All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Chen, Tiejun" <tiejun.chen@intel.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: kevin.tian@intel.com, ian.campbell@citrix.com,
	stefano.stabellini@eu.citrix.com,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	ian.jackson@eu.citrix.com, xen-devel@lists.xen.org,
	yang.z.zhang@intel.com
Subject: Re: [v5][PATCH 03/10] xen:x86: define a new hypercall to get RMRR mappings
Date: Mon, 01 Sep 2014 17:44:10 +0800	[thread overview]
Message-ID: <54043FEA.6080100@intel.com> (raw)
In-Reply-To: <54006196020000780002EFC6@mail.emea.novell.com>

On 2014/8/29 17:18, Jan Beulich wrote:
>>>> On 29.08.14 at 05:02, <tiejun.chen@intel.com> wrote:
>> I tried to figure out solution as you suggestion but I'd like show my
>> draft design before post anything to review since please give some
>> suggestions here:
>>
>> 1. In the xen/include/xen/iommu.h file,
>>
>> struct iommu_ops {
>> 	...
>> 	int (*get_device_reserved_memory)(struct list_head *dev_reserved_memory);
>>
>> 2. In the xen/drivers/passthrough/vtd/iommu.c file,
>>
>> extern int get_device_acpi_reserved_memory(struct list_head
>> *dev_reserved_memory);
>>
>> const struct iommu_ops intel_iommu_ops = {
>> 	...
>> 	.get_device_reserved_memory = get_device_acpi_reserved_memory,
>>
>> 3. In the xen/drivers/passthrough/vtd/dmar.c file,
>>
>> struct list_head devices_reserved_memory = LIST_HEAD_INIT (
>> devices_reserved_memory );
>> int get_device_acpi_reserved_memory(struct list_head *dev_reserved_memory)
>> {
>>       static unsigned int device_reserved_memory_entries = 0;
>>       static unsigned int check_done = 0;
>>       struct acpi_rmrr_unit *rmrru;
>>       struct device_acpi_reserved_memory *darm = NULL;
>>
>>       dev_reserved_memory = &devices_reserved_memory;
>>
>>       if ( check_done )
>>           return device_reserved_memory_entries;
>>       else
>>       {
>>           list_for_each_entry(rmrru, &acpi_rmrr_units, list)
>>           {
>>               darm = xzalloc(struct device_acpi_reserved_memory);
>>               if ( !darm )
>>                   return -ENOMEM;
>>
>>               darm->base_address = rmrru->base_address;
>>               darm->end_address = rmrru->end_address;
>>               list_add(&darm->list, &devices_reserved_memory);
>>               device_reserved_memory_entries++;
>>           }
>>       }
>>
>>       check_done = 1;
>>
>>       return device_reserved_memory_entries;
>> }
>>
>> 4. In the xen/include/asm-x86/acpi.h file,
>>
>> +struct device_acpi_reserved_memory {
>> +    struct list_head list;
>> +    u64    base_address;
>> +    u64    end_address;
>> +};
>>
>>
>> Here a couple of questions:
>>
>> 1. Here I introduce this struct device_acpi_reserved_memory to avoid
>> exposing that existing structure and list acpi_rmrr_units
>>
>> struct acpi_rmrr_unit {
>>       struct dmar_scope scope;
>>       struct list_head list;
>>       u64    base_address;
>>       u64    end_address;
>>       u16    segment;
>>       u8     allow_all:1;
>> };
>>
>> Because:
>>
>> 1> Actually we just need two fields, base_address and end_address.
>> 2> If reuse that structure, we still have to change some head files to
>> make sure we can use this in other files like I did in original patch #1
>> you don't like.
>>
>> So what is your idea?
>>
>> 2. Based on your isolation policy, I don't expose acpi_rmrr_units
>> directly. Instead, I will copy this to another list,
>> devices_reserved_memory as I show above.
>>
>> Is this reasonable and expected?
>
> This still allocates another instance of structures to create a second
> linked list. Did you consider get_device_reserved_memory() to take

Do you mean we still use this existing type combo, acpi_rmrr_units and 
acpi_rmrr_units?

> a callback function instead?
>

But we should do something like this,

1. .get_device_reserved_memory = get_drm_all,
2.  static int get_drm_all(struct list_head *dev_reserved_memory)
     {
         return (get_drm_callback(dev_reserved_memory));
     }

3. get_drm_callback = get_device_acpi_reserved_memory;
4.  static int get_device_acpi_reserved_memory(struct list_head 
*dev_reserved_memory)
     {
	...
	dev_reserved_memory = &acpi_rmrr_units;
	...
     }

Then while calling the hypercall,

struct list_head *dev_reserved_memory = NULL;
nr_entries = ops->get_device_reserved_memory(dev_reserved_memory);
if (!nr_entries)
	list_for_each_entry( darm, dev_reserved_memory, list )
	{
		xxx.start_pfn = ...;
		xxx.nr_pages = ...;
		if ( copy_to_guest_offset(buffer, i, &xxx, 1) )
		...
	}

Thanks
Tiejun

  reply	other threads:[~2014-09-01  9:44 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-26 11:02 [v5][PATCH 0/10] xen: reserve RMRR to avoid conflicting MMIO/RAM Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 01/10] xen:vtd:rmrr: export acpi_rmrr_units Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 02/10] xen:vtd:rmrr: introduce acpi_rmrr_unit_entries Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 03/10] xen:x86: define a new hypercall to get RMRR mappings Tiejun Chen
2014-08-26 12:02   ` Andrew Cooper
2014-08-26 12:37     ` Jan Beulich
2014-08-27  1:37       ` Chen, Tiejun
2014-08-27  6:51         ` Jan Beulich
2014-08-27  7:21           ` Chen, Tiejun
2014-08-28  2:24             ` Chen, Tiejun
2014-08-28  6:50               ` Jan Beulich
2014-08-28  7:09                 ` Chen, Tiejun
2014-08-28  7:19                   ` Chen, Tiejun
2014-08-28  7:29                     ` Chen, Tiejun
2014-08-28  7:44                     ` Jan Beulich
2014-08-29  3:02                       ` Chen, Tiejun
2014-08-29  9:18                         ` Jan Beulich
2014-09-01  9:44                           ` Chen, Tiejun [this message]
2014-09-01 10:29                             ` Jan Beulich
2014-09-02  9:59                               ` Chen, Tiejun
2014-09-02 10:15                                 ` Jan Beulich
2014-09-02 11:10                                   ` Chen, Tiejun
2014-09-02 13:15                                     ` Jan Beulich
2014-09-03  1:45                                       ` Chen, Tiejun
2014-09-03  8:31                                         ` Chen, Tiejun
2014-09-03  8:41                                           ` Jan Beulich
2014-09-03  8:59                                             ` Chen, Tiejun
2014-09-03  9:01                                               ` Chen, Tiejun
2014-09-03  9:54                                                 ` Chen, Tiejun
2014-09-03 12:54                                             ` Jan Beulich
2014-09-04  1:15                                               ` Chen, Tiejun
2014-09-03  8:35                                         ` Jan Beulich
2014-08-27  1:15     ` Chen, Tiejun
2014-09-02  8:25   ` Jan Beulich
2014-08-26 11:02 ` [v5][PATCH 04/10] tools:libxc: introduce hypercall for xc_reserved_device_memory_map Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 05/10] tools:libxc: check if mmio BAR is out of RMRR mappings Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 06/10] hvm_info_table: introduce nr_reserved_device_memory_map Tiejun Chen
2014-09-02  8:34   ` Jan Beulich
2014-09-04  2:07     ` Chen, Tiejun
2014-09-04  6:32       ` Jan Beulich
2014-09-04  6:55         ` Chen, Tiejun
     [not found]           ` <54082E3B0200007800030BCB@mail.emea.novell.com>
2014-09-09  6:40             ` Chen, Tiejun
2014-08-26 11:02 ` [v5][PATCH 07/10] xen:x86:: support xc_reserved_device_memory_map in compat case Tiejun Chen
2014-09-02  8:35   ` Jan Beulich
2014-09-04  2:13     ` Chen, Tiejun
2014-08-26 11:02 ` [v5][PATCH 08/10] tools:firmware:hvmloader: introduce hypercall for xc_reserved_device_memory_map Tiejun Chen
2014-09-02  8:37   ` Jan Beulich
2014-08-26 11:02 ` [v5][PATCH 09/10] tools:firmware:hvmloader: check to reserve RMRR mappings in e820 Tiejun Chen
2014-09-02  8:47   ` Jan Beulich
2014-09-04  3:04     ` Chen, Tiejun
2014-09-04  4:32       ` Chen, Tiejun
2014-09-04  6:36       ` Jan Beulich
2014-08-26 11:03 ` [v5][PATCH 10/10] xen:vtd: make USB RMRR mapping safe Tiejun Chen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=54043FEA.6080100@intel.com \
    --to=tiejun.chen@intel.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=kevin.tian@intel.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=xen-devel@lists.xen.org \
    --cc=yang.z.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.