[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 2/6] gnttab: allow per-domain control over transitive grants


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Mon, 20 Sep 2021 10:32:24 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=nHjxeA3dzMdrSXROFM0Iq38LOnMVMcK3+TJ654bNhG0=; b=A/fq6vpPyJC/i8cBDpJRvtdtQvT1fitHyI9uWj47OJ6zuWXHcDXxRPDOzGvgPmSrR41JfEKd6A/WvsiVsL9lr2umlnGQ0Oxj/S4mxKawnwd+IDmRP0Vse3QPgEOfudmH8nYGUAIJZ3WgCjrC2oD96K8uJmeq8orOcWaU5pd1aAFu0Yl0mAAgHmp+7WSMhPNvcjMtP/7+m1tfHIimlCB2QUtxkC1CLWAOkoNqxFRUshN7kNTtg4k6kPdnyFHUVVueUKqes1gVnM5tN2iX5tIncB4Rlddq0AIggkmGa86ho7eVPUcjC/WFiGkZrKq551aMZG63eb9QhB7Cf+HyAzqmYg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=m4Was3vY7KLasnAynXbzxpffCvstLd+voixBI2/55FZONnGQ5SQq0GOKWShoA2rjwvmJSZSdoMQn3xtEatHHU5uhiysJZvKGhrZeWLQdFreEky3W/Rs3ndi4YHL4xw/3UuK8mXFu1iIKzUdLWQHv3/HGHLaSdMp3UQMvX2p20GbbY2lZzgxq2vZmqbik3pkUs/OEE7+UBdc80iexpp921lXwAMFYzNhfYhToSOX7xMYhf7hzJARGQ4UrQZh+7yIvRofCnutj6H0hexXTo+GENZ5S0O1qoAUGlu9Lm8izgANfqsJO7umH+i4/EHYX7Jq35ZKZYXSk2Tcc5v0KmbyWFw==
  • Authentication-results: esa4.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Ian Jackson <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Christian Lindig <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Mon, 20 Sep 2021 09:32:52 +0000
  • Ironport-data: A9a23:92j7XqnN9l3/x0hd/uSg+Dfo5gwqIURdPkR7XQ2eYbSJt1+Wr1Gzt xIeUWqOOfncYjTyeN4iPYiz9koO7JaByoc3QFFl/yxnRiMWpZLJC+rCIxarNUt+DCFioGGLT Sk6QoOdRCzhZiaE/n9BClVlxJVF/fngqoDUUYYoAQgsA185IMsdoUg7wbdh09Qw2YLR7z6l4 rseneWOYDdJ5BYsWo4kw/rrRMRH5amaVJsw5zTSVNgT1LPsvyB94KE3fMldG0DQUIhMdtNWc s6YpF2PEsE1yD92Yj+tuu6TnkTn2dc+NyDW4pZdc/DKbhSvOkXee0v0XRYRQR4/ttmHozx+4 NFqupHvRB5wArbvh8EaVh9DSC45PIQTrdcrIVDn2SCS50jPcn+qyPRyFkAme4Yf/46bA0kXq 6ZecmpUKEne2aTmm9pXScE17ignBODtMJkSpTdLyjbBAOx9aZvCX7/L9ZlT2zJYasVmQKqON pZCN2oHgBLoMyxuCgcYKaoCgL2Lq37AcgEFqm+ouv9ii4TU5FMoi+W8WDbPQfSVQe1Fk0Deo XjJl0z7CBwHMN2UyRKe72mhwOTImEvTSI8UUbG16PNuqFmS3XAITg0bU0Ohpvu0gVL4XMhQQ 2QV5SgGvaU07FasTNT2Q1u/unHslhwBX9tdFcUq5QfLzbDbiy6VD3YJZiRMY9snsIkxXzNC/ mGOm9TlFDl+qoq/QHiW9qqXhT6qMC1TJmgHDQcfVhcM6dTnpIA1jzrMQ8xlHarzicf6cRnyz CqNtzMWnKgIgIgA0KDTwLzcq2vy/N6TFFdzv1iJGDL+hu9kWGK7T4iP5lWE4O8ZEJ26UXyGu X4fwMfZ7clbWPlhixexrPUx8KCBvqjeaW2H0A83RfHN5Bz2pCXyJtk4DCVWYR4za5daI2eBj Fr75FsJjKK/KkdGekOej2iZMM0s0aGoPtDsTPm8gjFmM8UpKVPvEM2DYyetM4HRfKoEyvpX1 XSzK5/E4ZMm5UNPlmHeegvl+eV3rh3SPEuKLXwB8/hC7VZ5TCXPIYrpzXPUNrxphE96iFyNr r6zyPdmOz0ACbajM0E7AKY4LEwQLGhTOHwFg5UMLYa+zv5dMDh5UZf5mOp5E6Q8xvg9vrqYr xmVBx4DoHKi1CKvFOl/Qi06AF8Zdc0k9ixT0O1FFQvA5kXPlq71vf9DKMNoLed4nAGhpNYtJ 8Q4lwy7Kq0nYhzM+igHbIm7q4pndR+xghmJMTbjaz86F6OMjSSSkjM9VgewpiQIEAStss4y/ ++p2g/BGMJRTAV+FsfGLvmoygrp73QanetzWWrOI8VSJxqwoNQ7dXSpg69lOdwIJDXC2iCei 1ScDyAHqLSfuIQy6tTI2/yJ9t/7D+tkE0NGNGDH9rLqZzLC92+uzNYYAuaFdDzQTk3u/6Cma bkHxv3wKqRfzl1Lr5B9A/Bgyqdnv4njoLpTzwJFGnTXbgv0VuM8cyfehcQW7/9D3L5UvweyS 3mjwNgCNOXbIt7hHX4QOBEhMraJ28YLl2SA9v8yOkj7unN6peLVTUVIMhCQoyVBN78pYpg9y OIstcNKuQyyjh0mboSPgixOrjneK3UBV+Mst40AAZ+tgQ0ukwkQbZvZAy7wwZeOd9QTbRV6f m7K3PLP1+ZG207PU3svDnycj+NSiKMHtA1O0FJfdU+CncDIh6Nv0RBcmdjtot+5EvmTPzpPB 1VW
  • Ironport-hdrordr: A9a23:x4MkiKnm7XGQCgDmFgZSe+IZeyvpDfO7imdD5ihNYBxZY6Wkfp +V88jzhCWZtN9OYhwdcLC7WZVpQRvnhPtICPoqTMiftW7dyReVxeBZnPbfKljbdREWmdQtrZ uIH5IOb+EYSGIK9/oSgzPIY+rIouP3iZxA7N22pxwGLXAIGtJdBkVCe2Km+yVNNXh77PECZf yhD6R81lidkDgsH7+G7i5vZZm8mzSHruOrXTc2QzocrCWehzKh77D3VzCewxclSjtKhZMv63 LMnQDV7riq96jT8G6T60bjq7Bt3PfxwNpKA8KBzuATNzXXkw6tIKBsQaeLsjwZqPymrHwqjN 7PiRE9ONkb0QKfQkiF5T/WnyXw2jcn7HHvjXeenHvYuMT8AAk3DsJQ7LgpOSfx2g4FhpVRwa hL12WWu958FhXbhhnw4NDOSlVDile0iWBKq59Rs1VvFa8lLJNBp40W+01YVL0aGjjh1YwhGO 5ySOnB+fdtd0+AZXyxhBgu/DWVZAV3Iv66eDlHhiTMuAIm20yRjnFohfD3p01wtq7UEPJ/lq L52qcBrsAHciZZV9MlOA+tKfHHfVAleii8RV56F26XXZ3vC0i92aIf349FkN1CWKZ4hqfay6 6xHW+xiwYJCjTT4Iu1rcV2ziw=
  • Ironport-sdr: Fjy7jjLh3jV4I7sGs7Hhz76U7R+P4pq3GobmjGUGQ5KgUIOcwjqBUaxvI7eKkrbfVOpHbkWG63 XQTGTj/DL9Gmf9rn9mHp1ad8SxRpspMyqh0V5nW1xT/DtthE5CY2x4r4dK3SocU+nWwjJYwLaI BK83Jk2MCSpJXOeJZkVbcsHSIHOiu6bbnhQgUGd9ezv6nO4JpIsWj6AdDIJ+f5Q/OWj/4GZ7w7 DYRq+duuo/AF9Y6BmxvvaQBVoEZMRnFAqhF1qihc3XJ3aZj2ic/WU45zMuhdS57KusPvRNzJOR pvn+r+L6WyeNFMzbkLMiAMn3
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 17/09/2021 16:46, Roger Pau Monne wrote:
> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
> index 7f8456c50e..fe2201fca1 100644
> --- a/xen/include/public/domctl.h
> +++ b/xen/include/public/domctl.h
> @@ -96,6 +96,14 @@ struct xen_domctl_createdomain {
>      int32_t max_maptrack_frames;
>      int32_t max_grant_version;
>  
> +/* Allow transitive grants. */
> +#define _XEN_DOMCTL_GRANT_transitive  0
> +#define XEN_DOMCTL_GRANT_transitive   (1U << _XEN_DOMCTL_GRANT_transitive)

There's no need for bit position variables.

> +
> +#define XEN_DOMCTL_GRANT_MAX XEN_DOMCTL_GRANT_transitive
> +
> +    uint32_t grant_opts;

So far, we've got 3 bits of information, v1, v2 and transitive, and
we're tight on space in the structure with loads more to fit in.

I was thinking grant_flags or equiv to contain these 3 settings, and any
further which might appear.


One thing which is missing however is the enumeration of which settings
are available, and rejection of bad settings.  If v2 is disabled
globally, trying to create a VM with v2 needs to fail.

~Andrew




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.