[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [PATCH 08/23] xen/arm: dom0less seed xenstore grant table entry
- To: Jan Beulich <jbeulich@xxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>
- From: Jason Andryuk <jason.andryuk@xxxxxxx>
- Date: Mon, 10 Mar 2025 10:27:39 -0400
- Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 165.204.84.17) smtp.rcpttodomain=suse.com smtp.mailfrom=amd.com; dmarc=pass (p=quarantine sp=quarantine pct=100) action=none header.from=amd.com; dkim=none (message not signed); arc=none (0)
- Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=geaTB8mPm2fWaiIupQ1JAg4MkRjVCDpL2PfsvtAKg1U=; b=C47KSUKWDOJNFu4aYp1wnrHgTi0TErHSpb2rw4YkmOzbgveyB33i4E+7UekuvJh/Kbpu8+tPIUbpUtXZfuXN29rAKewtM4+RkkNbVOnS2MHFx0mLQQ9Ub0BTSKba/nNaPusVKV2otlYe61IeE9nAPqo6lmv7LHHZKDZeQ9foZHgUFvsnLqupQou2qkLampU88wpK9VUMVqs5e+FKZpLsmj+PYS9JPyVf7KLS59ici4y4F1SmNEn3J9x92TUUV+TQxm0J9Shbh+Vp9UTNhiOyidnr7Y6bqRZS2qKCrc4qtqN2x9vE/czfRwEXH40ku4q9Dw2CcpWbupoQeaq1bT4C4A==
- Arc-seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=ayhD6TlHJcTdF3RpvwQfdKGfGr2j5vyd0nfkKQ4xJkX9C/mzDZoEmxLc1jXpZrB2qcjzZqZM96mTimwJif7zVxVLG3w5dHjtn3mZTYqxh1GwT1j4GHN0bRrPKAQzobd4n4DLFLdM5sVUcxBaXYpxy0fChBC4ol/eLKRw1mtwjnOvZgoLvITeurD/Ait0KC7c1YThs7yXrnJ6OTGgCBYCd75T2I/iQyWmRrQJl9A+A35utFq0RlxYZUC60hNzb/NAjUlqtBCHRG9MFKmnxYgaYa3f8pen3CE97WqkxQ/UCcqgoeuGPgffC04RWLld7feu6xyF/VIctEkVOfaX+9i8Xw==
- Cc: Stefano Stabellini <sstabellini@xxxxxxxxxx>, Julien Grall <julien@xxxxxxx>, Bertrand Marquis <bertrand.marquis@xxxxxxx>, Michal Orzel <michal.orzel@xxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Roger Pau Monné <roger.pau@xxxxxxxxxx>, <xen-devel@xxxxxxxxxxxxxxxxxxxx>
- Delivery-date: Mon, 10 Mar 2025 14:28:08 +0000
- List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
On 2025-03-10 04:21, Jan Beulich wrote:
On 10.03.2025 09:17, Juergen Gross wrote:
On 10.03.25 09:01, Jan Beulich wrote:
On 06.03.2025 23:03, Jason Andryuk wrote:
+ shared_entry_v1(gt, idx).flags = flags;
+ shared_entry_v1(gt, idx).domid = be_domid;
+ shared_entry_v1(gt, idx).frame = frame;
+}
In common code there shouldn't be an assumption that gnttab v1 is in use.
But isn't the grant table in V1 format until the guest potentially switches
to V2?
Strictly speaking it's in v0 format initially. But yes, I see your point.
Provided this function is made clear that it may only ever be used on a
domain that wasn't started yet (perhaps proven by way of an assertion).
Yes, this is what I was relying on.
If d is still passed in, we could do
ASSERT(!d->creation_finished);
Hmmm, the function might could be marked __init, too, I think.
struct grant_table and shared_entry_v1 are defined in
xen/common/grant_table.c, which is why the function lives there (and
it'll be useful for hyperlaunch). To avoid unreachable code, I guess
I'll wrap it inside #ifdef CONFIG_DOM0LESS_BOOT.
Regards,
Jason
|