All of lore.kernel.org
 help / color / mirror / Atom feed
From: George Dunlap <george.dunlap@eu.citrix.com>
To: "Chen, Tiejun" <tiejun.chen@intel.com>
Cc: Kevin Tian <kevin.tian@intel.com>, Keir Fraser <keir@xen.org>,
	Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Tim Deegan <tim@xen.org>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>,
	Aravind Gopalakrishnan <Aravind.Gopalakrishnan@amd.com>,
	Jan Beulich <jbeulich@suse.com>,
	Yang Zhang <yang.z.zhang@intel.com>,
	Stefano Stabellini <stefano.stabellini@citrix.com>,
	Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy
Date: Wed, 1 Jul 2015 11:02:19 +0100	[thread overview]
Message-ID: <5593BAAB.20801@eu.citrix.com> (raw)
In-Reply-To: <55933E4D.4030405@intel.com>

On 07/01/2015 02:11 AM, Chen, Tiejun wrote:
> On 2015/6/30 22:20, George Dunlap wrote:
>> On 06/30/2015 12:24 PM, Chen, Tiejun wrote:
>>>>> +#define XEN_DOMCTL_DEV_NO_RDM           0
>>>>> +#define XEN_DOMCTL_DEV_RDM_RELAXED      1
>>>>> +#define XEN_DOMCTL_DEV_RDM_STRICT       2
>>>>> +    uint32_t  flag;   /* flag of assigned device */
>>>>
>>>> Normally flags would be bit fields, not values like this.
>>>>
>>>> Also, what's the distinction between RDM and RMRR, and is there a good
>>>> reason to use the first here rather than the second?
>>>>
>>>> It's also not clear to me what NO_RDM is meant to be for -- is it
>>>> meant to be an assertion that the caller expects the device to have no
>>>> RMRRs associated with it?
>>>>
>>>
>>> All concerns what you're raising above just make me realized you're
>>> missing all background info and history changes. So I think if you
>>> really would like to review this series, at least you should take a look
>>> at our previous design and some basic change log, which are mentioned
>>> inside patch #00.
>>
>> I did read #00, but I missed the RDM/RMRR thing.  I still don't see what
> 
> Thanks.
> 
>> NO_RDM is for.
>>
>> In any case, all the information needed to actually understand the code
>> needs to be checked into the tree, and patch 00 isn't going to be
>> checked in.  The choice about naming isn't important, but it should be
>> possible to look at the patch+changeset and figure out what NO_RDM is
>> supposed to be doing and why.
> 
> From my point of view, "NO" should be clear at certain point, right?

Well, I'm afraid it's not.

Looking through the entire series, it *appears* that "NO_RDM" is meant
to be passed for architectures like ARM DeviceTree, where it is known
that no RDM regions can exist.

But it might also mean "I expect this device not to have any RDM
regions".  And it's certainly not immediately obvious what the effective
difference would be when I choose it -- what happens if I pass NO_RDM
for PCI systems?  How is it different than passing STRICT?

And in any case, as I said, reviewers and future archaeologists should
be able to tell from the individual patch what is meant, not have to go
through the entire series and guess.

> If you want delve into the reason why we called it, you can refer to,
> 
> http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg01223.html
> 
> http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg01747.html
> 
> http://lists.xenproject.org/archives/html/xen-devel/2015-05/msg01793.html

As I said, all the information needed to understand the patch needs to
be in the changelog.  Those messages will not be in the changelog, so
they are irrelevant to my main complaint.

>> And finally, I have now looked through the patch history, and my initial
>> question was not covered: In the rest of domctl.h, "flags" is a bit
>> array of boolean values.  Here, at the moment, it is a tristate: 0, 1,
> 
> /* XEN_DOMCTL_createdomain */
> struct xen_domctl_createdomain {
>     /* IN parameters */
>     uint32_t ssidref;
>     xen_domain_handle_t handle;
>  /* Is this an HVM guest (as opposed to a PVH or PV guest)? */
> #define _XEN_DOMCTL_CDF_hvm_guest     0
> #define XEN_DOMCTL_CDF_hvm_guest      (1U<<_XEN_DOMCTL_CDF_hvm_guest)
>  /* Use hardware-assisted paging if available? */
> #define _XEN_DOMCTL_CDF_hap           1
> #define XEN_DOMCTL_CDF_hap            (1U<<_XEN_DOMCTL_CDF_hap)
>  /* Should domain memory integrity be verifed by tboot during Sx? */
> #define _XEN_DOMCTL_CDF_s3_integrity  2
> #define XEN_DOMCTL_CDF_s3_integrity   (1U<<_XEN_DOMCTL_CDF_s3_integrity)
>  /* Disable out-of-sync shadow page tables? */
> #define _XEN_DOMCTL_CDF_oos_off       3
> #define XEN_DOMCTL_CDF_oos_off        (1U<<_XEN_DOMCTL_CDF_oos_off)
>  /* Is this a PVH guest (as opposed to an HVM or PV guest)? */
> #define _XEN_DOMCTL_CDF_pvh_guest     4
> #define XEN_DOMCTL_CDF_pvh_guest      (1U<<_XEN_DOMCTL_CDF_pvh_guest)
>     uint32_t flags;

Yes, this demonstrates my point.  Each of these is a single-bit boolean
value that takes up a single bit -- either on or off.  But here you have
three values -- NO_DRM, RELAXED, and STRICT, that take up two bits.  If
you add more flags like this, then all the code which says "if (flags >
N)" will need to be changed to mask out the higher bits.

 -George

  reply	other threads:[~2015-07-01 10:02 UTC|newest]

Thread overview: 114+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-06-23  9:57 [v4][PATCH 00/19] Fix RMRR Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 01/19] xen: introduce XENMEM_reserved_device_memory_map Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 02/19] xen/x86/p2m: introduce set_identity_p2m_entry Tiejun Chen
2015-06-25  9:59   ` Tim Deegan
2015-07-01 15:43   ` George Dunlap
2015-06-23  9:57 ` [v4][PATCH 03/19] xen/vtd: create RMRR mapping Tiejun Chen
2015-06-23 10:12   ` Jan Beulich
2015-06-24  1:11     ` Chen, Tiejun
2015-06-24  6:48       ` Jan Beulich
2015-06-24  7:26         ` Chen, Tiejun
2015-06-24  7:33           ` Jan Beulich
2015-06-30 10:40             ` George Dunlap
2015-06-30 11:19               ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy Tiejun Chen
2015-06-30 11:08   ` George Dunlap
2015-06-30 11:24     ` Chen, Tiejun
2015-06-30 14:20       ` George Dunlap
2015-07-01  1:11         ` Chen, Tiejun
2015-07-01 10:02           ` George Dunlap [this message]
2015-07-01 10:47             ` Chen, Tiejun
2015-07-01 14:39               ` George Dunlap
2015-07-01 15:06                 ` Julien Grall
2015-07-02  6:50                 ` Chen, Tiejun
2015-07-06 14:55                   ` Chen, Tiejun
2015-07-07  6:36                     ` Chen, Tiejun
2015-07-06 10:34               ` Jan Beulich
2015-07-06 10:56                 ` George Dunlap
2015-07-06 10:56                 ` Chen, Tiejun
2015-07-06 11:39                   ` Jan Beulich
2015-07-01 16:30   ` George Dunlap
2015-07-02  8:49     ` Chen, Tiejun
2015-07-06 14:52       ` Chen, Tiejun
2015-07-07  6:37         ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 05/19] xen: enable XENMEM_memory_map in hvm Tiejun Chen
2015-07-01 16:32   ` George Dunlap
2015-06-23  9:57 ` [v4][PATCH 06/19] hvmloader: get guest memory map into memory_map[] Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 07/19] hvmloader/pci: skip reserved ranges Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 08/19] hvmloader/e820: construct guest e820 table Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 09/19] tools/libxc: Expose new hypercall xc_reserved_device_memory_map Tiejun Chen
2015-06-25 10:44   ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 10/19] tools: extend xc_assign_device() to support rdm reservation policy Tiejun Chen
2015-06-25 10:54   ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy Tiejun Chen
2015-06-25 11:38   ` Wei Liu
2015-06-25 12:13   ` Ian Campbell
2015-06-26  8:38     ` Chen, Tiejun
2015-06-26  8:57       ` Ian Campbell
2015-06-26  9:36         ` Chen, Tiejun
2015-06-26 12:06           ` Wei Liu
2015-06-29  1:01             ` Chen, Tiejun
2015-06-30  3:08           ` Chen, Tiejun
2015-06-30  8:30             ` Ian Campbell
2015-06-30  9:38               ` Chen, Tiejun
2015-07-07 11:36                 ` Ian Campbell
2015-06-25 12:31   ` Ian Jackson
2015-06-30  3:07     ` Chen, Tiejun
2015-06-30 15:54   ` George Dunlap
2015-07-01  1:16     ` Chen, Tiejun
2015-07-01 10:07       ` George Dunlap
2015-07-01 10:26         ` Chen, Tiejun
2015-07-01 10:57           ` George Dunlap
2015-07-01 11:16             ` Chen, Tiejun
2015-07-01 13:29               ` George Dunlap
2015-07-02  1:11                 ` Chen, Tiejun
2015-07-02  4:47                   ` Chen, Tiejun
2015-07-02  9:22                   ` George Dunlap
2015-07-02 10:01                     ` Chen, Tiejun
2015-07-02 10:28                       ` George Dunlap
2015-07-02 11:32                         ` Chen, Tiejun
2015-07-06 13:34                 ` Chen, Tiejun
2015-07-06 13:51                   ` Jan Beulich
2015-07-06 14:21                     ` Chen, Tiejun
2015-07-06 14:29                       ` George Dunlap
2015-07-06 14:34                         ` Jan Beulich
2015-07-06 14:46                           ` Chen, Tiejun
2015-07-06 17:16                             ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 12/19] tools/libxl: passes rdm reservation policy Tiejun Chen
2015-06-25 11:37   ` Wei Liu
2015-06-25 12:15   ` Ian Campbell
2015-06-26  8:53     ` Chen, Tiejun
2015-06-26  9:01       ` Ian Campbell
2015-06-26  9:28         ` Chen, Tiejun
2015-06-25 12:33   ` Ian Jackson
2015-06-30  2:14     ` Chen, Tiejun
2015-06-30 15:56   ` George Dunlap
2015-07-01  1:23     ` Chen, Tiejun
2015-07-01 10:22       ` George Dunlap
2015-07-01 10:56         ` Chen, Tiejun
2015-06-30 16:11   ` George Dunlap
2015-07-01  1:30     ` Chen, Tiejun
2015-07-01 10:31       ` George Dunlap
2015-07-02  9:27         ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 13/19] tools/libxc: check to set args.mmio_size before call xc_hvm_build Tiejun Chen
2015-06-25 11:08   ` Wei Liu
2015-06-26  0:56     ` Chen, Tiejun
2015-06-26 12:07       ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 14/19] tools/libxl: detect and avoid conflicts with RDM Tiejun Chen
2015-06-25 11:23   ` Wei Liu
2015-06-26  5:45     ` Chen, Tiejun
2015-06-26 12:13       ` Wei Liu
2015-06-29  6:36         ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 15/19] tools: introduce a new parameter to set a predefined rdm boundary Tiejun Chen
2015-06-25 11:27   ` Wei Liu
2015-06-26  6:54     ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 16/19] tools/libxl: extend XENMEM_set_memory_map Tiejun Chen
2015-06-25 11:33   ` Wei Liu
2015-06-26  7:13     ` Chen, Tiejun
2015-06-26 12:14       ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 17/19] xen/vtd: enable USB device assignment Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 18/19] xen/vtd: prevent from assign the device with shared rmrr Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 19/19] tools: parse to enable new rdm policy parameters Tiejun Chen
2015-06-25 11:35   ` Wei Liu
2015-06-30 16:30   ` George Dunlap
2015-07-01  1:31     ` Chen, Tiejun

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5593BAAB.20801@eu.citrix.com \
    --to=george.dunlap@eu.citrix.com \
    --cc=Aravind.Gopalakrishnan@amd.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=ian.campbell@citrix.com \
    --cc=jbeulich@suse.com \
    --cc=keir@xen.org \
    --cc=kevin.tian@intel.com \
    --cc=stefano.stabellini@citrix.com \
    --cc=suravee.suthikulpanit@amd.com \
    --cc=tiejun.chen@intel.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    --cc=yang.z.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.