|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [V10 PATCH 3/4] pvh dom0: Add and remove foreign pages
On Fri, 2 May 2014 10:55:55 +0200
Tim Deegan <tim@xxxxxxx> wrote:
> Hi,
>
> At 18:45 -0700 on 01 May (1398966318), Mukesh Rathor wrote:
> > On Thu, 1 May 2014 18:19:08 +0200
> > Tim Deegan <tim@xxxxxxx> wrote:
.....
> > >
> > > At 18:06 -0700 on 29 Apr (1398791207), Mukesh Rathor wrote:
> > > > diff --git a/xen/arch/x86/mm/p2m-ept.c
> > > > b/xen/arch/x86/mm/p2m-ept.c index c0bfc50..11474e8 100644
> > > > --- a/xen/arch/x86/mm/p2m-ept.c
> > > > +++ b/xen/arch/x86/mm/p2m-ept.c
> > > > @@ -36,8 +36,6 @@
> > > >
> > > > #define
> > > > atomic_read_ept_entry(__pepte) \
> > > > ( (ept_entry_t) { .epte = read_atomic(&(__pepte)->epte) } )
> > > > -#define atomic_write_ept_entry(__pepte,
> > > > __epte) \
> > > > - write_atomic(&(__pepte)->epte, (__epte).epte)
> > > >
> > > > #define is_epte_present(ept_entry) ((ept_entry)->epte &
> > > > 0x7) #define is_epte_superpage(ept_entry) ((ept_entry)->sp)
> > > > @@ -46,6 +44,46 @@ static inline bool_t
> > > > is_epte_valid(ept_entry_t *e) return (e->epte != 0 &&
> > > > e->sa_p2mt != p2m_invalid); }
> > > >
> > > > +/* returns : 0 for success, -errno otherwise */
> > > > +static int atomic_write_ept_entry(ept_entry_t *entryptr,
> > > > ept_entry_t new,
> > > > + int level)
> > > > +{
> > > > + bool_t same_mfn = (new.mfn == entryptr->mfn);
> > > > + unsigned long oldmfn = INVALID_MFN;
> > > > +
> > > > + if ( level )
> > > > + {
> > >
> > > ASSERT(!(new.sp && p2m_is_foreign(new.sa_p2mt))) here?
> >
> > Yeah, I debated adding p2m_is_foreign ASSERT, but didn't because
> > iirc Jan had said he wanted to use up the non-leaf bits for
> > something else in future.
>
> Well, if new.sp is set it's not non-leaf. Though I suppose maybe the
> test should be for _valid_ + superpage + foreign.
Ok, so looks like:
ASSERT(new.sa_p2mt == p2m_invalid ||
!(new.sp && p2m_is_foreign(new.sa_p2mt)));
should do it?
...
> > > > + write_atomic(&entryptr->epte, new.epte);
> > > > + return 0;
> > > > + }
> > > > +
> > > > + if ( unlikely(p2m_is_foreign(new.sa_p2mt)) && !same_mfn )
> > > > + {
> > > > + struct domain *fdom;
> > > > +
> > > > + if ( !mfn_valid(new.mfn) )
> > > > + return -EINVAL;
> > > > +
> > > > + fdom = page_get_owner(mfn_to_page(new.mfn));
> > >
> > > This needs a matching put_pg_owner() once you're done with it.
> >
> > Doing page_get_owner, not get_pg_owner here, so don't think so,
> > right?
>
> Oh yes -- sorry, I got confused between this and the case where you do
> use get_pg_owner(). But actually on this subject ISTR objecting to
> exporting get_pg_owner() from mm.c before. Oh yes, here it is:
>
> http://lists.xenproject.org/archives/html/xen-devel/2014-01/msg02612.html
>
> So can you use rcu_lock_live_remote_domain_by_id() here instead?
In p2m_add_foreign() we already get the rcu lock, still do it here?
And, btw, that function, p2m_add_foreign(), went from
+ if ( (fdid == DOMID_XEN && (fdom = rcu_lock_domain(dom_xen)) == NULL) ||
+ (fdid != DOMID_XEN && (fdom = rcu_lock_domain_by_id(fdid)) == NULL) )
+ goto out;
to
+ fdom = get_pg_owner(foreigndom);
(causing get_pg_owner to be exported) at Jan's comment/suggestion in v8.
thanks,
mukesh
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |