[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [PATCH v6 5/7] xen: add new domctl get_changed_domain
On 07.01.2025 17:48, Jürgen Groß wrote: > On 07.01.25 17:28, Jan Beulich wrote: >> On 07.01.2025 11:17, Juergen Gross wrote: >>> --- a/xen/common/domain.c >>> +++ b/xen/common/domain.c >>> @@ -185,6 +185,76 @@ static void domain_changed_state(const struct domain >>> *d) >>> unlock_dom_exc_handler(hdl); >>> } >>> >>> +static void set_domain_state_info(struct xen_domctl_get_domain_state *info, >>> + const struct domain *d) >>> +{ >>> + info->state = XEN_DOMCTL_GETDOMSTATE_STATE_EXIST; >>> + if ( d->is_shut_down ) >>> + info->state |= XEN_DOMCTL_GETDOMSTATE_STATE_SHUTDOWN; >>> + if ( d->is_dying == DOMDYING_dying ) >>> + info->state |= XEN_DOMCTL_GETDOMSTATE_STATE_DYING; >>> + if ( d->is_dying == DOMDYING_dead ) >>> + info->state |= XEN_DOMCTL_GETDOMSTATE_STATE_DEAD; >>> + info->unique_id = d->unique_id; >>> +} >>> + >>> +int get_domain_state(struct xen_domctl_get_domain_state *info, struct >>> domain *d, >>> + domid_t *domid) >>> +{ >>> + unsigned int dom; >>> + int rc = -ENOENT; >>> + struct domain *hdl; >>> + >>> + if ( info->pad0 || info->pad1 ) >>> + return -EINVAL; >>> + >>> + if ( d ) >>> + { >>> + set_domain_state_info(info, d); >>> + >>> + return 0; >>> + } >>> + >>> + /* >>> + * Only domain registered for VIRQ_DOM_EXC event is allowed to query >>> + * domains having changed state. >>> + */ >>> + if ( !domain_handles_global_virq(current->domain, VIRQ_DOM_EXC) ) >>> + return -EACCES; >>> + >>> + hdl = lock_dom_exc_handler(); >> >> Instead of leaving a small window for races between the if() and this >> function call, can't you simply compare hdl against current->domain? > > Good idea. > >> >>> + while ( dom_state_changed ) >>> + { >>> + dom = find_first_bit(dom_state_changed, DOMID_MASK + 1); >>> + if ( dom >= DOMID_FIRST_RESERVED ) >>> + break; >>> + if ( test_and_clear_bit(dom, dom_state_changed) ) >> >> As this is now running under lock, does it really need to be test-and-clear? >> What mechanism would allow the flag to be cleared between the find-1st and >> here? Plus, like for patch 4, I think it could be __clear_bit() here. > > It is only under read_lock(), so there are concurrent calls possible. > I don't think we want to use write_lock() here, do we? Probably not; I have to admit I didn't even pay attention to this aspect. Then the set_bit() in domain_changed_state() also need to remain as is (in patch 4 I think it was). Jan
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |