All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Chen, Tiejun" <tiejun.chen@intel.com>
To: Jan Beulich <JBeulich@suse.com>, Kevin Tian <kevin.tian@intel.com>
Cc: Yang Z Zhang <yang.z.zhang@intel.com>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>,
	"ian.jackson@eu.citrix.com" <ian.jackson@eu.citrix.com>,
	"ian.campbell@citrix.com" <ian.campbell@citrix.com>,
	"stefano.stabellini@eu.citrix.com"
	<stefano.stabellini@eu.citrix.com>
Subject: Re: [v6][PATCH 0/7] xen: reserve RMRR to avoid conflicting MMIO/RAM
Date: Thu, 11 Sep 2014 17:39:15 +0800	[thread overview]
Message-ID: <54116DC3.9020506@intel.com> (raw)
In-Reply-To: <54116FDA0200007800033AEC@mail.emea.novell.com>

On 2014/9/11 15:48, Jan Beulich wrote:
>>>> On 11.09.14 at 03:38, <tiejun.chen@intel.com> wrote:
>> On 2014/9/11 5:44, Tian, Kevin wrote:
>>>> From: Chen, Tiejun
>>>> Sent: Tuesday, September 09, 2014 10:50 PM
>>>>
>>>
>>> currently the confliction is detected absolutely. Do we need a way to allow
>>> the confliction if there is no device assigned at all?
>>
>> How to handle a hot-plug case when guest already boot? I think it may
>> not be worth distinguishing such fine gain, things will be becoming
>> complicated.
>
> In that case hotplug should fail. I'm very much in agreement with
> Kevin that an override should be possible if there's any risk of the
> detection done now could cause problems on certain systems (as
> pointed out before, I'm mainly concerned about RMRRs being
> defined in regions that overlap where the guest's BIOS wants to
> be placed).
>

Looks I have to refactor most codes again :)

I just take a quick look at Xen codes to try figuring out this possible 
way. As I see, either we do assign a device when create VM, or we do 
attach a device to a running VM, eventually we always call 
libxl__device_pci_add() to finish this operation. Furthermore, 
xc_test_assign_device() call such a hypercall, 
XEN_DOMCTL_test_assign_device. Right?

If yes, I guess I can do check if RMRR is overlapping something in two 
cases:

#1: In case of creating a VM, we may use global flag to make sure our 
original codes work indeed. It should be easy and especially I guess we 
can't check any conflict directly here since those memory info, 
RAM/MMIO/others, don't be filled completely, right?

#2: In case of a running VM, we can check if any overlapping exist then 
determine what's next. Often we should drop to attach such a conflicting 
device.

I'm not sure if I understand this path in Xen, so if I'm wrong please 
correct me.

Thanks
Tiejun	

  reply	other threads:[~2014-09-11  9:39 UTC|newest]

Thread overview: 37+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-09-10  5:49 [v6][PATCH 0/7] xen: reserve RMRR to avoid conflicting MMIO/RAM Tiejun Chen
2014-09-10  5:49 ` [v6][PATCH 1/7] introduce XENMEM_reserved_device_memory_map Tiejun Chen
2014-09-10 21:34   ` Tian, Kevin
2014-09-10  5:49 ` [v6][PATCH 2/7] tools/libxc: introduce hypercall for xc_reserved_device_memory_map Tiejun Chen
2014-09-11 15:21   ` Jan Beulich
2014-09-11 15:23     ` Ian Campbell
2014-09-11 15:55     ` Andrew Cooper
2014-09-12  2:43     ` Chen, Tiejun
2014-09-12  6:20       ` Jan Beulich
2014-09-10  5:49 ` [v6][PATCH 3/7] tools/libxc: check if mmio BAR is out of reserved device memory maps Tiejun Chen
2014-09-10 21:37   ` Tian, Kevin
2014-09-11  1:14     ` Chen, Tiejun
2014-09-11 22:55       ` Tian, Kevin
2014-09-11 15:38   ` Jan Beulich
2014-09-12  2:56     ` Chen, Tiejun
2014-09-12  6:19     ` Jan Beulich
2014-09-10  5:49 ` [v6][PATCH 4/7] libxc/hvm_info_table: introduce a new field nr_reserved_device_memory_map Tiejun Chen
2014-09-10 21:39   ` Tian, Kevin
2014-09-11  1:16     ` Chen, Tiejun
2014-09-10  5:49 ` [v6][PATCH 5/7] hvmloader: introduce hypercall for xc_reserved_device_memory_map Tiejun Chen
2014-09-10 21:41   ` Tian, Kevin
2014-09-11  1:32     ` Chen, Tiejun
2014-09-11  7:52     ` Jan Beulich
2014-09-11 15:45   ` Jan Beulich
2014-09-12  4:52     ` Chen, Tiejun
2014-09-10  5:49 ` [v6][PATCH 6/7] hvmloader: check to reserved device memory maps in e820 Tiejun Chen
2014-09-11 15:57   ` Jan Beulich
2014-09-12  6:08     ` Jan Beulich
2014-09-12  6:28     ` Chen, Tiejun
2014-09-12  6:44       ` Jan Beulich
2014-09-10  5:49 ` [v6][PATCH 7/7] xen/vtd: make USB RMRR mapping safe Tiejun Chen
2014-09-18  9:11   ` Jan Beulich
2014-09-10 21:44 ` [v6][PATCH 0/7] xen: reserve RMRR to avoid conflicting MMIO/RAM Tian, Kevin
2014-09-11  1:38   ` Chen, Tiejun
2014-09-11  7:48     ` Jan Beulich
2014-09-11  9:39       ` Chen, Tiejun [this message]
2014-09-11 10:01         ` Jan Beulich

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=54116DC3.9020506@intel.com \
    --to=tiejun.chen@intel.com \
    --cc=JBeulich@suse.com \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=kevin.tian@intel.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=xen-devel@lists.xen.org \
    --cc=yang.z.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.