|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v2] xen: use domid check in is_hardware_domain
On 07/10/2013 06:57 AM, George Dunlap wrote: On 09/07/13 21:28, Daniel De Graaf wrote: [...]
I would expect that if CPUID faulting is turned on for the hardware domain that no features would be masked (since it can't be migrated, there's no reason to avoid using an existing feature). Jan commented on a prior version of this patch (on April 12) that it makes sense for a control domain to see the full features of the CPU in order to create masks for guests. In theory, we could enable CPUID faulting for all domains after dom0 and force the domain builder to copy out the hardware CPUID to its guests - likely unmodified for hardware and control domains, and then masked as usual for a domU for others. However, this may require too much knowledge of the behavior of CPUID sub-leaves to be encoded in the domain builder - this seems like knowledge best left to the hardware domain (for things like feature bits for power management MSRs) and the control domain (to see an upper bound on features it exposes to the guest). So, I think the best solution is to make this condition !hardware && !control.
[...]
This is just excluding output from a printk. It may make sense to exclude more than the hardware domain, but that's really a matter of taste. We could also just remove the exclusion, but that should be a separate patch.
Will need to be handled the same if the above is changed. [...]
I would say the hardware domain would be the most likely one to pin, since it would be in charge of things like CPU frequency, microcode, and so forth. Pinning other domains for performance reasons is really better done by a scheduler interface, either at domain creation or at runtime. Everything else looks reasonable to me, but obviously needs acks from various maintainers. -George -- Daniel De Graaf National Security Agency _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |