[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH V3] x86/altp2m: Hypercall to set altp2m view visibility


  • To: George Dunlap <george.dunlap@xxxxxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Alexandru Stefan ISAILA <aisaila@xxxxxxxxxxxxxxx>
  • Date: Thu, 20 Feb 2020 12:51:27 +0000
  • Accept-language: en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=bitdefender.com; dmarc=pass action=none header.from=bitdefender.com; dkim=pass header.d=bitdefender.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ulaKp8yYnrvUrk28IG+JedSHY1XXGlmjMy6g3PTdIrY=; b=PHSzzyx1UjZL3Hi2ECVep+8y5vQV5st3WEcrZvi7i6Y8aLzMiMIfoALnUUJy6EzJxk0KnLLS5M80FoO3lEH9MO3yMAUEpE9TIzvWon9SmMJraWIG4qRnYC8l0tkXLjTni+HFSE2xi4ITW25gMXLFyzvbNKy8kF2ycbZ5jK933Aycejw5tjku4PfS8OybGuhaWC9bDdl9V17asNTtL8PcKgSXyVWYmWj3bZ+4j1cNL2a0Tmf2HjmOxktLlzyNH6eulh1lodcccajXnfhvy3GTeaUP78Cvr/l2qBY0k6fm631P39GmOX+3rSE2Udx+/5uTkR6UlfT3LIGR/nmzPNd4cA==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kV6FJC92V3rMp/k2CcHxh6pxVkCLoTQs8GhfmcvEl3zHrf+Jru/C3dF2ZOIptSLUXN+f5SCbuas1gozNCQFAblz2hUD4aycS3dibdJFtIikuVOHDzD2q1EF8UiSkcUCKnq0oPaut8Bp8gea6Eix255HutbFDkDRzfT7NNRwhVEF0Ehi6KZSxEC6epT5GC2g3eQaf2Vhs57aa543p3k0aL7o7Ng8QGvK5h0ig+cW0th6e1DOSuKNPZFzjebNPBcESxdzBzIzYLbcGXJjnRD+IPl2EQtkTZdw8P2ZcVdyvXF+L83DdqoKGRXkc9L7HUDMdlnC7muo4MvDOBmy0UOPS9w==
  • Authentication-results: spf=none (sender IP is ) smtp.mailfrom=aisaila@xxxxxxxxxxxxxxx;
  • Cc: Kevin Tian <kevin.tian@xxxxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Ian Jackson <ian.jackson@xxxxxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Thu, 20 Feb 2020 12:51:32 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHV5wWKuFf2vClElk6nKYx34YpPrKgkAnyAgAAIZIA=
  • Thread-topic: [PATCH V3] x86/altp2m: Hypercall to set altp2m view visibility


On 20.02.2020 14:21, George Dunlap wrote:
> On 2/19/20 9:18 AM, Alexandru Stefan ISAILA wrote:
>> At this moment a guest can call vmfunc to change the altp2m view. This
>> should be limited in order to avoid any unwanted view switch.
>>
>> The new xc_altp2m_set_visibility() solves this by making views invisible
>> to vmfunc.
>> This is done by having a separate arch.altp2m_working_eptp that is
>> populated and made invalid in the same places as altp2m_eptp. This is
>> written to EPTP_LIST_ADDR.
>> The views are made in/visible by marking them with INVALID_MFN or
>> copying them back from altp2m_eptp.
>> To have consistency the visibility also applies to
>> p2m_switch_domain_altp2m_by_id().
> 
> 
> So it looks like by default the views are visible, until they're made
> non-visible?

Yes, by default all the active views are visible until they're made 
non-visible.

> 
> Also, does the last line mean that the toolstack can't change to a
> "non-visible" altp2m either?

The last line means that xc_altp2m_switch_to_view() will not be able to 
switch to a non-visible view.

-Alex


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel

 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.