Message ID | 20200915161800.1384-7-paul@xen.org (mailing list archive) |
---|---|
State | Superseded |
Headers | show |
Series | domain context infrastructure | expand |
On 15.09.2020 18:17, Paul Durrant wrote: > +static int load_shared_info(struct domain *d, struct domain_context *c) > +{ > + struct domain_shared_info_context ctxt; > + size_t hdr_size = offsetof(typeof(ctxt), buffer); > + unsigned int i; > + int rc; > + > + rc = DOMAIN_LOAD_BEGIN(SHARED_INFO, c, &i); > + if ( rc ) > + return rc; > + > + if ( i ) /* expect only a single instance */ > + return -ENXIO; > + > + rc = domain_load_data(c, &ctxt, hdr_size); > + if ( rc ) > + return rc; > + > + if ( ctxt.buffer_size > sizeof(shared_info_t) || > + (ctxt.flags & ~DOMAIN_SAVE_32BIT_SHINFO) ) > + return -EINVAL; > + > + if ( ctxt.flags & DOMAIN_SAVE_32BIT_SHINFO ) > + { > +#ifdef CONFIG_COMPAT > + has_32bit_shinfo(d) = true; > +#else > + return -EINVAL; > +#endif > + } > + > + if ( is_pv_domain(d) ) > + { > + shared_info_t *shinfo = xmalloc(shared_info_t); > + > + rc = domain_load_data(c, shinfo, sizeof(*shinfo)); You need to check the allocation's success first. But of course the question is why you don't read directly into d->shared_info. The domain is paused at this point, isn't it? > + if ( rc ) > + { > + xfree(shinfo); > + return rc; > + } > + > +#ifdef CONFIG_COMPAT > + if ( has_32bit_shinfo(d) ) > + { > + memcpy(&d->shared_info->compat.vcpu_info, > + &shinfo->compat.vcpu_info, > + sizeof(d->shared_info->compat.vcpu_info)); > + memcpy(&d->shared_info->compat.arch, > + &shinfo->compat.arch, > + sizeof(d->shared_info->compat.vcpu_info)); > + memset(&d->shared_info->compat.evtchn_pending, > + 0, > + sizeof(d->shared_info->compat.evtchn_pending)); > + memset(&d->shared_info->compat.evtchn_mask, > + 0xff, > + sizeof(d->shared_info->compat.evtchn_mask)); > + > + d->shared_info->compat.arch.pfn_to_mfn_frame_list_list = 0; > + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) > + d->shared_info->compat.vcpu_info[i].evtchn_pending_sel = 0; > + } > + else > + { > + memcpy(&d->shared_info->native.vcpu_info, > + &shinfo->native.vcpu_info, > + sizeof(d->shared_info->native.vcpu_info)); > + memcpy(&d->shared_info->native.arch, > + &shinfo->native.arch, > + sizeof(d->shared_info->native.arch)); > + memset(&d->shared_info->native.evtchn_pending, > + 0, > + sizeof(d->shared_info->compat.evtchn_pending)); > + memset(&d->shared_info->native.evtchn_mask, > + 0xff, > + sizeof(d->shared_info->native.evtchn_mask)); > + > + d->shared_info->native.arch.pfn_to_mfn_frame_list_list = 0; > + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) > + d->shared_info->native.vcpu_info[i].evtchn_pending_sel = 0; > + } > +#else > + memcpy(&d->shared_info->vcpu_info, > + &shinfo->vcpu_info, > + sizeof(d->shared_info->vcpu_info)); > + memcpy(&d->shared_info->arch, > + &shinfo->arch, > + sizeof(d->shared_info->shared)); > + memset(&d->shared_info->evtchn_pending, > + 0, > + sizeof(d->shared_info->evtchn_pending)); > + memset(&d->shared_info->evtchn_mask, > + 0xff, > + sizeof(d->shared_info->evtchn_mask)); > + > + d->shared_info.arch.pfn_to_mfn_frame_list_list = 0; > + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) > + d->shared_info.vcpu_info[i].evtchn_pending_sel = 0; > +#endif A lot of redundancy; maybe it gets better if indeed you stop reading into an intermediate buffer. > + xfree(shinfo); > + > + rc = domain_load_end(c, false); > + } > + else > + rc = domain_load_end(c, true); Perhaps at least a brief comment here wouldn't hurt regarding the needs (or lack thereof) for HVM / Arm? Jan
> -----Original Message----- > From: Jan Beulich <jbeulich@suse.com> > Sent: 16 September 2020 15:43 > To: Paul Durrant <paul@xen.org> > Cc: xen-devel@lists.xenproject.org; Durrant, Paul <pdurrant@amazon.co.uk>; Ian Jackson > <ian.jackson@eu.citrix.com>; Wei Liu <wl@xen.org>; Andrew Cooper <andrew.cooper3@citrix.com>; George > Dunlap <george.dunlap@citrix.com>; Julien Grall <julien@xen.org>; Stefano Stabellini > <sstabellini@kernel.org> > Subject: RE: [EXTERNAL] [PATCH v8 6/8] common/domain: add a domain context record for shared_info... > > CAUTION: This email originated from outside of the organization. Do not click links or open > attachments unless you can confirm the sender and know the content is safe. > > > > On 15.09.2020 18:17, Paul Durrant wrote: > > +static int load_shared_info(struct domain *d, struct domain_context *c) > > +{ > > + struct domain_shared_info_context ctxt; > > + size_t hdr_size = offsetof(typeof(ctxt), buffer); > > + unsigned int i; > > + int rc; > > + > > + rc = DOMAIN_LOAD_BEGIN(SHARED_INFO, c, &i); > > + if ( rc ) > > + return rc; > > + > > + if ( i ) /* expect only a single instance */ > > + return -ENXIO; > > + > > + rc = domain_load_data(c, &ctxt, hdr_size); > > + if ( rc ) > > + return rc; > > + > > + if ( ctxt.buffer_size > sizeof(shared_info_t) || > > + (ctxt.flags & ~DOMAIN_SAVE_32BIT_SHINFO) ) > > + return -EINVAL; > > + > > + if ( ctxt.flags & DOMAIN_SAVE_32BIT_SHINFO ) > > + { > > +#ifdef CONFIG_COMPAT > > + has_32bit_shinfo(d) = true; > > +#else > > + return -EINVAL; > > +#endif > > + } > > + > > + if ( is_pv_domain(d) ) > > + { > > + shared_info_t *shinfo = xmalloc(shared_info_t); > > + > > + rc = domain_load_data(c, shinfo, sizeof(*shinfo)); > > You need to check the allocation's success first. Oops, yes. > But of course the > question is why you don't read directly into d->shared_info. The > domain is paused at this point, isn't it? > It is, but domain_create() may have initialized something outside of the areas we want to touch; I'm trying to follow what the existing restore code in toolstack currently does. > > + if ( rc ) > > + { > > + xfree(shinfo); > > + return rc; > > + } > > + > > +#ifdef CONFIG_COMPAT > > + if ( has_32bit_shinfo(d) ) > > + { > > + memcpy(&d->shared_info->compat.vcpu_info, > > + &shinfo->compat.vcpu_info, > > + sizeof(d->shared_info->compat.vcpu_info)); > > + memcpy(&d->shared_info->compat.arch, > > + &shinfo->compat.arch, > > + sizeof(d->shared_info->compat.vcpu_info)); > > + memset(&d->shared_info->compat.evtchn_pending, > > + 0, > > + sizeof(d->shared_info->compat.evtchn_pending)); > > + memset(&d->shared_info->compat.evtchn_mask, > > + 0xff, > > + sizeof(d->shared_info->compat.evtchn_mask)); > > + > > + d->shared_info->compat.arch.pfn_to_mfn_frame_list_list = 0; > > + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) > > + d->shared_info->compat.vcpu_info[i].evtchn_pending_sel = 0; > > + } > > + else > > + { > > + memcpy(&d->shared_info->native.vcpu_info, > > + &shinfo->native.vcpu_info, > > + sizeof(d->shared_info->native.vcpu_info)); > > + memcpy(&d->shared_info->native.arch, > > + &shinfo->native.arch, > > + sizeof(d->shared_info->native.arch)); > > + memset(&d->shared_info->native.evtchn_pending, > > + 0, > > + sizeof(d->shared_info->compat.evtchn_pending)); > > + memset(&d->shared_info->native.evtchn_mask, > > + 0xff, > > + sizeof(d->shared_info->native.evtchn_mask)); > > + > > + d->shared_info->native.arch.pfn_to_mfn_frame_list_list = 0; > > + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) > > + d->shared_info->native.vcpu_info[i].evtchn_pending_sel = 0; > > + } > > +#else > > + memcpy(&d->shared_info->vcpu_info, > > + &shinfo->vcpu_info, > > + sizeof(d->shared_info->vcpu_info)); > > + memcpy(&d->shared_info->arch, > > + &shinfo->arch, > > + sizeof(d->shared_info->shared)); > > + memset(&d->shared_info->evtchn_pending, > > + 0, > > + sizeof(d->shared_info->evtchn_pending)); > > + memset(&d->shared_info->evtchn_mask, > > + 0xff, > > + sizeof(d->shared_info->evtchn_mask)); > > + > > + d->shared_info.arch.pfn_to_mfn_frame_list_list = 0; > > + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) > > + d->shared_info.vcpu_info[i].evtchn_pending_sel = 0; > > +#endif > > A lot of redundancy; maybe it gets better if indeed you stop reading > into an intermediate buffer. As I said above, I think it is better if I continue to use an intermediate buffer but I'll see if I can add some macro magic to make this less verbose. > > > + xfree(shinfo); > > + > > + rc = domain_load_end(c, false); > > + } > > + else > > + rc = domain_load_end(c, true); > > Perhaps at least a brief comment here wouldn't hurt regarding the > needs (or lack thereof) for HVM / Arm? > Ok. Paul > Jan
diff --git a/tools/misc/xen-domctx.c b/tools/misc/xen-domctx.c index 243325dfce..6ead7ea89d 100644 --- a/tools/misc/xen-domctx.c +++ b/tools/misc/xen-domctx.c @@ -31,6 +31,7 @@ #include <errno.h> #include <xenctrl.h> +#include <xen-tools/libs.h> #include <xen/xen.h> #include <xen/domctl.h> #include <xen/save.h> @@ -61,6 +62,82 @@ static void dump_header(void) } +static void print_binary(const char *prefix, const void *val, size_t size, + const char *suffix) +{ + printf("%s", prefix); + + while ( size-- ) + { + uint8_t octet = *(const uint8_t *)val++; + unsigned int i; + + for ( i = 0; i < 8; i++ ) + { + printf("%u", octet & 1); + octet >>= 1; + } + } + + printf("%s", suffix); +} + +static void dump_shared_info(void) +{ + DOMAIN_SAVE_TYPE(SHARED_INFO) *s; + bool has_32bit_shinfo; + shared_info_any_t *info; + unsigned int i, n; + + GET_PTR(s); + has_32bit_shinfo = s->flags & DOMAIN_SAVE_32BIT_SHINFO; + + printf(" SHARED_INFO: has_32bit_shinfo: %s buffer_size: %u\n", + has_32bit_shinfo ? "true" : "false", s->buffer_size); + + info = (shared_info_any_t *)s->buffer; + +#define GET_FIELD_PTR(_f) \ + (has_32bit_shinfo ? \ + (const void *)&(info->x32._f) : \ + (const void *)&(info->x64._f)) +#define GET_FIELD_SIZE(_f) \ + (has_32bit_shinfo ? sizeof(info->x32._f) : sizeof(info->x64._f)) +#define GET_FIELD(_f) \ + (has_32bit_shinfo ? info->x32._f : info->x64._f) + + n = has_32bit_shinfo ? + ARRAY_SIZE(info->x32.evtchn_pending) : + ARRAY_SIZE(info->x64.evtchn_pending); + + for ( i = 0; i < n; i++ ) + { + const char *prefix = !i ? + " evtchn_pending: " : + " "; + + print_binary(prefix, GET_FIELD_PTR(evtchn_pending[0]), + GET_FIELD_SIZE(evtchn_pending[0]), "\n"); + } + + for ( i = 0; i < n; i++ ) + { + const char *prefix = !i ? + " evtchn_mask: " : + " "; + + print_binary(prefix, GET_FIELD_PTR(evtchn_mask[0]), + GET_FIELD_SIZE(evtchn_mask[0]), "\n"); + } + + printf(" wc: version: %u sec: %u nsec: %u\n", + GET_FIELD(wc_version), GET_FIELD(wc_sec), GET_FIELD(wc_nsec)); + +#undef GET_FIELD +#undef GET_FIELD_SIZE +#undef GET_FIELD_PTR +} + static void dump_end(void) { DOMAIN_SAVE_TYPE(END) *e; @@ -173,6 +250,7 @@ int main(int argc, char **argv) switch (desc->typecode) { case DOMAIN_SAVE_CODE(HEADER): dump_header(); break; + case DOMAIN_SAVE_CODE(SHARED_INFO): dump_shared_info(); break; case DOMAIN_SAVE_CODE(END): dump_end(); break; default: printf("Unknown type %u: skipping\n", desc->typecode); diff --git a/xen/common/domain.c b/xen/common/domain.c index f0f9c62feb..2375e250af 100644 --- a/xen/common/domain.c +++ b/xen/common/domain.c @@ -33,6 +33,7 @@ #include <xen/xenoprof.h> #include <xen/irq.h> #include <xen/argo.h> +#include <xen/save.h> #include <asm/debugger.h> #include <asm/p2m.h> #include <asm/processor.h> @@ -1659,6 +1660,149 @@ int continue_hypercall_on_cpu( return 0; } +static int save_shared_info(const struct domain *d, struct domain_context *c, + bool dry_run) +{ + struct domain_shared_info_context ctxt = { +#ifdef CONFIG_COMPAT + .flags = has_32bit_shinfo(d) ? DOMAIN_SAVE_32BIT_SHINFO : 0, + .buffer_size = has_32bit_shinfo(d) ? + sizeof(struct compat_shared_info) : + sizeof(struct shared_info), +#else + .buffer_size = sizeof(struct shared_info), +#endif + }; + size_t hdr_size = offsetof(typeof(ctxt), buffer); + int rc; + + rc = DOMAIN_SAVE_BEGIN(SHARED_INFO, c, 0); + if ( rc ) + return rc; + + rc = domain_save_data(c, &ctxt, hdr_size); + if ( rc ) + return rc; + + rc = domain_save_data(c, d->shared_info, ctxt.buffer_size); + if ( rc ) + return rc; + + return domain_save_end(c); +} + +static int load_shared_info(struct domain *d, struct domain_context *c) +{ + struct domain_shared_info_context ctxt; + size_t hdr_size = offsetof(typeof(ctxt), buffer); + unsigned int i; + int rc; + + rc = DOMAIN_LOAD_BEGIN(SHARED_INFO, c, &i); + if ( rc ) + return rc; + + if ( i ) /* expect only a single instance */ + return -ENXIO; + + rc = domain_load_data(c, &ctxt, hdr_size); + if ( rc ) + return rc; + + if ( ctxt.buffer_size > sizeof(shared_info_t) || + (ctxt.flags & ~DOMAIN_SAVE_32BIT_SHINFO) ) + return -EINVAL; + + if ( ctxt.flags & DOMAIN_SAVE_32BIT_SHINFO ) + { +#ifdef CONFIG_COMPAT + has_32bit_shinfo(d) = true; +#else + return -EINVAL; +#endif + } + + if ( is_pv_domain(d) ) + { + shared_info_t *shinfo = xmalloc(shared_info_t); + + rc = domain_load_data(c, shinfo, sizeof(*shinfo)); + if ( rc ) + { + xfree(shinfo); + return rc; + } + +#ifdef CONFIG_COMPAT + if ( has_32bit_shinfo(d) ) + { + memcpy(&d->shared_info->compat.vcpu_info, + &shinfo->compat.vcpu_info, + sizeof(d->shared_info->compat.vcpu_info)); + memcpy(&d->shared_info->compat.arch, + &shinfo->compat.arch, + sizeof(d->shared_info->compat.vcpu_info)); + memset(&d->shared_info->compat.evtchn_pending, + 0, + sizeof(d->shared_info->compat.evtchn_pending)); + memset(&d->shared_info->compat.evtchn_mask, + 0xff, + sizeof(d->shared_info->compat.evtchn_mask)); + + d->shared_info->compat.arch.pfn_to_mfn_frame_list_list = 0; + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) + d->shared_info->compat.vcpu_info[i].evtchn_pending_sel = 0; + } + else + { + memcpy(&d->shared_info->native.vcpu_info, + &shinfo->native.vcpu_info, + sizeof(d->shared_info->native.vcpu_info)); + memcpy(&d->shared_info->native.arch, + &shinfo->native.arch, + sizeof(d->shared_info->native.arch)); + memset(&d->shared_info->native.evtchn_pending, + 0, + sizeof(d->shared_info->compat.evtchn_pending)); + memset(&d->shared_info->native.evtchn_mask, + 0xff, + sizeof(d->shared_info->native.evtchn_mask)); + + d->shared_info->native.arch.pfn_to_mfn_frame_list_list = 0; + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) + d->shared_info->native.vcpu_info[i].evtchn_pending_sel = 0; + } +#else + memcpy(&d->shared_info->vcpu_info, + &shinfo->vcpu_info, + sizeof(d->shared_info->vcpu_info)); + memcpy(&d->shared_info->arch, + &shinfo->arch, + sizeof(d->shared_info->shared)); + memset(&d->shared_info->evtchn_pending, + 0, + sizeof(d->shared_info->evtchn_pending)); + memset(&d->shared_info->evtchn_mask, + 0xff, + sizeof(d->shared_info->evtchn_mask)); + + d->shared_info.arch.pfn_to_mfn_frame_list_list = 0; + for ( i = 0; i < XEN_LEGACY_MAX_VCPUS; i++ ) + d->shared_info.vcpu_info[i].evtchn_pending_sel = 0; +#endif + + xfree(shinfo); + + rc = domain_load_end(c, false); + } + else + rc = domain_load_end(c, true); + + return rc; +} + +DOMAIN_REGISTER_SAVE_LOAD(SHARED_INFO, save_shared_info, load_shared_info); + /* * Local variables: * mode: C diff --git a/xen/include/public/save.h b/xen/include/public/save.h index 551dbbddb8..0e855a4b97 100644 --- a/xen/include/public/save.h +++ b/xen/include/public/save.h @@ -82,7 +82,18 @@ struct domain_save_header { }; DECLARE_DOMAIN_SAVE_TYPE(HEADER, 1, struct domain_save_header); -#define DOMAIN_SAVE_CODE_MAX 1 +struct domain_shared_info_context { + uint32_t flags; + +#define DOMAIN_SAVE_32BIT_SHINFO 0x00000001 + + uint32_t buffer_size; + uint8_t buffer[XEN_FLEX_ARRAY_DIM]; /* Implementation specific size */ +}; + +DECLARE_DOMAIN_SAVE_TYPE(SHARED_INFO, 2, struct domain_shared_info_context); + +#define DOMAIN_SAVE_CODE_MAX 2 #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */