Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
SUSE:SLE-12-SP1:GA
xen.10697
5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4...
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File 5a5cb24c-x86-mm-always-set-_PAGE_ACCESSED-on-L4-updates.patch of Package xen.10697
# Commit bd61fe94bee0556bc2f64999a4a8315b93f90f21 # Date 2018-01-15 13:53:16 +0000 # Author Andrew Cooper <andrew.cooper3@citrix.com> # Committer Andrew Cooper <andrew.cooper3@citrix.com> x86/mm: Always set _PAGE_ACCESSED on L4e updates Signed-off-by: Andrew Cooper <andrew.cooper3@citrix.com> Reviewed-by: Jan Beulich <jbeulich@suse.com> --- a/xen/arch/x86/mm.c +++ b/xen/arch/x86/mm.c @@ -1170,11 +1170,23 @@ get_page_from_l4e( _PAGE_USER|_PAGE_RW); \ } while ( 0 ) +/* + * When shadowing an L4 behind the guests back (e.g. for per-pcpu + * purposes), we cannot efficiently sync access bit updates from hardware + * (on the shadow tables) back into the guest view. + * + * We therefore unconditionally set _PAGE_ACCESSED even in the guests + * view. This will appear to the guest as a CPU which proactively pulls + * all valid L4e's into its TLB, which is compatible with the x86 ABI. + * + * At the time of writing, all PV guests set the access bit anyway, so + * this is no actual change in their behaviour. + */ #define adjust_guest_l4e(pl4e, d) \ do { \ if ( likely(l4e_get_flags((pl4e)) & _PAGE_PRESENT) && \ likely(!is_pv_32on64_domain(d)) ) \ - l4e_add_flags((pl4e), _PAGE_USER); \ + l4e_add_flags((pl4e), _PAGE_USER | _PAGE_ACCESSED); \ } while ( 0 ) #define unadjust_guest_l3e(pl3e, d) \
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor