[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH] x86/altp2m: p2m_altp2m_get_or_propagate() should honor ap2m->default_access


  • To: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • From: Tamas K Lengyel <tamas@xxxxxxxxxxxxx>
  • Date: Wed, 7 Feb 2024 20:20:55 -0500
  • Arc-authentication-results: i=1; mx.zohomail.com; dkim=pass header.i=tklengyel.com; spf=pass smtp.mailfrom=tamas@xxxxxxxxxxxxx; dmarc=pass header.from=<tamas@xxxxxxxxxxxxx>
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=zohomail.com; s=zohoarc; t=1707355293; h=Content-Type:Content-Transfer-Encoding:Cc:Cc:Date:Date:From:From:In-Reply-To:MIME-Version:Message-ID:References:Subject:Subject:To:To:Message-Id:Reply-To; bh=rr7/ceTMxDTm0VhdI7nT/NNQsHRms8IddkEL0Jw0XmY=; b=Ttqvofzp6NkOt/NxSMmOeE7qjfh/snixgSmOj5A91u0dFyZmPjM6n5hVkyW/2LngLbONq17LSQvMpmauBpsw5zidoHo1K9XO0qlPlHknJ9CsAQlNgB4YkGoPkmYX4U4JGvsU8YUOMmwg2RE2wQ+AQRvajTyNCFI2bFGnw5L/3j8=
  • Arc-seal: i=1; a=rsa-sha256; t=1707355293; cv=none; d=zohomail.com; s=zohoarc; b=EFwFtv9vPRT/UZpBPHJAh/BaaRDx6jneI/Xhu3SB3I4tpe5krIHGc2bREayelCUoj4K5jt/t2Vgn4z4lGqVBJ9jc53XYWDVZhkHDeaotOHnH4Z/OCN3KBE0dEu3C8dZUlAyUMbTtWGlk6lDs08c0JjxYXyTKXx9EpYC94VnPfEA=
  • Cc: George Dunlap <george.dunlap@xxxxxxxxx>, Petr Beneš <w1benny@xxxxxxxxx>, xen-devel@xxxxxxxxxxxxxxxxxxxx, Alexandru Isaila <aisaila@xxxxxxxxxxxxxxx>, Petre Pircalabu <ppircalabu@xxxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>
  • Delivery-date: Thu, 08 Feb 2024 01:21:50 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On Wed, Feb 7, 2024 at 5:21 PM Andrew Cooper <andrew.cooper3@xxxxxxxxxx> wrote:
>
> On 07/02/2024 1:18 am, George Dunlap wrote:
> > On Tue, Feb 6, 2024 at 6:08 PM Petr Beneš <w1benny@xxxxxxxxx> wrote:
> >> From: Petr Beneš <w1benny@xxxxxxxxx>
> >>
> >> This patch addresses a behavior discrepancy in the handling of altp2m 
> >> views,
> >> where upon the creation and subsequent EPT violation, the page access
> >> permissions were incorrectly inherited from the hostp2m instead of 
> >> respecting
> >> the altp2m default_access.
> >>
> >> Previously, when a new altp2m view was established with restrictive
> >> default_access permissions and activated via xc_altp2m_switch_to_view(),
> >> it failed to trigger an event on the first access violation.  This behavior
> >> diverged from the intended mechanism, where the altp2m's default_access
> >> should dictate the initial permissions, ensuring proper event triggering on
> >> access violations.
> >>
> >> The correction involves modifying the handling mechanism to respect the
> >> altp2m view's default_access upon its activation, eliminating the need for
> >> setting memory access permissions for the entire altp2m range (e.g. within
> >> xen-access.c).  This change not only aligns the behavior with the expected
> >> access control logic but also results in a significant performance 
> >> improvement
> >> by reducing the overhead associated with setting memory access permissions
> >> across the altp2m range.
> >>
> >> Signed-off-by: Petr Beneš <w1benny@xxxxxxxxx>
> > Thanks Petr, this looks like a great change.
> >
> > Two things:
> >
> > - Probably worth adjusting the comment at the top of
> > p2m_altp2m_get_or_propagate to mention that you use the altp2m
> > default_access when propagating from the host p2m
> >
> > - This represents a change in behavior, so probably at least worth a
> > mention in CHANGELOG.md?
>
> This is a bugfix to an tech preview feature.  It's not remotely close to
> CHANGELOG material.
>
> Tangent.  SUPPORT.md says tech preview on ARM, despite there being no
> support in the slightest.  Patches were posted and never taken.
>
> > Tamas, I guess this is OK from an interface compatibility point of
> > view?  In theory it should always have been behaving this way.
>
> Given the already-provided Ack, I expect that has been considered and
> deemed ok.

Correct, this is just a bugfix.

Tamas



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.