On 21/12/2018 11:13, Jan Beulich wrote: >>>> On 20.12.18 at 18:16, <andrew.coop...@citrix.com> wrote: >> Switch parse_ept_param() to use the parse_boolean() infrastructure for more >> consistency with related command line parameters. Rename opt_pml_enabled to >> opt_ept_pml for consistency with opt_ept_ad, and switch it to being bool >> >> Drop the comment leading comment for parse_ept_param(). It is stale, and >> just > Nit: There's one "comment" to many here.
Oops - will fix. > >> --- a/docs/misc/xen-command-line.markdown >> +++ b/docs/misc/xen-command-line.markdown >> @@ -841,29 +841,37 @@ effect the inverse meaning. >> >> Allows mapping of RuntimeServices which have no cachability attribute >> >> set as UC. >> >> -### ept (Intel) >> -> `= List of ( {no-}pml | {no-}ad )` >> +### ept >> +> `= List of [ ad=<bool>, pml=<bool> ]` >> >> -Controls EPT related features. >> +> Applicability: Intel >> >> -> Sub-options: >> - >> -> `pml` >> +Extended Page Tables are a feature of Intel's VT-x technology, whereby >> +hardware manages the virtualisation of HVM guest pagetables. EPT was >> +introduced with the Nehalem architecture. >> >> -> Default: `true` >> +* The `ad` boolean controls hardware tracking of Access and Dirty bits in >> the >> + EPT pagetables, and was first introduced in Broadwell Server. >> >> ->> PML is a new hardware feature in Intel's Broadwell Server and further >> ->> platforms which reduces hypervisor overhead of log-dirty mechanism by >> ->> automatically recording GPAs (guest physical addresses) when guest memory >> ->> gets dirty, and therefore significantly reducing number of EPT violation >> ->> caused by write protection of guest memory, which is a necessity to >> ->> implement log-dirty mechanism before PML. >> + By default, Xen will use A/D tracking when available in hardware, except >> + on Avoton processors affected by erratum AVR41. Explicitly choosing >> + `ad=0` will disable the use of A/D tracking on capable hardware, whereas >> + choosing `ad=1` will cause tracking to be used even on AVR41-affected >> + hardware. > Is there any reason for this special casing of the one erratum? > Earlier this week I've gone through some spec updates for other > purposes, and I've seen some rather frightening EPT A/D errata. Which, out of interest? There are a few, particularly on Skylake, but all the problematic ones I'm aware of are fixed in microcode. ~Andrew _______________________________________________ Xen-devel mailing list Xen-devel@lists.xenproject.org https://lists.xenproject.org/mailman/listinfo/xen-devel