[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] x86/altp2m: Allow setting the #VE info page for an arbitrary VCPU



>>> On 25.07.18 at 13:49, <apop@xxxxxxxxxxxxxxx> wrote:
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -4467,6 +4467,30 @@ static int hvmop_get_param(
>      return rc;
>  }
>  
> +/*
> + * Find the struct vcpu given a dom_id and vcpu_id.
> + * Return NULL if not found.
> + */
> +static struct vcpu *__get_vcpu(domid_t domain_id, uint32_t vcpu_id)

No double leading underscores please, and avoid the use of fixed
width types when you don't really need it (unsigned int is fine here).

> +{
> +    struct domain *dom;

We commonly call this just d.

> +    struct vcpu *v;
> +
> +    dom = rcu_lock_domain_by_id(domain_id);
> +
> +    for_each_vcpu( dom, v )
> +    {
> +        if ( vcpu_id == v->vcpu_id )
> +        {
> +            rcu_unlock_domain(dom);
> +            return v;
> +        }
> +    }

for_each_vcpu() looks excessive here - all you need is a bounds
check and an access into d->vcpus[]. Together with the fact
that your caller has already identified and locked d I wonder
whether this helper is needed in the first place.

> @@ -4576,26 +4599,32 @@ static int do_altp2m_op(
>  
>      case HVMOP_altp2m_vcpu_enable_notify:
>      {
> -        struct vcpu *curr = current;
> +        struct vcpu *v;
>          p2m_type_t p2mt;
>  
> -        if ( a.u.enable_notify.pad || a.domain != DOMID_SELF ||
> -             a.u.enable_notify.vcpu_id != curr->vcpu_id )
> +        if ( a.u.enable_notify.pad )
>          {
>              rc = -EINVAL;
>              break;
>          }
>  
> -        if ( !gfn_eq(vcpu_altp2m(curr).veinfo_gfn, INVALID_GFN) ||
> -             mfn_eq(get_gfn_query_unlocked(curr->domain,
> +        v = __get_vcpu(a.domain, a.u.enable_notify.vcpu_id);
> +        if ( !v )
> +        {
> +            rc = -EFAULT;

Hardly an appropriate error indicator for the condition.

> +            break;
> +        }
> +
> +        if ( !gfn_eq(vcpu_altp2m(v).veinfo_gfn, INVALID_GFN) ||
> +             mfn_eq(get_gfn_query_unlocked(v->domain,
>                      a.u.enable_notify.gfn, &p2mt), INVALID_MFN) )
>          {
>              rc = -EINVAL;
>              break;
>          }
>  
> -        vcpu_altp2m(curr).veinfo_gfn = _gfn(a.u.enable_notify.gfn);
> -        altp2m_vcpu_update_vmfunc_ve(curr);
> +        vcpu_altp2m(v).veinfo_gfn = _gfn(a.u.enable_notify.gfn);
> +        altp2m_vcpu_update_vmfunc_ve(v);

I'd like you to outline in the description how you mean an external
agent to coordinate the use of this GFN with the guest (and in
particular without in-guest agent).

Jan



_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.