On Mon, Aug 23, 2010 at 06:22:02PM +0300, Avi Kivity wrote:
>  On 07/19/2010 06:30 PM, Gleb Natapov wrote:
> >Guess enables async PF vcpu functionality using this MSR.
> >
> >
> >
> >+static int kvm_pv_enable_async_pf(struct kvm_vcpu *vcpu, u64 data)
> >+{
> >+    u64 gpa = data&  ~0x3f;
> >+    int offset = offset_in_page(gpa);
> >+    unsigned long addr;
> >+
> >+    /* Bits 1:5 are resrved, Should be zero */
> >+    if (data&  0x3e)
> >+            return 1;
> >+
> >+    vcpu->arch.apf_msr_val = data;
> >+
> >+    if (!(data&  KVM_ASYNC_PF_ENABLED)) {
> >+            vcpu->arch.apf_data = NULL;
> >+            return 0;
> >+    }
> >+
> >+    addr = gfn_to_hva(vcpu->kvm, gpa>>  PAGE_SHIFT);
> >+    if (kvm_is_error_hva(addr))
> >+            return 1;
> >+
> >+    vcpu->arch.apf_data = (u32 __user*)(addr + offset);
> 
> This can be invalidated by host userspace playing with memory
> regions.  It needs to be recalculated on memory map changes, and it
> may disappear from under the guest's feet (in which case we're
> allowed to KVM_REQ_TRIPLE_FAULT it).
> 
> (note: this is a much better approach than kvmclock's and vapic's,
> we should copy it there)
> 
apf_put_user() tracks memory slot changes and revalidate the address if
needed.

> >+
> >+    /* check if address is mapped */
> >+    if (get_user(offset, vcpu->arch.apf_data)) {
> >+            vcpu->arch.apf_data = NULL;
> >+            return 1;
> >+    }
> 
> So, this check can succeed today but fail tomorrow.
> 

> >+    return 0;
> >+}
> >+
> 
> -- 
> error compiling committee.c: too many arguments to function

--
                        Gleb.
--
To unsubscribe from this list: send the line "unsubscribe kvm" in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to