On 01/08/2018 09:23, Jan Beulich wrote:
>>>> On 31.07.18 at 19:19, <ta...@tklengyel.com> wrote:
>> On Tue, Jul 31, 2018 at 5:53 AM Jan Beulich <jbeul...@suse.com> wrote:
>>>>>> On 25.07.18 at 13:49, <a...@bitdefender.com> wrote:
>>>> -        vcpu_altp2m(curr).veinfo_gfn = _gfn(a.u.enable_notify.gfn);
>>>> -        altp2m_vcpu_update_vmfunc_ve(curr);
>>>> +        vcpu_altp2m(v).veinfo_gfn = _gfn(a.u.enable_notify.gfn);
>>>> +        altp2m_vcpu_update_vmfunc_ve(v);
>>> I'd like you to outline in the description how you mean an external
>>> agent to coordinate the use of this GFN with the guest (and in
>>> particular without in-guest agent).
>> Using #VE without an in-guest agent isn't really possible so this is
>> really just about designating the page from dom0 instead of doing it
>> with the in-guest agent. Something has to be present in the guest to
>> handle the new interrupts coming from #VE after all.
> Not necessarily - the exception could also be intercepted, and the
> external agent be informed, with it taking appropriate action.
>
> Anyway - if such a dependency continues to exist, I think it would
> be desirable to mention it in the description.

Any setup which intercepts #VE defeats the entire purpose of using #VE
in the first place.

We'll eventually have to cope with this situation because its not one we
can architecturally rule out (especially with nested virt in the mix),
but intercepting #VE is not something we should make available as a
user-available option.

~Andrew

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to