[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 2/9] x86/PV: properly set shadow allocation for Dom0


  • To: Jan Beulich <jbeulich@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Date: Wed, 22 Sep 2021 16:25:30 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=qaDVag6CDTsAPeUnT5m77AzpkBzJ1YXqzl4R5UjmxmY=; b=aDU7mkS1c3wkbdBfKOCEnMjgzD3uVIuwYsYr4Q88QDzFyJacEPFMQtfXl/kSt3iV2u5g0/HPkntdNfKqXpC+bwgk0HZHQQcXm1oHtRRQPyDyDdzNspYBA/rVOnJeiic9eqdsrhOCznXFvkH7vh95hkYNBjfZXg8Nu0CLqjHEeYXCcZIXdVgBONDbD4tQaBjOZLlBYduS9lPXfPnJYQ8hUetssYaPl2FYAhOZvBEopoqslXuOOzgvp3mx0DCuDDwL86utY/B5U5IKXv8dLj9H9UoXSGHeiUhnKW9IJPgoqP2AGNl10LBtDnRzL3suYw4Rgikpj2GBY65uTyksOuwjTg==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=EXWqVtxN4NynKoY2ZrdAo/KULQBHGFWQTD5u2XPRqSVsj1LU9weogo0thUkrnHDz48VtenUBOpbpkW8lVJrm9n95lD3nwrRpte1au6srjZY6NTwH/9az29W5/NYlO1rppPJGtyOdtcAJYhtP6LUBzlRCVzH8ilpbcL5kmvRAXnZZAzF/Eoip3/EqtS4rlb3YB3DI41TfeVsHfuUX6CF+3HViUGGmclceQbnt4GbE2oWRLiGhBZfzimlPkSKaHkQBmMtkcbau04nv1TQt8p53H/MauNCQU1l8U0seSCK6kgpGSht74LzBgey2Vrte1W5kjYxkWvY0ZiCEKvGTqL9Xtg==
  • Authentication-results: esa2.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Wei Liu <wl@xxxxxxx>, Tim Deegan <tim@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 22 Sep 2021 14:25:45 +0000
  • Ironport-data: A9a23:cyW5BaI+lDUd9GiOFE+R6JIlxSXFcZb7ZxGr2PjKsXjdYENSgmFWn DccXm3SPKmJZmr0eI1zb4Tl9R4Fv8DVzdBrSlRlqX01Q3x08seUXt7xwmUcns+xwm8vaGo9s q3yv/GZdJhcokcxIn5BC5C5xZVG/fjgqoHUVaiUZ0ideSc+EH140UM5wbZi6mJVqYPR7z2l6 IuaT/L3YDdJ6xYsWo7Dw/vewP/HlK2aVAIw5jTSV9gS1LPtvyB94KYkDbOwNxPFrrx8RYZWc QphIIaRpQs19z91Yj+sfy2SnkciGtY+NiDW4pZatjTLbrGvaUXe345iXMfwZ3u7hB2zn/xf8 clE5aCdQCgPYaiStcseCSRxRnQW0a1uoNcrIFC6uM2XiUbHb2Ht07NlC0Re0Y8wo7gtRzsUr LpBdW5LPkvra+GemdpXTsF2gcsuNo/zNZ43sXB81zDJS/0hRPgvRo2XvoQChmpq26iiG97FW cQlSgVmXS7wbjFyNFkpNLxng+i30yyXnzpw9wvO+PtfD3Lo5BBw1ZD9PdyTfcaFLe1Fk0Ddq m/Y8mDRBhABKMfZ2TeD6mirhOLEgWX8Qo16PL+y++NugVaT7ncOExBQXly+ydGmjmauVtQZL FYbkhfCtoBrqhbtFIOkGUTl/jjU5XbwRua8DcUA6C2j87bdszq0D0ciETsfRfMl7vIfEGlCO kCyoz/5OdB+mOTLEijEpunI9Wra1Ts9djBZNHRdJecRy5y6+thi0EiXJjp2OPPt1rXI9SfML ydmRcTUr44ai9ICn46/9ErO695HjsmUFlNpjuk7s2TM0++YWGJHT9fzgbQ4xawZRGp8crVml CJf8/VyFMhUUfmweNWlGY3h5o1FAspp1xWH2zZS82QJrWzxqxZPg6gJuGwWyLhV3jYsJmayP R67VfJ5z55PJnq6BZKbkKroUJ9C8EQULvy8Dqq8RoMXOvBZLVbblAkzNR/49z28yyAEzPBgU ap3hO7xVB72/4w8l2HoLwrcuJd2rh0DKZT7H8Gjk0v/jurAOxZ4i94taTOzUwzw14vdyC39+ NdDLcqajRJZVez1eC7M9oAPa1sNKBAG6Vre8aS7r8aPfVhrHn8PEfjUze9zcoBphf0NxOzJ4 mu8SglTz1+m3S/LLgCDa3ZCbrLzXMkg8SJnbHJ0ZVv4iWI+ZYuP7bsEc8dld7cQ6+E+n+V/S OMIepvcD60XGCjH4TkUcbL0sJdmKEawnQuLMif8OGo/cpdsShbn4NjhegezpiACAjDu7Zk1o qG61xOdSp0GHlwwAMHTYfOp7lWwoXlCx74iAxqWeoFeIRy+/pJrJir9iu4MD/sNcRiTlCGH0 wu2AAsDobWfqYEC79SU17uPqJ2kErUiExMCTXXb97u/KQLT4nGnnd1bSO+NcD3QCDH09aGla bkHxv3wKqRazlNDso46GLd316MuodDoouYCnAhjGXzKaXWtC69hfSbajZUe6PUVy+8LoxayV 2KO5sJeaOeAN87SGVIMIBYoM7aY3vYOlziOtfk4LS0WPsOsEGZrhamKAySxtQ==
