Use a reserved pfn in the guest address space to store mem event rings
authorTim Deegan <tim@xen.org>
Thu, 8 Mar 2012 16:40:05 +0000 (16:40 +0000)
committerTim Deegan <tim@xen.org>
Thu, 8 Mar 2012 16:40:05 +0000 (16:40 +0000)
commit770d1e858de56ba8f2e0d7e45c08f48d599528e5
treefcae677231c44b4c20c0816f41cbd51074a5412e
parent7a3de767373545388a9fded238b3450c5b21066d
Use a reserved pfn in the guest address space to store mem event rings

This solves a long-standing issue in which the pages backing these rings were
pages belonging to dom0 user-space processes. Thus, if the process would die
unexpectedly, Xen would keep posting events to a page now belonging to some
other process.

We update all API-consumers in tree (xenpaging and xen-access).

This is an API/ABI change, so please speak up if it breaks your accumptions.

The patch touches tools, hypervisor x86/hvm bits, and hypervisor x86/mm bits.

Signed-off-by: Andres Lagar-Cavilla <andres@lagarcavilla.org>
Acked-by: Tim Deegan <tim@xen.org>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
Committed-by: Tim Deegan <tim@xen.org>
14 files changed:
tools/libxc/xc_domain_restore.c
tools/libxc/xc_domain_save.c
tools/libxc/xc_hvm_build.c
tools/libxc/xc_mem_access.c
tools/libxc/xc_mem_event.c
tools/libxc/xc_mem_paging.c
tools/libxc/xenctrl.h
tools/libxc/xg_save_restore.h
tools/tests/xen-access/xen-access.c
tools/xenpaging/xenpaging.c
xen/arch/x86/mm/mem_event.c
xen/include/public/domctl.h
xen/include/public/hvm/params.h
xen/include/xen/sched.h