_pgentry_t *virt_to_xen_l1e(unsigned long v);