[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v6 05/15] xen: extend domctl interface for cache coloring
Hi Jan, On Thu, Feb 1, 2024 at 2:51 PM Jan Beulich <jbeulich@xxxxxxxx> wrote: > > On 29.01.2024 18:18, Carlo Nonato wrote: > > @@ -858,6 +859,16 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) > > u_domctl) > > __HYPERVISOR_domctl, "h", u_domctl); > > break; > > > > + case XEN_DOMCTL_set_llc_colors: > > + if ( !llc_coloring_enabled ) > > + break; > > With "ret" still being 0, this amounts to "successfully ignored". Ought > to be -EOPNOTSUPP, I guess. Yep. > > + ret = domain_set_llc_colors_domctl(d, &op->u.set_llc_colors); > > + if ( ret == -EEXIST ) > > + printk(XENLOG_ERR > > + "Can't set LLC colors on an already created domain\n"); > > If at all a dprintk(). But personally I think even that's too much - we > don't do so elsewhere, I don't think. I'm going to drop the printk. > > --- a/xen/common/llc-coloring.c > > +++ b/xen/common/llc-coloring.c > > @@ -4,6 +4,7 @@ > > * > > * Copyright (C) 2022 Xilinx Inc. > > */ > > +#include <xen/guest_access.h> > > #include <xen/keyhandler.h> > > #include <xen/llc-coloring.h> > > #include <xen/param.h> > > @@ -229,6 +230,30 @@ int __init dom0_set_llc_colors(struct domain *d) > > return domain_check_colors(d); > > } > > > > +int domain_set_llc_colors_domctl(struct domain *d, > > + const struct xen_domctl_set_llc_colors > > *config) > > What purpose has the "domctl" in the function name? To signal that it's called from domctl. Do you suggest leaving it out? > > +{ > > + unsigned int *colors; > > + > > + if ( d->num_llc_colors ) > > + return -EEXIST; > > + > > + if ( !config->num_llc_colors ) > > + return domain_set_default_colors(d); > > + > > + colors = alloc_colors(config->num_llc_colors); > > + if ( !colors ) > > + return -ENOMEM; > > Hmm, I see here you call the function without first having bounds checked > the input. But in case of too big a value, -ENOMEM is inappropriate, so > such a check wants adding up front anyway. Yeah, ok. > > + if ( copy_from_guest(colors, config->llc_colors, > > config->num_llc_colors) ) > > + return -EFAULT; > > There again wants to be a check that the pointed to values are the same, > or at least of the same size. Else you'd need to do element-wise copy. > > > + d->llc_colors = colors; > > + d->num_llc_colors = config->num_llc_colors; > > + > > + return domain_check_colors(d); > > And if this fails, you leave the domain with the bad settings? Shouldn't > you check and only then store pointer and count? Yes. I'm gonna change it. Thanks. > > --- a/xen/include/public/domctl.h > > +++ b/xen/include/public/domctl.h > > @@ -1190,6 +1190,13 @@ struct xen_domctl_vmtrace_op { > > typedef struct xen_domctl_vmtrace_op xen_domctl_vmtrace_op_t; > > DEFINE_XEN_GUEST_HANDLE(xen_domctl_vmtrace_op_t); > > > > +struct xen_domctl_set_llc_colors { > > + /* IN LLC coloring parameters */ > > + uint32_t num_llc_colors; > > + uint32_t padding; > > I see you've added padding, but: You don't check it to be zero. Plus > the overwhelming majority of padding fields is named "pad". > > Jan
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |