[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 00/16] x86: assorted (mostly) shadow mode adjustments


  • To: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Jan Beulich <jbeulich@xxxxxxxx>
  • Date: Wed, 22 Mar 2023 10:28:19 +0100
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=suse.com; dmarc=pass action=none header.from=suse.com; dkim=pass header.d=suse.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=Y3lh/XHrJ6mUqcRytNOoUcux+y7tpgfVkGIjWwByego=; b=hSzZKSYmizX8kd0xQG1rxFK+BoYPUqatq8ZHAnVnFJ9QEvnnSrHw6de3pod216MDYCotkseZahMKTOjrE9Rzfna8LfxVb7Wex/g77cmDKBW/g9q9/ipFuD340enHdAf8jzjSN/ryhwuW4sn1MALPnnDH6TfFK6caF2C9aousPnnc0OU3pMpz3FrKxc4C7BEIsBxjHqLcRZstuLbmtMVZWR/kQ/R8o8ptMqGf9K49xypMrXViwiVyYENIKtJtX2tuo7Pen5Nc88fPZSOyEKTCWL4wUMgayiwtB5jiEf4ozEZIN21u/iasKtH1m0rL1uC8SsG+O4nsU23l0zYtcoo3tQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JXDSgnS4RDD7V0+ufBUNqLQxLXeXyb0gfnVaj5imtNUrt43zV9tFWGArGsgXBvZJlRxcyZl3PmO97GGvgKXb6e4uCyDZZR4ZSM8oYYUBzhcEd9+TfwMeMUD1TWilsgk//3TjHYBJJWiLWO2IpR2liw2F58rfyRGdaNJ4D1X7adELZkzGHDTagPX6OVxjV1C3B2PerY8a0o71T9qd5fPrpzAyo+v3VM4BP3GeQn1jazjMPD7JRD1pHeJAG/zICxnaZj2glBkI0Qcg35q9PLM4/rLD/pERAa522OR1zJ+6kdOF9qt03cSbvDx4FYmUZESW4gOE2jlK/QcI2uEGgMGR4A==
  • Authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=suse.com;
  • Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Tim Deegan <tim@xxxxxxx>
  • Delivery-date: Wed, 22 Mar 2023 09:28:36 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

This is kind of fallout from XSA-427 investigations, partly related to
there having been a more intrusive first approach. This is also the
reason why one of the patch has R-b already - that was a prereq for
the original approach.

Most patches aren't really dependent upon one another, so can probably
go in independently (as they get acked).

01: shadow: fix and improve sh_page_has_multiple_shadows()
02: shadow: fold/rename sh_unhook_*_mappings()
03: shadow: drop redundant present bit checks from SHADOW_FOREACH_L<N>E() 
"bodys"
04: shadow: replace memcmp() in sh_resync_l1()
05: shadow: reduce explicit log-dirty recording for HVM
06: shadow: purge {write,cmpxchg}_guest_entry() hooks
07: shadow: call sh_update_cr3() directly sh_page_fault()
08: shadow: use lighter weight mode checks
09: shadow: OOS mode is HVM-only
10: shadow: move OOS functions to their own file
11: shadow: drop is_hvm_...() where easily possible
12: shadow: make monitor table create/destroy more consistent
13: shadow: vCPU-s never have "no mode"
14: shadow: "monitor table" is a HVM-only concept
15: shadow: adjust monitor table prealloc amount
16: PV: conditionalize arch_set_info_guest()'s call to update_cr3()

Jan



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.