  • Ironport-hdrordr: A9a23:sZjylqiI0IeDYUEnsWFeKC7HW3BQX0h13DAbv31ZSRFFG/FwyP rAoB1L73PJYWgqNU3I+ergBEGBKUmskqKdxbNhR4tKPTOWw1dASbsN0WKM+UyDJ8STzJ856U 4kSdkCNDSSNykFsS+Z2njALz9I+rDum8rJ9ISuvkuFDzsaE52Ihz0JdTpzeXcGIjWua6BJcK Z1saF81kadkDksH4mG7j5vZZm3m/T70LbdJTIWDR8u7weDyRuu9b7BChCdmjMTSSlGz7sO+X XM11WR3NTtj9iLjjvnk0PD5ZVfn9XsjvNFGcy3k8AQbhHhkByhaohNU6CL+Bo1vOaswlA3l8 SkmWZtA+1Dr1fqOk2lqxrk3AftlB4o9n/Z0FedxUDupMToLQhKQ/ZptMZ8SF/0+kAgtNZz3O ZgxGSCradaChvGgWDU+8XIfwsCrDv1nVMS1cooy1BPW4oXb7Fc6aYF+llOLZsGFCXmrKg6De hVCt3G7vo+SyLaU5nghBgs/DWQZAV3Iv/fKXJy/vB9kgIm0kyR9nFoh/D2xRw7hdUAo5ot3Z WMDk0nrsAJcie6BZgNcNvpevHHeVAldyi8Rl56EW6XZJ3vBEi92aIfwI9Fr91CK6Z4hqfbpv z6ISRlXCgJChvTNfE=
  • Ironport-sdr: s1IPJNiHDDrx9cLO9DTU8tY7ZohhHHOzobLNRBMxzDRdlSw0BjrjeW0YGogQDvMLOUbz4IpGPN MntcdJgb31Px5fbbWT9bNNPtZmN+naPhxJP0tm19a+PwSYRQJGmRgkTLjBjBe0AXWD1YTZk9Nt 8eYIHtDk53xED0g88QbuTXtUxM2ZfBI+5pKiT1OeWr+rcSZq1b6C8oRbF2RKbp3ct53qesteKt 4WoRLuQiS97DjUMDG14VKcBJp0pcFUYkR7h7w7qR1oyCUUNtEELZF1C7mhVDPstkHIY1xT8yeQ xujiozI2hVwNBnadgMrJY5TQ
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed, Sep 22, 2021 at 03:50:25PM +0200, Jan Beulich wrote:
> On 22.09.2021 15:31, Andrew Cooper wrote:
> > On 21/09/2021 08:17, Jan Beulich wrote:
> >> @@ -933,7 +934,18 @@ int __init dom0_construct_pv(struct doma
> >>  #ifdef CONFIG_SHADOW_PAGING
> >>      if ( opt_dom0_shadow )
> >>      {
> >> +        bool preempted;
> >> +
> >>          printk("Switching dom0 to using shadow paging\n");
> >> +
> >> +        nr_pt_pages = dom0_paging_pages(d, nr_pages);
> >> +
> >> +        do {
> >> +            preempted = false;
> >> +            shadow_set_allocation(d, nr_pt_pages, &preempted);
> >> +            process_pending_softirqs();
> >> +        } while ( preempted );
> > 
> > This is still broken.
> > 
> > The loop setting the shadow allocation needs to be outside of this
> > conditional, because it is not related to early activation of the l1tf
> > tasklet.
> 
> Well, I'm not sure what to say. On v1 you already said so. But then you
> didn't care to reply to me responding:
> 
> "Are you suggesting to set up a (perhaps large) shadow pool just in
>  case we need to enable shadow mode on Dom0? And all of this memory
>  to then remain unused in the majority of cases?
> 
>  Plus even if so, I'd view this as a 2nd, independent step, largely
>  orthogonal to the handling of "dom0=shadow". If somebody really
>  wanted that, I think this should be driven by an explicit setting
>  of the shadow pool size, indicating the admin is willing to waste
>  the memory.

Maybe an acceptable compromise would be to allocate the pool if
opt_dom0_shadow || opt_pv_l1tf_hwdom?

opt_pv_l1tf_hwdom is not enabled by default, so an admin opting to
enable it should also be willing to reserve the memory it requires in
case it needs activating during runtime.

Roger.



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.