[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 1/5] common: don't (kind of) open-code rcu_lock_domain_by_any_id()


  • To: Jan Beulich <jbeulich@xxxxxxxx>
  • From: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
  • Date: Wed, 13 Jan 2021 22:42:52 +0000
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=CHK3TPbEvP80D9hfpjBRtbp2box2kCz7820JZ3w17zU=; b=hN96yu9eCam9P7wMKwlzVyHbB1T93z8wNwDf/WVooJsgQHNhk2EBHuXUFAvIxAXhIKwPAuZkCUbbOfUig+8W+NKGX77w1qGjGZx4EUchcfdkO69Odp6p1Vwb1z1mTJBKBu7xYtNgwE4rqWAEfPYGi7QMWYiUhm5kCqx1Tlmgc52u5Y3lr/hsEMH95bx2tflz1Xs7oydKJTTaXis8QVLCduAeGVxGrHa969MUej/uWh8xcfzR6q7Dn99SyrhPNEP7Mgvdahck/1HdMfWmF2Q0SvP/+mtq2FLa+lHJ/D3TUO8oLgZnKcmLf5X/J2Pl3UCBkEa7qsJyV36Vf2nrK6rkRw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=X2jqFVHCN6ruGjSESLcGtPGcbIUoJIlJBtSuni7W44to43koHa2ggOI6W5EC8kzntjYVJYYpc7+GPDQhUGzfAbTz0XKoGnveFXtRLZqn/X9hm4s2YonNS4fkQd/rnMprF/mt26zZ1NKIKKB4VfgY+yu8J+asLTWl8F6rrpDXSBkS/miFNFaplLY1+lknEqFbliLjwnow5hMy5DR6FZg0OhBxD7xatRa4ie9XuiXLDaWpoqjbJ4EGNnGlctWLoBV2PX4Gg+pKkVJlbsbBtQPtAAx4wJbKL794bfFDif31uwtcTon10Uucn5fQHfXrBiSG/VWX3sSGG+2vxO7EiKNmHw==
  • Authentication-results: esa3.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: George Dunlap <george.dunlap@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Wed, 13 Jan 2021 22:43:21 +0000
  • Ironport-sdr: 4jcvqLg62+Uht7JpxIWMPJmRqjf9DSEsQkrcnTt/ndfwBYceYc5Gl2TXkFPPJXzC+koQqOVlwu sunoGlk8EgDaaLt1RTr8/Uo/196NqKwMXmTtA/oArz2SfAHrO/ph7X22iprMdLvKaHh5Tk8CMb 0DbShPDBOCIMovQRQ0KxRE2u3BvTJsRqkUufrJDx84YBhHMXDusgtLqv7AFXRdkf+i1dvunsjV 6HfYMs5Ou6omuhA7//2X4WoB3M9dvMkwsKyZ9gzU1rcEKBaX9E3GnWy5EsSweqhraSjK3mRNWq q+Q=
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

On 05/01/2021 14:17, Jan Beulich wrote:
>>> ---
>>> Besides get_pg_owner(), gnttab_copy_lock_domain() has similar strange(?)
>>> behavior: They accept DOMID_SELF, but not the resolved ID of the caller.
>> I queried that behaviour years and years ago.
>>
>> According to Keir, it is part of the attempt to force guests to not know
>> their own domid.  Xen itself does (or did) its very hardest to prevent a
>> domU knowing its own domid, while at the same time the "domid" key in
>> xenstore is mandatory for setting up PV rings.
>>
>> I'd personally think was a short sighted move.
> Let me make another patch then, unless you can see reasons we should
> stick to the current behavior. Figuring out its own domid is possible
> for a domain, after all, and even shouldn't be overly difficult.

I don't see any reason to keep these semantics, other than the general
argument against relaxing things vs compatibility with older hypervisors.

I honestly can't make up my mind, so whichever you prefer.

~Andrew



 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.