diff options
| author | Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com> | 2012-08-03 15:36:52 +0800 | 
|---|---|---|
| committer | Avi Kivity <avi@redhat.com> | 2012-08-06 16:04:46 +0300 | 
| commit | 16b854c889673d988285719bc020543a730f9ac6 (patch) | |
| tree | 03b85cb0aada8a8fa4fd538d9b0fddc5460df495 /virt | |
| parent | d89cc617b954aff4030fce178f7d86f59aaf713d (diff) | |
| download | linux-16b854c889673d988285719bc020543a730f9ac6.tar.bz2 | |
KVM: iommu: fix releasing unmapped page
There are two bugs:
- the 'error page' is forgot to be released
  [ it is unneeded after commit a2766325cf9f9, for backport, we
    still do kvm_release_pfn_clean for the error pfn ]
- guest pages are always released regardless of the unmapped page
  (e,g, caused by hwpoison)
Signed-off-by: Xiao Guangrong <xiaoguangrong@linux.vnet.ibm.com>
Signed-off-by: Avi Kivity <avi@redhat.com>
Diffstat (limited to 'virt')
| -rw-r--r-- | virt/kvm/iommu.c | 7 | 
1 files changed, 7 insertions, 0 deletions
| diff --git a/virt/kvm/iommu.c b/virt/kvm/iommu.c index c03f1fb26701..6a67bea4019c 100644 --- a/virt/kvm/iommu.c +++ b/virt/kvm/iommu.c @@ -107,6 +107,7 @@ int kvm_iommu_map_pages(struct kvm *kvm, struct kvm_memory_slot *slot)  		 */  		pfn = kvm_pin_pages(slot, gfn, page_size);  		if (is_error_pfn(pfn)) { +			kvm_release_pfn_clean(pfn);  			gfn += 1;  			continue;  		} @@ -300,6 +301,12 @@ static void kvm_iommu_put_pages(struct kvm *kvm,  		/* Get physical address */  		phys = iommu_iova_to_phys(domain, gfn_to_gpa(gfn)); + +		if (!phys) { +			gfn++; +			continue; +		} +  		pfn  = phys >> PAGE_SHIFT;  		/* Unmap address from IO address space */ |