On Thu, Jan 9, 2025 at 9:30 AM Oleksii Kurochko
<oleksii.kuroc...@gmail.com> wrote:
>
>
> On 1/2/25 6:13 PM, Petr Beneš wrote:
>
> From: Petr Beneš <w1be...@gmail.com>
>
> Changes since v2:
> - Reset entry->pw in all cases in p2m_set_entry, except for p2m_access_r_pw
>
> Changes since v1:
> - Added signed-off-by tags
>
> This patch introduces a new XENMEM_access_r_pw permission. Functionally, it 
> is similar to XENMEM_access_r, but for processors with 
> TERTIARY_EXEC_EPT_PAGING_WRITE support (Intel 12th Gen/Alder Lake and later), 
> it also permits the CPU to write to the page during guest page-table walks 
> (e.g., updating A/D bits) without triggering an EPT violation.
>
> This behavior works by both enabling the EPT paging-write feature and setting 
> the EPT paging-write flag in the EPT leaf entry.
>
> This feature provides a significant performance boost for introspection tools 
> that monitor guest page-table updates. Previously, every page-table 
> modification by the guest—including routine updates like setting A/D 
> bits—triggered an EPT violation, adding unnecessary overhead. The new 
> XENMEM_access_r_pw permission allows these "uninteresting" updates to occur 
> without EPT violations, improving efficiency.
>
> Considering that this feature provides a significant performance boost for 
> introspection tools probably we could consider to take it to current release.
>
> I see that the patch series was acked-by "Acked-by: Tamas K Lengyel 
> <ta...@tklengyel.com>" but based on the change log it is not clear when 
> exactly
>
> before Feature freeze date or not. ( and I don't see any reply from Tamas ).

I've acked the patch Thu, Dec 19, 2024.

Cheers,
Tamas

Reply via email to