On Sat Jul 19, 2025 at 1:45 AM CEST, dmkhn wrote: > On Fri, Jul 18, 2025 at 01:04:56PM +0200, Alejandro Vallejo wrote: >> Hi, >> >> I like the new encapsulation, but I have a few questions. >> >> On Wed Jul 16, 2025 at 4:04 AM CEST, dmukhin wrote: >> > From: Denis Mukhin <dmuk...@ford.com> >> > >> > Introduce domain_console for grouping data structures used for integrating >> > domain's diagnostic console with Xen's console driver. >> > >> > Group all pbuf-related data structures under domain_console. Rename the >> > moved >> > fields to plain .buf, .idx and .lock names, since all uses of the fields >> > are >> > touched. >> > >> > Bump the domain console buffer allocation size to 256. No extra symbol for >> > the >> > value since it is used only once during data structure declaration. All >> > size >> > checks use ARRAY_SIZE(). >> > >> > Allocate domain_console from the heap so that the parent domain struct size >> > stays below PAGE_SIZE boundary to account for more console-related fields >> > added in the future. >> > >> > Finally, update the domain_console allocation and initialization code. >> > >> > No functional change. >> > >> > Signed-off-by: Denis Mukhin <dmuk...@ford.com> >> > --- >> > Changes since v7: >> > - use ARRAY_SIZE() for cons->buf checks >> > - update the commit message >> > --- >> > xen/arch/arm/vpl011.c | 2 +- >> > xen/arch/x86/hvm/hvm.c | 18 ++++++++++-------- >> > xen/arch/x86/pv/shim.c | 2 +- >> > xen/common/domain.c | 19 +++++++++---------- >> > xen/drivers/char/console.c | 21 +++++++++++---------- >> > xen/include/xen/sched.h | 22 ++++++++++++---------- >> > 6 files changed, 44 insertions(+), 40 deletions(-) >> > >> > diff --git a/xen/arch/arm/vpl011.c b/xen/arch/arm/vpl011.c >> > index 480fc664fc62..d0d17c76b72c 100644 >> > --- a/xen/arch/arm/vpl011.c >> > +++ b/xen/arch/arm/vpl011.c >> > @@ -713,7 +713,7 @@ int domain_vpl011_init(struct domain *d, struct >> > vpl011_init_info *info) >> > } >> > else >> > { >> > - d->console.input_allowed = true; >> > + d->console->input_allowed = true; >> > vpl011->backend_in_domain = false; >> > >> > vpl011->backend.xen = xzalloc(struct vpl011_xen_backend); >> > diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c >> > index 56c7de39778b..684d2c0c195c 100644 >> > --- a/xen/arch/x86/hvm/hvm.c >> > +++ b/xen/arch/x86/hvm/hvm.c >> > @@ -559,7 +559,8 @@ void hvm_do_resume(struct vcpu *v) >> > static int cf_check hvm_print_line( >> > int dir, unsigned int port, unsigned int bytes, uint32_t *val) >> > { >> > - struct domain *cd = current->domain; >> > + const struct domain *d = current->domain; >> > + struct domain_console *cons = d->console; >> > char c = *val; >> > >> > ASSERT(bytes == 1 && port == XEN_HVM_DEBUGCONS_IOPORT); >> > @@ -571,16 +572,17 @@ static int cf_check hvm_print_line( >> > if ( !is_console_printable(c) ) >> > return X86EMUL_OKAY; >> > >> > - spin_lock(&cd->pbuf_lock); >> > + spin_lock(&cons->lock); >> > + ASSERT(cons->idx < ARRAY_SIZE(cons->buf)); >> > if ( c != '\n' ) >> > - cd->pbuf[cd->pbuf_idx++] = c; >> > - if ( (cd->pbuf_idx == (DOMAIN_PBUF_SIZE - 1)) || (c == '\n') ) >> > + cons->buf[cons->idx++] = c; >> > + if ( (cons->idx == (ARRAY_SIZE(cons->buf) - 1)) || (c == '\n') ) >> > { >> > - cd->pbuf[cd->pbuf_idx] = '\0'; >> > - guest_printk(cd, XENLOG_G_DEBUG "%s\n", cd->pbuf); >> > - cd->pbuf_idx = 0; >> > + cons->buf[cons->idx] = '\0'; >> > + guest_printk(d, XENLOG_G_DEBUG "%s\n", cons->buf); >> > + cons->idx = 0; >> > } >> > - spin_unlock(&cd->pbuf_lock); >> > + spin_unlock(&cons->lock); >> > >> > return X86EMUL_OKAY; >> > } >> > diff --git a/xen/arch/x86/pv/shim.c b/xen/arch/x86/pv/shim.c >> > index bc2a7dd5fae5..bd29c53a2d34 100644 >> > --- a/xen/arch/x86/pv/shim.c >> > +++ b/xen/arch/x86/pv/shim.c >> > @@ -239,7 +239,7 @@ void __init pv_shim_setup_dom(struct domain *d, >> > l4_pgentry_t *l4start, >> > */ >> > d->max_pages = domain_tot_pages(d); >> > >> > - d->console.input_allowed = true; >> > + d->console->input_allowed = true; >> > } >> > >> > static void write_start_info(struct domain *d) >> > diff --git a/xen/common/domain.c b/xen/common/domain.c >> > index 303c338ef293..caef4cc8d649 100644 >> > --- a/xen/common/domain.c >> > +++ b/xen/common/domain.c >> > @@ -669,7 +669,7 @@ static void _domain_destroy(struct domain *d) >> > BUG_ON(!d->is_dying); >> > BUG_ON(atomic_read(&d->refcnt) != DOMAIN_DESTROYED); >> > >> > - xfree(d->pbuf); >> > + xvfree(d->console); >> >> XVFREE() to avoid a dangling pointer. But look at the end. I'd just remove >> the >> pointer altogether. >> >> > >> > argo_destroy(d); >> > >> > @@ -835,8 +835,6 @@ struct domain *domain_create(domid_t domid, >> > flags |= CDF_hardware; >> > if ( old_hwdom ) >> > old_hwdom->cdf &= ~CDF_hardware; >> > - >> > - d->console.input_allowed = true; >> > } >> > >> > /* Holding CDF_* internal flags. */ >> > @@ -866,8 +864,6 @@ struct domain *domain_create(domid_t domid, >> > spin_lock_init(&d->shutdown_lock); >> > d->shutdown_code = SHUTDOWN_CODE_INVALID; >> > >> > - spin_lock_init(&d->pbuf_lock); >> > - >> > rwlock_init(&d->vnuma_rwlock); >> > >> > #ifdef CONFIG_HAS_PCI >> > @@ -877,6 +873,14 @@ struct domain *domain_create(domid_t domid, >> > >> > /* All error paths can depend on the above setup. */ >> > >> > + err = -ENOMEM; >> > + d->console = xvzalloc(typeof(*d->console)); >> > + if ( !d->console ) >> > + goto fail; >> > + >> > + spin_lock_init(&d->console->lock); >> > + d->console->input_allowed = is_hardware_domain(d); >> > + >> > /* >> > * Allocate d->vcpu[] and set ->max_vcpus up early. Various >> > per-domain >> > * resources want to be sized based on max_vcpus. >> > @@ -959,11 +963,6 @@ struct domain *domain_create(domid_t domid, >> > if ( (err = argo_init(d)) != 0 ) >> > goto fail; >> > >> > - err = -ENOMEM; >> > - d->pbuf = xzalloc_array(char, DOMAIN_PBUF_SIZE); >> > - if ( !d->pbuf ) >> > - goto fail; >> > - >> > if ( (err = sched_init_domain(d, config->cpupool_id)) != 0 ) >> > goto fail; >> > >> > diff --git a/xen/drivers/char/console.c b/xen/drivers/char/console.c >> > index ba5a809a99fb..b0d50a910e27 100644 >> > --- a/xen/drivers/char/console.c >> > +++ b/xen/drivers/char/console.c >> > @@ -521,7 +521,7 @@ struct domain *console_get_domain(void) >> > if ( !d ) >> > return NULL; >> > >> > - if ( d->console.input_allowed ) >> > + if ( d->console->input_allowed ) >> > return d; >> > >> > rcu_unlock_domain(d); >> > @@ -564,7 +564,7 @@ static void console_switch_input(void) >> > { >> > rcu_unlock_domain(d); >> > >> > - if ( !d->console.input_allowed ) >> > + if ( !d->console->input_allowed ) >> > continue; >> > >> > console_rx = next_rx; >> > @@ -744,6 +744,7 @@ static long >> > guest_console_write(XEN_GUEST_HANDLE_PARAM(char) buffer, >> > else >> > { >> > char *kin = kbuf, *kout = kbuf, c; >> > + struct domain_console *cons = cd->console; >> > >> > /* Strip non-printable characters */ >> > do >> > @@ -756,22 +757,22 @@ static long >> > guest_console_write(XEN_GUEST_HANDLE_PARAM(char) buffer, >> > } while ( --kcount > 0 ); >> > >> > *kout = '\0'; >> > - spin_lock(&cd->pbuf_lock); >> > + spin_lock(&cons->lock); >> > kcount = kin - kbuf; >> > if ( c != '\n' && >> > - (cd->pbuf_idx + (kout - kbuf) < (DOMAIN_PBUF_SIZE - 1)) ) >> > + (cons->idx + (kout - kbuf) < (ARRAY_SIZE(cons->buf) - >> > 1)) ) >> > { >> > /* buffer the output until a newline */ >> > - memcpy(cd->pbuf + cd->pbuf_idx, kbuf, kout - kbuf); >> > - cd->pbuf_idx += (kout - kbuf); >> > + memcpy(cons->buf + cons->idx, kbuf, kout - kbuf); >> > + cons->idx += kout - kbuf; >> > } >> > else >> > { >> > - cd->pbuf[cd->pbuf_idx] = '\0'; >> > - guest_printk(cd, XENLOG_G_DEBUG "%s%s\n", cd->pbuf, kbuf); >> > - cd->pbuf_idx = 0; >> > + cons->buf[cons->idx] = '\0'; >> > + guest_printk(cd, XENLOG_G_DEBUG "%s%s\n", cons->buf, >> > kbuf); >> > + cons->idx = 0; >> > } >> > - spin_unlock(&cd->pbuf_lock); >> > + spin_unlock(&cons->lock); >> > } >> > >> > guest_handle_add_offset(buffer, kcount); >> > diff --git a/xen/include/xen/sched.h b/xen/include/xen/sched.h >> > index fe53d4fab7ba..f7bb44328bbc 100644 >> > --- a/xen/include/xen/sched.h >> > +++ b/xen/include/xen/sched.h >> > @@ -371,6 +371,17 @@ struct evtchn_port_ops; >> > >> > #define MAX_NR_IOREQ_SERVERS 8 >> > >> > +/* Domain console settings. */ >> > +struct domain_console { >> > + /* Permission to take ownership of the physical console input. */ >> > + bool input_allowed; >> > + >> > + /* hvm_print_line() and guest_console_write() logging. */ >> > + unsigned int idx; >> > + spinlock_t lock; >> > + char buf[256]; >> >> I'd rather see things a bit shuffled. Like: >> >> /* hvm_print_line() and guest_console_write() logging. */ >> spinlock_t lock; >> unsigned int idx; >> char buf[255]; >> >> /* Permission to take ownership of the physical console input. */ >> bool input_allowed; >> >> That way the struct is fully packed (note the s/256/255/) and input_allowed >> remains visually away from the other group of fields. >> input_allowed remains away from the lock, indicating that input_allowed >> >> Note that the lock is 64bit aligned when CONFIG_DEBUG_LOCK_PROFILE is set. >> >> Thoughts? > > I can do that, no problem! > >> >> > +}; >> > + >> > struct domain >> > { >> > domid_t domain_id; >> > @@ -562,12 +573,6 @@ struct domain >> > /* Control-plane tools handle for this domain. */ >> > xen_domain_handle_t handle; >> > >> > - /* hvm_print_line() and guest_console_write() logging. */ >> > -#define DOMAIN_PBUF_SIZE 200 >> > - char *pbuf; >> > - unsigned int pbuf_idx; >> > - spinlock_t pbuf_lock; >> > - >> > /* OProfile support. */ >> > struct xenoprof *xenoprof; >> > >> > @@ -653,10 +658,7 @@ struct domain >> > #endif >> > >> > /* Console settings. */ >> > - struct { >> > - /* Permission to take ownership of the physical console input. */ >> > - bool input_allowed; >> > - } console; >> > + struct domain_console *console; >> >> Why a pointer? domain_console is a fixed-size type, so unless the domain is >> overflowing PAGE_SIZE (which we very definitely don't want either) I'd >> consider >> making it a regular member Simplifies memory management too. No alloc/free >> nor >> potential dangling pointers. > > domain_console may grow in the future wrt console focus and further vUART > management changes, that's why I moved the entire stuct to be heap-allocated. > > Let me redo that.
Actually, don't. Thinking some more about it, this is confidential data we'll want out for ASI, so it's easier to spot if it's still a x*alloc'ed. nvm about it. Sorry for the headache! Cheers, Alejandro