[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v5] altp2m: Allow shared entries to be copied to altp2m views during lazycopy
On Mon, Jul 25, 2016 at 9:58 AM, George Dunlap <george.dunlap@xxxxxxxxxx> wrote: > On Wed, Jul 20, 2016 at 7:55 PM, Tamas K Lengyel > <tamas.lengyel@xxxxxxxxxxxx> wrote: >> Move sharing locks above altp2m to avoid locking order violation and crashing >> the hypervisor during unsharing operations when altp2m is active. >> >> Applying mem_access settings or remapping gfns in altp2m views will >> automatically unshare the page if it was shared previously. Also, >> disallow nominating pages for which there are pre-existing altp2m >> mem_access settings or remappings present. However, allow altp2m >> to populate altp2m views with shared entries during lazycopy as >> unsharing will automatically propagate the change to these entries in >> altp2m views as well. >> >> Signed-off-by: Tamas K Lengyel <tamas.lengyel@xxxxxxxxxxxx> > > This looks a lot better. One comment... > >> --- >> Cc: George Dunlap <george.dunlap@xxxxxxxxxxxxx> >> Cc: Jan Beulich <jbeulich@xxxxxxxx> >> Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> >> >> v5: Allow only lazycopy to copy shared entries to altp2m views >> Use get_gfn_type_access for unsharing as get_entry doesn't do that >> --- >> xen/arch/x86/mm/mem_sharing.c | 25 ++++++++++++++++++++++++- >> xen/arch/x86/mm/mm-locks.h | 30 +++++++++++++++--------------- >> xen/arch/x86/mm/p2m.c | 12 +++++++----- >> 3 files changed, 46 insertions(+), 21 deletions(-) >> >> diff --git a/xen/arch/x86/mm/mem_sharing.c b/xen/arch/x86/mm/mem_sharing.c >> index a522423..3939cd0 100644 >> --- a/xen/arch/x86/mm/mem_sharing.c >> +++ b/xen/arch/x86/mm/mem_sharing.c >> @@ -33,6 +33,7 @@ >> #include <asm/page.h> >> #include <asm/string.h> >> #include <asm/p2m.h> >> +#include <asm/altp2m.h> >> #include <asm/atomic.h> >> #include <asm/event.h> >> #include <xsm/xsm.h> >> @@ -828,20 +829,42 @@ int mem_sharing_nominate_page(struct domain *d, >> int expected_refcnt, >> shr_handle_t *phandle) >> { >> + struct p2m_domain *hp2m = p2m_get_hostp2m(d); >> p2m_type_t p2mt; >> + p2m_access_t p2ma; >> mfn_t mfn; >> struct page_info *page = NULL; /* gcc... */ >> int ret; >> >> *phandle = 0UL; >> >> - mfn = get_gfn(d, gfn, &p2mt); >> + mfn = get_gfn_type_access(hp2m, gfn, &p2mt, &p2ma, 0, NULL); >> >> /* Check if mfn is valid */ >> ret = -EINVAL; >> if ( !mfn_valid(mfn) ) >> goto out; >> >> + /* Check if there are mem_access/remapped altp2m entries for this page >> */ >> + if ( altp2m_active(d) ) >> + { >> + unsigned int i; >> + struct p2m_domain *ap2m; >> + mfn_t amfn; >> + p2m_access_t ap2ma; >> + >> + for ( i = 0; i < MAX_ALTP2M; i++ ) >> + { >> + ap2m = d->arch.altp2m_p2m[i]; >> + if ( !ap2m ) >> + continue; >> + >> + amfn = get_gfn_type_access(ap2m, gfn, NULL, &ap2ma, 0, NULL); >> + if ( mfn_valid(amfn) && (mfn_x(amfn) != mfn_x(mfn) || ap2ma != >> p2ma) ) >> + goto out; >> + } > > You need to altp2m_list_[un]lock(d) around this loop, don't you? Ah yes, that's right. > > Everything else looks great, thanks. Awesome! Thanks, Tamas _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx https://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |