[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v4 3/3] domctl: Modify XEN_DOMCTL_getdomaininfo to fail if domid is not found


  • To: Jan Beulich <jbeulich@xxxxxxxx>, Alejandro Vallejo <alejandro.vallejo@xxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Thu, 11 May 2023 11:45:54 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=KxhnbEX/WYVe0e0YY1SVJfAqgcBhhNlrdLM7udmvtC0=; b=g8nIlilA86JH4mYbsIenmRVlr4zL/HGHzVzJdEvVXgfutKfHRgJ9rN2jcPqJwoIOZcwj5vfy/1+dFdQ2gbvs+dC6oAbF5Pg9KxBLee6GUEd948NTn+OX6YMPYRWgM4TD6YYiRM1I/1MOL20QO8f8/9OS5SOynq9mUWRfe+7jnsXKOTtT4xCM/ViUBfmejY4rJW7WG6QXDAdnpquJwnjwJiUvEeLKUuRhXa5cy5u+25QampRU7/+ZToJ+OCh3n/uVEHj40yrMv+Yy5pJERGG3n8oFMjYocEVMDt6hG9KWqpSsc4GH2zF5dfmPG+lGLVJ6nYD7FQAtwduGKzgiYqKRXg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=UNbOsFgUe/UgxLJtCxTBruNW1YtAuC8uaAgmu8MzaAejmck+Ii1I1XJUzfFcnc/mgdDwObsSJqB0pXqKw+gwXq0ezbmzjs8bEvHnGe8RB1MG3qBjPcYtSUUFtXtrdk4gTGiFauAaUztErdJEjnMfX+OU2KnUiluDKr6zMgBvIwP+VlXIoWZUPUthLEHU7dEM8OUXaeYfR/5qjAFsN6VBHpcJf1E5igysTuqaD0Xj1wRrzS2UGxJkqT7m/rs+w5VYJ8dlxwKiaGMWcbf8nTGVdS5x1lBFW1O2b++MhmvmzaCP/eLLmhYB6W7z67AUIcFIt14vp7v0SEvncxKcNslagw==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=citrix.com;
  • Cc: Anthony PERARD <anthony.perard@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Thu, 11 May 2023 10:46:24 +0000
  • Ironport-data: A9a23:hu10KaxZYxJn2mVWxtx6t+fMxyrEfRIJ4+MujC+fZmUNrF6WrkUPn GJNCzyCOK2Na2uhL49wPY6xoR5Q7JDUnNM2S1dqrCAxQypGp/SeCIXCJC8cHc8wwu7rFxs7s ppEOrEsCOhuExcwcz/0auCJQUFUjP3OHfykTrafYEidfCc8IA85kxVvhuUltYBhhNm9Emult Mj75sbSIzdJ4RYtWo4vw//F+UIHUMja4mtC5QRjPKkT5jcyqlFOZH4hDfDpR5fHatE88t6SH 47r0Ly/92XFyBYhYvvNfmHTKxBirhb6ZGBiu1IOM0SQqkEqSh8ai87XAME0e0ZP4whlqvgqo Dl7WT5cfi9yVkHEsLx1vxC1iEiSN4UekFPMCSDXXcB+UyQq2pYjqhljJBheAGEWxgp4KV9j2 fs9FWoSVDSaqfyI0aiJQ+JQgtt2eaEHPKtH0p1h5RfwKK9+BLzmHeDN79Ie2yosjMdTG/qYf 9AedTdkcBXHZVtIJ0sTD5U92uyvgxETcRUB8A7T+fVxvjiVlVQquFTuGIO9ltiibMNZhEuH4 EnB+Hz0GEoyP92D0zuVtHmrg4cjmAuiAN1OTOzgra8CbFu7n28tIyQzFl+ButLhr2icWogcM WJO0397xUQ13AnxJjXnZDW6qnOZuh8XW/JLDvY3rgqKz8L86gKUBGECQiRGLsIvsMs7RzsC3 VuOgt+vDjtq2JWXVHac+7G8vT60fy8PIgcqfjQYRAEI593ipoAbjR/VSNtnVqmvgbXdBjXY0 z2M6i8kiN07j8ER0L6g1UvamD/qrZ/MJiYl6wOSUm+74wdRYI++e5fu+VXd9exHLouSUh+Gp ndspiSFxOUHDJXImCnTRuwIRemt/6zcaGaahkNzFZ488Tjr42SkYY1b/DB5IgFuL9oAfjjqJ kTUvGu9+aNuAZdjVocvC6rZNijg5fGI+QjNPhwMUudzXw==
  • Ironport-hdrordr: A9a23:lOxx8qGK6cpqOct8pLqE0seALOsnbusQ8zAXPiFKOH9om6mj/P xG88526faZslkssRIb+exoWpPvfZq0z/cci+Qs1NyZPTUO1lHYS71K3M/PxCDhBj271sM179 YHT0GmMqyUMbGtt7ef3OASKadD/OW6
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 11/05/2023 11:41 am, Jan Beulich wrote:
> On 09.05.2023 18:07, Alejandro Vallejo wrote:
>> --- a/xen/common/domctl.c
>> +++ b/xen/common/domctl.c
>> @@ -314,7 +314,7 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) 
>> u_domctl)
>>          /* fall through */
>>      default:
>>          d = rcu_lock_domain_by_id(op->domain);
>> -        if ( !d && op->cmd != XEN_DOMCTL_getdomaininfo )
>> +        if ( !d )
>>              return -ESRCH;
>>      }
>>  
>> @@ -534,42 +534,14 @@ long do_domctl(XEN_GUEST_HANDLE_PARAM(xen_domctl_t) 
>> u_domctl)
>>  
>>      case XEN_DOMCTL_getdomaininfo:
>>      {
>> -        domid_t dom = DOMID_INVALID;
>> -
>> -        if ( !d )
>> -        {
>> -            ret = -EINVAL;
>> -            if ( op->domain >= DOMID_FIRST_RESERVED )
>> -                break;
>> -
>> -            rcu_read_lock(&domlist_read_lock);
>> -
>> -            dom = op->domain;
>> -            for_each_domain ( d )
>> -                if ( d->domain_id >= dom )
>> -                    break;
>> -        }
>> -
>> -        ret = -ESRCH;
>> -        if ( d == NULL )
>> -            goto getdomaininfo_out;
>> -
>>          ret = xsm_getdomaininfo(XSM_HOOK, d);
>>          if ( ret )
>> -            goto getdomaininfo_out;
>> +            break;
>>  
>>          getdomaininfo(d, &op->u.getdomaininfo);
>>  
>>          op->domain = op->u.getdomaininfo.domain;
>>          copyback = 1;
>> -
>> -    getdomaininfo_out:
>> -        /* When d was non-NULL upon entry, no cleanup is needed. */
>> -        if ( dom == DOMID_INVALID )
>> -            break;
>> -
>> -        rcu_read_unlock(&domlist_read_lock);
>> -        d = NULL;
>>          break;
>>      }
>>  
> I realize it's a little late that this occurs to me, but this being a binary
> incompatible change it should imo have been accompanied by a bump of
> XEN_DOMCTL_INTERFACE_VERSION (which we haven't bumped yet in this release
> cycle).

Oh, sorry.  That's probably my fault.

Do you mind submitting a patch?

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.