All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Chen, Tiejun" <tiejun.chen@intel.com>
To: George Dunlap <George.Dunlap@eu.citrix.com>
Cc: Kevin Tian <kevin.tian@intel.com>, Keir Fraser <keir@xen.org>,
	Jan Beulich <jbeulich@suse.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Tim Deegan <tim@xen.org>,
	"xen-devel@lists.xen.org" <xen-devel@lists.xen.org>,
	Aravind Gopalakrishnan <Aravind.Gopalakrishnan@amd.com>,
	Suravee Suthikulpanit <suravee.suthikulpanit@amd.com>,
	Yang Zhang <yang.z.zhang@intel.com>,
	Stefano Stabellini <stefano.stabellini@citrix.com>,
	Ian Campbell <ian.campbell@citrix.com>
Subject: Re: [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy
Date: Mon, 06 Jul 2015 22:52:48 +0800	[thread overview]
Message-ID: <559A9640.7050501@intel.com> (raw)
In-Reply-To: <5594FB07.6010100@intel.com>

Any comment to this?

Thanks
Tiejun

On 2015/7/2 16:49, Chen, Tiejun wrote:
>>> @@ -1898,7 +1899,13 @@ static int intel_iommu_add_device(u8 devfn,
>>> struct pci_dev *pdev)
>>>                PCI_BUS(bdf) == pdev->bus &&
>>>                PCI_DEVFN2(bdf) == devfn )
>>>           {
>>> -            ret = rmrr_identity_mapping(pdev->domain, 1, rmrr);
>>> +            /*
>>> +             * RMRR is always reserved on e820 so either of flag
>>> +             * is fine for hardware domain and here we'd like to
>>> +             * pass XEN_DOMCTL_DEV_RDM_RELAXED.
>>> +             */
>>> +            ret = rmrr_identity_mapping(pdev->domain, 1, rmrr,
>>> +                                        XEN_DOMCTL_DEV_RDM_RELAXED);
>>
>> So two things.
>>
>> First, you assert that the value here won't matter, because the
>> hardware domain is guaranteed never to have a conflict.
>>
>> Which is likely to be true almost all the time; but the question is,
>> *if* something goes wrong, what should happen?
>>
>> For instance, suppose that someone accidentally introduces a bug in
>> Xen that messes up or ignores reading a portion of the e820 map under
>> certain circumstances.  What should happen?
>
> Yes, you can image all possible cases. But if this kind of bug can come
> true, I really very doubt if Xen can boot successfully. Because e820 is
> a fundamental key to run OS, so this case is very easy to panic Xen, right?
>
> Anyway, I agree we should concern all corner cases.
>
>>
>> If you set this to RELAXED, this clash will be silently ignored; which
>> means that devices that need RMRR will simply malfunction in weird
>> ways without any warning messages having been printed that might give
>
> No. We always post that messages regardless of relaxe or strict since
> this massage just depends on one condition of that conflict exist.
>
>> someone a hint about what is going on.
>>
>> If you set this to STRICT, then this clash will print an error
>> message, but as far as I can tell, the rest of the device assignment
>> will continue as normal.  (Please correct me if I've followed the code
>> wrong.)
>
> Not all cases are like this behavior but here is true.
>
>>
>> Since the device should be just as functional (or not functional)
>> either way, but in the STRICT case should actually print an error
>> message which someone might notice, it seems to me that STRICT is a
>> better option for the hardware domain.
>>
>
> Just see above.
>
>> Secondly, you assert in response to Kevin's question in v3 that this
>> path is only reachable when assigning to the hardware domain.  I think
>> you at least need to update the comment here to indicate that's what
>> you think; it's not at all obvious just from looking at the function
>
> What about this?
>
>                PCI_DEVFN2(bdf) == devfn )
>           {
>               /*
> -             * RMRR is always reserved on e820 so either of flag
> -             * is fine for hardware domain and here we'd like to
> -             * pass XEN_DOMCTL_DEV_RDM_RELAXED.
> +             * Here means we're add a device to the hardware domain
> +             * so actually RMRR is always reserved on e820 so either
> +             * of flag is fine for hardware domain and here we'd like
> +             * to pass XEN_DOMCTL_DEV_RDM_RELAXED.
>                */
>               ret = rmrr_identity_mapping(pdev->domain, 1, rmrr,
>                                           XEN_DOMCTL_DEV_RDM_RELAXED);
>
>
>> that this is true.  And if we do end up doing something besides
>> STRICT, we should check to make sure that pdev->domain really *is* the
>> hardware domain before acting like it is.
>>
>>>               if ( ret )
>>>                   dprintk(XENLOG_ERR VTDPREFIX, "d%d: RMRR mapping
>>> failed\n",
>>>                           pdev->domain->domain_id);
>>> @@ -1939,7 +1946,8 @@ static int intel_iommu_remove_device(u8 devfn,
>>> struct pci_dev *pdev)
>>>                PCI_DEVFN2(bdf) != devfn )
>>>               continue;
>>>
>>> -        rmrr_identity_mapping(pdev->domain, 0, rmrr);
>>> +        rmrr_identity_mapping(pdev->domain, 0, rmrr,
>>> +                              XEN_DOMCTL_DEV_RDM_RELAXED);
>>>       }
>>
>> Same here wrt STRICT.
>
> This is inside intel_iommu_remove_device() so actually any flag doesn't
> take effect to rmrr_identity_mapping(). But I should add a comment like
> this,
>
> +        /*
> +         * Any flag is nothing to clear these mappings so here
> +         * its always safe to set XEN_DOMCTL_DEV_RDM_RELAXED.
> +         */
>
>
>>
>> After those changes (a single RDM_RELAXED flag, passing STRICT in for
>> the hardware domain) then I think this patch is in good shape.
>>
>
> Based on my understanding to your concern, seems you always think in
> case of "relax" we don't post any message, right? But now as I reply
> above this is not correct so what's your further consideration?
>
> Anyway, I'm fine to change this. And after you suggested to keep one bit
> just to indicate XEN_DOMCTL_DEV_RDM_RELAXED, we don't have that actual
> XEN_DOMCTL_DEV_RDM_STRICT so I can just reset all associated flag as 0
> easily.
>
> Thanks
> Tiejun
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@lists.xen.org
> http://lists.xen.org/xen-devel
>
>

  reply	other threads:[~2015-07-06 14:52 UTC|newest]

Thread overview: 114+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-06-23  9:57 [v4][PATCH 00/19] Fix RMRR Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 01/19] xen: introduce XENMEM_reserved_device_memory_map Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 02/19] xen/x86/p2m: introduce set_identity_p2m_entry Tiejun Chen
2015-06-25  9:59   ` Tim Deegan
2015-07-01 15:43   ` George Dunlap
2015-06-23  9:57 ` [v4][PATCH 03/19] xen/vtd: create RMRR mapping Tiejun Chen
2015-06-23 10:12   ` Jan Beulich
2015-06-24  1:11     ` Chen, Tiejun
2015-06-24  6:48       ` Jan Beulich
2015-06-24  7:26         ` Chen, Tiejun
2015-06-24  7:33           ` Jan Beulich
2015-06-30 10:40             ` George Dunlap
2015-06-30 11:19               ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 04/19] xen/passthrough: extend hypercall to support rdm reservation policy Tiejun Chen
2015-06-30 11:08   ` George Dunlap
2015-06-30 11:24     ` Chen, Tiejun
2015-06-30 14:20       ` George Dunlap
2015-07-01  1:11         ` Chen, Tiejun
2015-07-01 10:02           ` George Dunlap
2015-07-01 10:47             ` Chen, Tiejun
2015-07-01 14:39               ` George Dunlap
2015-07-01 15:06                 ` Julien Grall
2015-07-02  6:50                 ` Chen, Tiejun
2015-07-06 14:55                   ` Chen, Tiejun
2015-07-07  6:36                     ` Chen, Tiejun
2015-07-06 10:34               ` Jan Beulich
2015-07-06 10:56                 ` George Dunlap
2015-07-06 10:56                 ` Chen, Tiejun
2015-07-06 11:39                   ` Jan Beulich
2015-07-01 16:30   ` George Dunlap
2015-07-02  8:49     ` Chen, Tiejun
2015-07-06 14:52       ` Chen, Tiejun [this message]
2015-07-07  6:37         ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 05/19] xen: enable XENMEM_memory_map in hvm Tiejun Chen
2015-07-01 16:32   ` George Dunlap
2015-06-23  9:57 ` [v4][PATCH 06/19] hvmloader: get guest memory map into memory_map[] Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 07/19] hvmloader/pci: skip reserved ranges Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 08/19] hvmloader/e820: construct guest e820 table Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 09/19] tools/libxc: Expose new hypercall xc_reserved_device_memory_map Tiejun Chen
2015-06-25 10:44   ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 10/19] tools: extend xc_assign_device() to support rdm reservation policy Tiejun Chen
2015-06-25 10:54   ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 11/19] tools: introduce some new parameters to set rdm policy Tiejun Chen
2015-06-25 11:38   ` Wei Liu
2015-06-25 12:13   ` Ian Campbell
2015-06-26  8:38     ` Chen, Tiejun
2015-06-26  8:57       ` Ian Campbell
2015-06-26  9:36         ` Chen, Tiejun
2015-06-26 12:06           ` Wei Liu
2015-06-29  1:01             ` Chen, Tiejun
2015-06-30  3:08           ` Chen, Tiejun
2015-06-30  8:30             ` Ian Campbell
2015-06-30  9:38               ` Chen, Tiejun
2015-07-07 11:36                 ` Ian Campbell
2015-06-25 12:31   ` Ian Jackson
2015-06-30  3:07     ` Chen, Tiejun
2015-06-30 15:54   ` George Dunlap
2015-07-01  1:16     ` Chen, Tiejun
2015-07-01 10:07       ` George Dunlap
2015-07-01 10:26         ` Chen, Tiejun
2015-07-01 10:57           ` George Dunlap
2015-07-01 11:16             ` Chen, Tiejun
2015-07-01 13:29               ` George Dunlap
2015-07-02  1:11                 ` Chen, Tiejun
2015-07-02  4:47                   ` Chen, Tiejun
2015-07-02  9:22                   ` George Dunlap
2015-07-02 10:01                     ` Chen, Tiejun
2015-07-02 10:28                       ` George Dunlap
2015-07-02 11:32                         ` Chen, Tiejun
2015-07-06 13:34                 ` Chen, Tiejun
2015-07-06 13:51                   ` Jan Beulich
2015-07-06 14:21                     ` Chen, Tiejun
2015-07-06 14:29                       ` George Dunlap
2015-07-06 14:34                         ` Jan Beulich
2015-07-06 14:46                           ` Chen, Tiejun
2015-07-06 17:16                             ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 12/19] tools/libxl: passes rdm reservation policy Tiejun Chen
2015-06-25 11:37   ` Wei Liu
2015-06-25 12:15   ` Ian Campbell
2015-06-26  8:53     ` Chen, Tiejun
2015-06-26  9:01       ` Ian Campbell
2015-06-26  9:28         ` Chen, Tiejun
2015-06-25 12:33   ` Ian Jackson
2015-06-30  2:14     ` Chen, Tiejun
2015-06-30 15:56   ` George Dunlap
2015-07-01  1:23     ` Chen, Tiejun
2015-07-01 10:22       ` George Dunlap
2015-07-01 10:56         ` Chen, Tiejun
2015-06-30 16:11   ` George Dunlap
2015-07-01  1:30     ` Chen, Tiejun
2015-07-01 10:31       ` George Dunlap
2015-07-02  9:27         ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 13/19] tools/libxc: check to set args.mmio_size before call xc_hvm_build Tiejun Chen
2015-06-25 11:08   ` Wei Liu
2015-06-26  0:56     ` Chen, Tiejun
2015-06-26 12:07       ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 14/19] tools/libxl: detect and avoid conflicts with RDM Tiejun Chen
2015-06-25 11:23   ` Wei Liu
2015-06-26  5:45     ` Chen, Tiejun
2015-06-26 12:13       ` Wei Liu
2015-06-29  6:36         ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 15/19] tools: introduce a new parameter to set a predefined rdm boundary Tiejun Chen
2015-06-25 11:27   ` Wei Liu
2015-06-26  6:54     ` Chen, Tiejun
2015-06-23  9:57 ` [v4][PATCH 16/19] tools/libxl: extend XENMEM_set_memory_map Tiejun Chen
2015-06-25 11:33   ` Wei Liu
2015-06-26  7:13     ` Chen, Tiejun
2015-06-26 12:14       ` Wei Liu
2015-06-23  9:57 ` [v4][PATCH 17/19] xen/vtd: enable USB device assignment Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 18/19] xen/vtd: prevent from assign the device with shared rmrr Tiejun Chen
2015-06-23  9:57 ` [v4][PATCH 19/19] tools: parse to enable new rdm policy parameters Tiejun Chen
2015-06-25 11:35   ` Wei Liu
2015-06-30 16:30   ` George Dunlap
2015-07-01  1:31     ` Chen, Tiejun

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=559A9640.7050501@intel.com \
    --to=tiejun.chen@intel.com \
    --cc=Aravind.Gopalakrishnan@amd.com \
    --cc=George.Dunlap@eu.citrix.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=ian.campbell@citrix.com \
    --cc=jbeulich@suse.com \
    --cc=keir@xen.org \
    --cc=kevin.tian@intel.com \
    --cc=stefano.stabellini@citrix.com \
    --cc=suravee.suthikulpanit@amd.com \
    --cc=tim@xen.org \
    --cc=xen-devel@lists.xen.org \
    --cc=yang.z.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.