|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] Ping: [PATCH v3] x86/HVM: correct page dirty marking in hvm_map_guest_frame_rw()
On Mon, Oct 26, 2015 at 07:09:06AM -0600, Jan Beulich wrote:
> >>> On 19.10.15 at 16:53, <JBeulich@xxxxxxxx> wrote:
> > --- a/tools/libxc/xc_sr_save.c
> > +++ b/tools/libxc/xc_sr_save.c
> > @@ -537,7 +537,8 @@ static int suspend_and_send_dirty(struct
> > if ( xc_shadow_control(
> > xch, ctx->domid, XEN_DOMCTL_SHADOW_OP_CLEAN,
> > HYPERCALL_BUFFER(dirty_bitmap), ctx->save.p2m_size,
> > - NULL, 0, &stats) != ctx->save.p2m_size )
> > + NULL, XEN_DOMCTL_SHADOW_LOGDIRTY_FINAL, &stats) !=
> > + ctx->save.p2m_size )
> > {
> > PERROR("Failed to retrieve logdirty bitmap");
> > rc = -1;
>
> Tools maintainers, could I please get an ack or otherwise on this
> adjustment?
>
Er, there seems to be behaviour change that would cause external users
of xc_shadow_control cease to function properly.
Does it make sense to use inverse logic that you set a flag to not
mark permanent pages dirty? I think that's a bit awkward, not sure if it
is worth it.
I also realise that libxenctrl doesn't have stable interface so I'm a
bit two-minded for this.
Ian and Ian, what do you think?
Wei.
> > --- a/xen/include/public/domctl.h
> > +++ b/xen/include/public/domctl.h
> > @@ -208,6 +208,13 @@ struct xen_domctl_getpageframeinfo3 {
> > */
> > #define XEN_DOMCTL_SHADOW_ENABLE_EXTERNAL (1 << 4)
> >
> > +/* Mode flags for XEN_DOMCTL_SHADOW_OP_{CLEAN,PEEK}. */
> > + /*
> > + * This is the final iteration: Requesting to include pages mapped
> > + * writably by the hypervisor in the dirty bitmap.
> > + */
> > +#define XEN_DOMCTL_SHADOW_LOGDIRTY_FINAL (1 << 0)
> > +
> > struct xen_domctl_shadow_op_stats {
> > uint32_t fault_count;
> > uint32_t dirty_count;
> > @@ -219,8 +226,9 @@ struct xen_domctl_shadow_op {
> > /* IN variables. */
> > uint32_t op; /* XEN_DOMCTL_SHADOW_OP_* */
> >
> > - /* OP_ENABLE */
> > - uint32_t mode; /* XEN_DOMCTL_SHADOW_ENABLE_* */
> > + /* OP_ENABLE: XEN_DOMCTL_SHADOW_ENABLE_* */
> > + /* OP_PEAK / OP_CLEAN: XEN_DOMCTL_SHADOW_LOGDIRTY_* */
> > + uint32_t mode;
> >
> > /* OP_GET_ALLOCATION / OP_SET_ALLOCATION */
> > uint32_t mb; /* Shadow memory allocation in MB */
>
> "REST" maintainers, could I please get an ack or otherwise on this
> interface change?
>
> Thanks, Jan
>
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |