|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC] xen/arm: Handling cache maintenance instructions by set/way
Hi Jan, On 12/06/2017 09:15 AM, Jan Beulich wrote: On 05.12.17 at 19:39, <julien.grall@xxxxxxxxxx> wrote: That's right. PoD would limit the number of entry to flush. To limit the performance impact, we could introduce a guest option to tell whether the guest will use S/W. If it does plan to use S/W, PoD will be disabled.Therefore I'm wondering if here you mean "If it doesn't plan to ..." Whoops. I meant "If it doesn't plan". Independent of this I'm pretty unclear about your conclusion that there will be only a very limited number of P2M entries at the time S/W insns would be used by the guest. Are you ignoring potentially malicious guests for the moment? Otoh you admit that things would need to be preemptible, so perhaps the argumentation is that you simply expect well behaved guests to only have such limited amount of P2M entries. The preemption is to cover malicious guests and potentially well-behaved guests use case I missed. But TBH, the latter would be a call for the OS to be reworked as fast emulation of S/W will be really difficult. Am I, btw, understanding correctly that other than on x86 you intend PoD to not be used for maxmem > memory scenarios, at least for the time being? Yes. I don't think it would be difficult to add that support for Arm as well. Also, at the moment, PoD code is nearly a verbatim copy of the x86 version. And this is only because the interface with the rest p2m code. I am planning to discuss on the ML the possibility to share the PoD code. -- Julien Grall _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxxxxxxxxx https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |