|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v7][RFC][PATCH 08/13] xen/x86/p2m: set p2m_access_n for reserved device memory mapping
On 2014/10/27 18:33, Jan Beulich wrote: On 27.10.14 at 10:05, <tiejun.chen@xxxxxxxxx> wrote:On 2014/10/24 23:11, Jan Beulich wrote:On 24.10.14 at 09:34, <tiejun.chen@xxxxxxxxx> wrote:
Okay.
if ( rc == 1 )
This means we hit a RMRR page. Other failed cases just post a warning
message.
error return status already would make it perfectly fine for someone adding an actual case thereof not to go through all existing callers to check whether they can cope. This is a general code quality requirement to assure things remain maintainable. In case of non-shared ept we just create VT-d table, if we assign a device with 1:1 RMRR mapping. So as long as mfn != gfn, its not necessary to set p2m_access_n. In case of shared ept, we have to set p2m_access_n in any scenarios.
Sorry, is it okay?
gdprintk(XENLOG_WARNING, "Domain %hu set rdm p2m failed: %#lx\n",
d->domain_id, gfn);
And I think I don't understand what you said properly, so I will ask
other guys.
would limit output to the !NDEBUG case, putting the practical usefulness of this under question even more. But anyway, looking at the existing code again, I think you'd be better off falling through to the p2m_set_entry() that's already there, just Are you saying I should do this in p2m_set_entry()? altering the access permission value you pass. Less code, better But here, guest_physmap_add_entry() just initiate to set p2m_access_n. We will alter the access permission until if we really assign device to create a 1:1 mapping. Thanks Tiejun readable. Jan _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |