From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752785AbeDKJp6 (ORCPT ); Wed, 11 Apr 2018 05:45:58 -0400 Received: from foss.arm.com ([217.140.101.70]:47206 "EHLO foss.arm.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751872AbeDKJp5 (ORCPT ); Wed, 11 Apr 2018 05:45:57 -0400 Subject: Re: [PATCH v4] xen/privcmd: add IOCTL_PRIVCMD_MMAP_RESOURCE To: Paul Durrant , xen-devel@lists.xenproject.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org Cc: Juergen Gross , Thomas Gleixner , Stefano Stabellini , Ingo Molnar References: <20180410075820.11081-1-paul.durrant@citrix.com> From: Julien Grall Message-ID: <8fff31d5-7eb4-33e8-0fc8-c5bb1ab47eba@arm.com> Date: Wed, 11 Apr 2018 10:45:53 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.6.0 MIME-Version: 1.0 In-Reply-To: <20180410075820.11081-1-paul.durrant@citrix.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, On 10/04/18 08:58, Paul Durrant wrote: > +static long privcmd_ioctl_mmap_resource(struct file *file, void __user *udata) > +{ > + struct privcmd_data *data = file->private_data; > + struct mm_struct *mm = current->mm; > + struct vm_area_struct *vma; > + struct privcmd_mmap_resource kdata; > + xen_pfn_t *pfns = NULL; > + struct xen_mem_acquire_resource xdata; > + int rc; > + > + if (copy_from_user(&kdata, udata, sizeof(kdata))) > + return -EFAULT; > + > + /* If restriction is in place, check the domid matches */ > + if (data->domid != DOMID_INVALID && data->domid != kdata.dom) > + return -EPERM; > + > + down_write(&mm->mmap_sem); > + > + vma = find_vma(mm, kdata.addr); > + if (!vma || vma->vm_ops != &privcmd_vm_ops) { > + rc = -EINVAL; > + goto out; > + } > + > + pfns = kcalloc(kdata.num, sizeof(*pfns), GFP_KERNEL); > + if (!pfns) { > + rc = -ENOMEM; > + goto out; > + } > + > + if (xen_feature(XENFEAT_auto_translated_physmap)) { > + struct page **pages; > + unsigned int i; > + > + rc = alloc_empty_pages(vma, kdata.num); > + if (rc < 0) > + goto out; > + > + pages = vma->vm_private_data; > + for (i = 0; i < kdata.num; i++) > + pfns[i] = page_to_pfn(pages[i]); I don't think this is going to work well if the hypervisor is using a different granularity for the page. Imagine Xen is using 4K but the kernel 64K. You would end up to have the resource not mapped contiguously in the memory. Cheers, -- Julien Grall