Received: by 2002:a05:7412:37c9:b0:e2:908c:2ebd with SMTP id jz9csp165210rdb; Mon, 18 Sep 2023 11:06:05 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHJTo8Ru73JZVJm5krWzqCLWBlYjtVwZSkBAwLZ/YtG3UR+7q8/AF1yVAmBUHMrr0urGl8R X-Received: by 2002:a17:90a:6f82:b0:271:8195:8 with SMTP id e2-20020a17090a6f8200b0027181950008mr7521105pjk.36.1695060364784; Mon, 18 Sep 2023 11:06:04 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1695060364; cv=none; d=google.com; s=arc-20160816; b=pCVVuZPdT7k9JcaOG/2euRtfViXlF638CEhpXaBJAD9tuSeiV+YA+gNfpfngS2eWII EF3JegNwfhDugSg6pfWkxZOwUqDZVvvK1eU4eUYqTLQZ4A5zDsviJ5Jc+7PBvgDnmDvD 8W2iPXm7QIw6HHfp3oUnNu0mtDAHdv42AQcKOIS1Mw9FoWWycttYvhAZGm8WOuJZLSHI 6ehhOc4QoQXn/fxWPRiD2Ta/3Lu/FtbPLNxGVspQYuXjUduyriXtmTiIRuFTgiQWJhHV 3N+++LKSUHUSK5uipE4xFXgGbnk+9ZOBn7I1oJ7oaYwYfTQBMjfPp6wfkwBHG8BGcZfj i6gg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to :organization:references:cc:to:content-language:subject:reply-to :user-agent:mime-version:date:message-id:from:dkim-signature; bh=JZ3JSQvJQMgOVE1TzYd6UzlsQe8p5pvEt2T0V1nl2QE=; fh=HGLutpz6RY0kacqJTSRk01cm8WKCcgEcQ15ZTFCnXzU=; b=xu9Q/snmAKbD7Rwysw1G6iXho31XWbe6J1lHlRU9hssJlP4wh5/KCsRM/ouN2gLTbN x1TBUfmkmIIJkOt5UN6h353Vwj71v3uJYjWScfzYi+tXFIMHrcB3AR/ogovkhUS2Dcti Ukt/7EbaMAFCIoDPYvjhJDQPhY/uyLtgUpKvYUzUvrqL03gu7dULX8P+459QTZvsEPWc 8igwiSnjRh/41YnialAql0v8/07PxJTP5JKtBoTMAQMXKYMFt1Pnmezos7ZqnXokgTMk UrHqmOmepYqrYBc9gEBtyGTGx3mN6+StfocfIew2Tq5v9d0cGvLwf5aoZzX7BsgMWe+h hB4A== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=j6yDprON; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id fz14-20020a17090b024e00b00274ac601d66si5401159pjb.11.2023.09.18.11.05.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 18 Sep 2023 11:06:04 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20230601 header.b=j6yDprON; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id E33A181552DA; Mon, 18 Sep 2023 10:00:21 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231229AbjIRRAA (ORCPT + 99 others); Mon, 18 Sep 2023 13:00:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231428AbjIRQ7l (ORCPT ); Mon, 18 Sep 2023 12:59:41 -0400 Received: from mail-lf1-x12f.google.com (mail-lf1-x12f.google.com [IPv6:2a00:1450:4864:20::12f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 592E6FF; Mon, 18 Sep 2023 09:59:34 -0700 (PDT) Received: by mail-lf1-x12f.google.com with SMTP id 2adb3069b0e04-500bbe3ef0eso5607721e87.1; Mon, 18 Sep 2023 09:59:34 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1695056372; x=1695661172; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:from:to:cc:subject:date:message-id:reply-to; bh=JZ3JSQvJQMgOVE1TzYd6UzlsQe8p5pvEt2T0V1nl2QE=; b=j6yDprONRh8TGwEjLzzNvsz0syrDz7khaN823VxMly4IE+9F8CB8GjGft6jgxJaqba TtCsrxwOtoEtOZuWtlfkz5ofbpCFKwAzAHYz2HUCU4Bvdnafh1k7OS9twBXrNdUTnNzF Uo9K/oRzV8djYxYs2CCcWd5lzyov6iZGO/dpbbyIanjp89cRdtD+n7ZHi0RSAXog6CHN 5urt/bPCLX9JxposblWcSzTQ1JPKGp4Z4LIvBDjTlmjPZaO6vlRGqiJ13PlzJtltApvB Lc5CJ+MS//0DMXkozifbcHX+gvV/byrUBJNHSMFdz6isp5NXcyqA8Vwr9I4RNjaxlXqo utyw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1695056372; x=1695661172; h=content-transfer-encoding:in-reply-to:organization:references:cc:to :content-language:subject:reply-to:user-agent:mime-version:date :message-id:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=JZ3JSQvJQMgOVE1TzYd6UzlsQe8p5pvEt2T0V1nl2QE=; b=mhpFEk7jBBkAFnXYh8JIIpFZbuj/NrLJPewBYj+mAdpIhQ0LI/lodwHSKYGMFEHkWM Mjhp+bwVXZqvaj+YkrBNiUb3aXAH9HQZOkmSDF9+Igbei56Rx7a7nEUm6w0cHVQ8AvdD bb/QflXbpmKJwwwUBkxNAN0A/cWmMPRRFI6AZC4OrfxypZG14f38xy1V9VwdVHz47nmq 9z6tjP8unINYwR3rMn6nLIH8RIByA/5HcktIZ8lnkEYg+dEQsUkTRvHWYpIB3xwWfZBu lX6zVwYbMqI0RfYQF7VeAKWihpYolWPaFgJqR4t44mf8hKEwkA0bA7ma2oFM8oZmQeEU aHcg== X-Gm-Message-State: AOJu0YzaFbfzhMg3hE6SJ5rU1y0Ya9NYAf1cMTujtMDqQbgBrUQCIMYH xqWj/ZDmhEdlH3JrJbHNxcKHNjHopBz92oEM X-Received: by 2002:a05:600c:1914:b0:401:bcec:be3e with SMTP id j20-20020a05600c191400b00401bcecbe3emr9304019wmq.17.1695046492186; Mon, 18 Sep 2023 07:14:52 -0700 (PDT) Received: from [192.168.7.59] (54-240-197-228.amazon.com. [54.240.197.228]) by smtp.gmail.com with ESMTPSA id a4-20020a05600c068400b004042dbb8925sm12393009wmn.38.2023.09.18.07.14.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 18 Sep 2023 07:14:51 -0700 (PDT) From: Paul Durrant X-Google-Original-From: Paul Durrant Message-ID: <27d414c3-095b-3304-f99e-72c105a30ac0@xen.org> Date: Mon, 18 Sep 2023 15:14:50 +0100 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.15.0 Reply-To: paul@xen.org Subject: Re: [PATCH v2 11/12] KVM: selftests / xen: don't explicitly set the vcpu_info address Content-Language: en-US To: David Woodhouse , Paul Durrant , kvm@vger.kernel.org, linux-kernel@vger.kernel.org Cc: Paul Durrant , Sean Christopherson , Paolo Bonzini References: <20230918112148.28855-1-paul@xen.org> <20230918112148.28855-12-paul@xen.org> <56dad458-8816-2de5-544e-a5e50c5ad2a2@xen.org> <425F7A5D-58D1-4D94-A88C-E7B1EAEAD084@infradead.org> Organization: Xen Project In-Reply-To: <425F7A5D-58D1-4D94-A88C-E7B1EAEAD084@infradead.org> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 7bit X-Spam-Status: No, score=-2.1 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,NICE_REPLY_A, SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Mon, 18 Sep 2023 10:00:22 -0700 (PDT) On 18/09/2023 15:05, David Woodhouse wrote: > > > On 18 September 2023 14:41:08 BST, Paul Durrant wrote: >> Well, if the VMM is using the default then it can't unmap it. But setting a vcpu_info *after* enabling any event channels would be a very odd thing for a guest to do and IMO it gets to keep the pieces if it does so. > > > Hm, I suppose I'm OK with that approach. The fact that both VMM implementations using this KVM/Xen support let the guest keep precisely those pieces is a testament to that :) > I can have the selftest explicitly set the vcpu_info to point at the one that's already in use, I suppose... so the would at least make sure the attribute is functioning. > But now we're hard-coding the behaviour in the kernel and declaring that no VMM will be *able* to "fix" that case even if it does want to. So perhaps it wants a modicum more thought and at least some explicit documentation to that effect? > > And a hand-wavy plan at least for what we'd do if we suddenly did find a reason to care? Handwavy plan would be for the VMM to: a) Mask all open event channels targetting the vcpu b) Copy vcpu_info content to the new location c) Tell KVM where it is d) Unmask the masked event channels Does that sound ok? If so I can stick it in the API documentation.