[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH v4] VMX: use a single, global APIC access page
- To: Jan Beulich <jbeulich@xxxxxxxx>
- From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
- Date: Tue, 13 Apr 2021 15:03:12 +0200
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=IxogzJKt1mqp/zV/CtKIlySQhljhRvouFeKXJivfonY=; b=bB47jZzQfzOHBF3d8YylUaJZVK5+4aty3hSDILFb7UmtwX6u1rpidt5hRaSWIfv3ozEm4DGO/0eb6eVnkdUdmQ/yJgHsXHDJn2g+QkO2bKB2r1wF1gw8E52OII1FJRddtOtLGeLSAgxiixxm0oCw4Azh7L2/tsBaOpHQeFwFDic0o4ADtqccCSk2m67Nm48QS4HMYHWmIu2wDOODOI8XL9UtxGMK+ic4TqXx/dfh4tf0TSB3O+tRHDtZUxwcRdrYYt5xVXguc9LAJSPavrRjStE6Z73DOqSehH16Sm89fLdngER27IsyRV4YJ+jm+xbkieH2HJKWWulmVZo2Y1YLLQ==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=TRZFCGD1+7rLLzZpFp1A0GBnHKNbhyMNJglvPgRbdToJ8NGLZME7amebq5KwD3YDBgQ2MpD0UNRI1V7F3K0UiYFrSqNoiFlJCypuLAYnD+QBF0YQT3XGUYzYCqasnzRaobuUxmqJ48dul6hQqQJpEgDuP+5zdc2rG2guOKxyj1eu2Ysilxf8ZuHSB+jaGvfhoBZU5V8JAjpf+npOYIokK8YjgiQTRWLC2+JPf7+vG2S2VWJGD4Y+xxU9Wh6Vbb2vd5mumxkEqqe+1M1IpL3Plu0FtAYY9bwMRHfgPA9u3UncbrkEY9FnOP5O5kh32b948oFPJQoTr+PosBWWff/1wg==
- Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
- Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Kevin Tian <kevin.tian@xxxxxxxxx>, Jun Nakajima <jun.nakajima@xxxxxxxxx>, Tim Deegan <tim@xxxxxxx>
- Delivery-date: Tue, 13 Apr 2021 13:03:28 +0000
- Ironport-hdrordr: A9a23:9C0DHqquUI7DeKJ19IwhdvwaV5qxeYIsi2QD101hICF9WMqeis yogbAnzhfykjkcQzUNntqHNamGTxrnhPxIyKMWOqqvWxSjhXuwIOhZnOjf6hDDOwm7zO5S0q 98b7NzYeeaMXFWhdv3iTPYL/8O29+CmZrGuc7771NACT5ncLth6QARMGqmO2l7XhNPC5Z8NL f03LsjmxOadX4abtu2CxA+NoCoyuHjro7sYhINGncciDWmsDXA0tDHOind+AwfXTNJybIL6n PEjAT926Wmv5iAu3vh61M=
- Ironport-sdr: wj4t4IKJgnVcMOOfyLCsATo1AIZxn1Zc9cKF2MBryOSyaD2E4loyUMGmLEdi/9jjtfEpmIBlGk WY7Ds57Kyv93m7n9WYdmxP4wdt+IVG8Ur91zHDqUtWUcq36gOweKf1SWvIykrL1Uqtz8QPd0gx xIvKqcePty9iZ+ov2Cd2L4hdFEtE82q2U9xOQVYWW8JsDVqY2ASiydj/vuL+BeB3HRsLUGgite MLdKBTJrAo//zw5UYnSLydlKlC+9nQ4a29ovKTs6pZK7u9bDJzGvA9MTSZx8m4WVSQ7p17vYTX lnY=
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On Tue, Apr 13, 2021 at 02:03:52PM +0200, Jan Beulich wrote:
> On 13.04.2021 12:18, Roger Pau Monné wrote:
> > On Tue, Apr 13, 2021 at 11:24:09AM +0200, Jan Beulich wrote:
> >> On 12.04.2021 17:31, Roger Pau Monné wrote:
> >>> On Mon, Apr 12, 2021 at 12:40:48PM +0200, Jan Beulich wrote:
> >>>> + {
> >>>> + const struct page_info *pg = mfn_to_page(mfn);
> >>>> +
> >>>> + if ( !page_get_owner(pg) && (pg->count_info & PGC_extra) )
> >>>> + {
> >>>> + ASSERT(type == p2m_mmio_direct);
> >>>> + return 0;
> >>>
> >>> Are there any other pages that could pass this check? I don't think
> >>> so, but wanted to assert.
> >>
> >> "Normal" extra pages have an owner, so no, there aren't any others.
> >> If and when any appear, this may need further customizing, albeit
> >> generally I'd hope further pages matching this pattern would also
> >> want similar treatment.
> >
> > I wonder whether we want to add an assert here to make sure only the
> > APIC access page receives this special handling by the shadow code,
> > but maybe that's a bit too much?
>
> I think so, yes: It would require either a separate function or
> making the variable global. Both feel like a layering violation.
Right, with the INVALID_MFN change and the shadow mfn_valid style
adjustment:
Reviewed-by: Roger Pau Monné <roger.pau@xxxxxxxxxx>
Thanks, Roger.
|