|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v10] x86/altp2m: support for setting restrictions for an array of pages
On Wed, Dec 13, 2017 at 2:22 PM, Petre Pircalabu
<ppircalabu@xxxxxxxxxxxxxxx> wrote:
> From: Razvan Cojocaru <rcojocaru@xxxxxxxxxxxxxxx>
>
> For the default EPT view we have xc_set_mem_access_multi(), which
> is able to set an array of pages to an array of access rights with
> a single hypercall. However, this functionality was lacking for the
> altp2m subsystem, which could only set page restrictions for one
> page at a time. This patch addresses the gap.
>
> HVMOP_altp2m_set_mem_access_multi has been added as a HVMOP (as opposed to a
> DOMCTL) for consistency with its HVMOP_altp2m_set_mem_access counterpart (and
> hence with the original altp2m design, where domains are allowed - with the
> proper altp2m access rights - to alter these settings), in the absence of an
> official position on the issue from the original altp2m designers.
This mostly looks good to me, with a couple of nitpicks...
> diff --git a/tools/libxc/include/xenctrl.h b/tools/libxc/include/xenctrl.h
> index 666db0b..f171668 100644
> --- a/tools/libxc/include/xenctrl.h
> +++ b/tools/libxc/include/xenctrl.h
> @@ -1974,6 +1974,9 @@ int xc_altp2m_set_mem_access(xc_interface *handle,
> uint32_t domid,
> int xc_altp2m_change_gfn(xc_interface *handle, uint32_t domid,
> uint16_t view_id, xen_pfn_t old_gfn,
> xen_pfn_t new_gfn);
> +int xc_altp2m_set_mem_access_multi(xc_interface *handle, uint32_t domid,
> + uint16_t view_id, uint8_t *access,
> + uint64_t *pages, uint32_t nr);
Two minor things:
* It seems like it would make sense to put this directly under the
non-multi version of this call (even though that does put it out of
order with the command number)
* 'Pages' is ambiguous here, as it could be interpreted to mean Linux
virtual pages rather than gfn. Is there a reason not to call this
argument 'gfns' (as in the other xc call) or 'pfn_list' (as in the
hypercall)?
(And sorry if this has been covered before; I did do a quick look over
the history and didn't notice anything.)
> @@ -4619,6 +4623,37 @@ static int do_altp2m_op(
> a.u.set_mem_access.view);
> break;
>
> + case HVMOP_altp2m_set_mem_access_multi:
> + if ( a.u.set_mem_access_multi.pad ||
> + a.u.set_mem_access_multi.opaque > a.u.set_mem_access_multi.nr )
> + {
> + rc = -EINVAL;
> + break;
> + }
> +
> + /*
> + * The mask was set (arbitrary) to 0x3F to match the value used for
> + * MEMOP, despite the fact there are no encoding limitations for the
> + * start parameter.
> + */
This comment isn't actually very enlightening if you're not already
intimately familiar with the code; it took me at least 10 minutes of
grepping around to figure out what this was about.
What about this:
"Unlike XENMEM_access_op_set_access_multi, we don't need any bits of
the 'continuation' counter to be zero (to stash a command in).
However, 0x40 is a good 'stride' to make sure
that we make a reasonable amount of forward progress before yielding,
so use a mask of 0x3F here."
Everything else looks good to me.
-George
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxxx
https://lists.xenproject.org/mailman/listinfo/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |