[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH V12 4/5] p2m: Always use hostp2m when clipping rangesets
On 12/21/18 8:24 PM, George Dunlap wrote: > >> On Dec 20, 2018, at 5:38 PM, Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> >> wrote: >> >> The logdirty rangesets of the altp2ms need to be kept in sync with the >> hostp2m. This means when iterating through the altp2ms, we need to >> use the host p2m to clip the rangeset, not the indiviual altp2m's >> value. >> >> This change also: >> >> - Documents that the end is non-inclusive >> >> - Calculates an "inclusive" value for the end once, rather than >> open-coding the modification, and (worse) back-modifying updates so >> that the calculation ends up correct >> >> - Clarifies the logic deciding whether to call >> change_entry_type_global() or change_entry_type_range() >> >> - Handles the case where start >= hostp2m->max_mapped_pfn >> >> Signed-off-by: George Dunlap <george.dunlap@xxxxxxxxxx> >> Signed-off-by: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx> >> Tested-by: Tamas K Lengyel <tamas@xxxxxxxxxxxxx> >> >> --- >> CC: George Dunlap <george.dunlap@xxxxxxxxxxxxx> >> CC: Jan Beulich <jbeulich@xxxxxxxx> >> CC: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> >> CC: Wei Liu <wei.liu2@xxxxxxxxxx> >> CC: "Roger Pau Monné" <roger.pau@xxxxxxxxxx> >> >> --- >> Changes since V11: >> - Added end_exclusive, to avoid modifying function arguments. >> - Moved the if ( start >= host_max_pfn ) warning below the code >> doing the clipping. > > I’m afraid you misunderstood what I meant. > > Why would we want to give a warning only if start >= host_max_pfn? And if > the *start* was above host_max_pfn, why would we tell people we were > “clipping” the rangeset, when in fact we drop it entirely in that case? > > Rather, I meant this: > > — > diff --git a/xen/arch/x86/mm/p2m.c b/xen/arch/x86/mm/p2m.c > index f552fd5199..2af50af2bd 100644 > --- a/xen/arch/x86/mm/p2m.c > +++ b/xen/arch/x86/mm/p2m.c > @@ -1018,11 +1018,11 @@ static void change_type_range(struct p2m_domain *p2m, > * warning. > */ > if ( unlikely(end > host_max_pfn) ) > - end = host_max_pfn; > - > - if ( start >= host_max_pfn ) > + { > printk(XENLOG_G_WARNING "Dom%d logdirty rangeset clipped to > max_mapped_pfn\n", > d->domain_id); > + end = host_max_pfn; > + } > > /* If the requested range is out of scope, return doing nothing. */ > if ( start > end ) > — > > Everything else looks good. Apologies, I'll resend. Thanks, Razvan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |