From: Arianna Avanzini <avanzini.arianna@gmail.com>
To: xen-devel@lists.xen.org
Cc: Ian.Campbell@eu.citrix.com, paolo.valente@unimore.it,
keir@xen.org, stefano.stabellini@eu.citrix.com,
Ian.Jackson@eu.citrix.com, dario.faggioli@citrix.com,
tim@xen.org, julien.grall@citrix.com, etrudeau@broadcom.com,
andrew.cooper3@citrix.com, JBeulich@suse.com,
avanzini.arianna@gmail.com, viktor.kleinik@globallogic.com
Subject: [PATCH v9 00/14] Implement the XEN_DOMCTL_memory_mapping hypercall for ARM
Date: Wed, 2 Jul 2014 20:42:09 +0200 [thread overview]
Message-ID: <1404326543-16875-1-git-send-email-avanzini.arianna@gmail.com> (raw)
Hello,
here is finally the nineth version of my implementation proposal for the
hypercall XEN_DOMCTL_memory_mapping for the ARM architecture. First of all,
I am deeply sorry for the delay and for blocking patchsets of which this one
is a dependency. As usual, I'm trying to keep this cover letter as brief as
I can by listing here only the most relevant changes, while a more detailed
description can be found in the commit message and in the changelog of each
patch. Also, more information about the patch series can be found in the
last full cover letter ([1]).
Please note that the one that was the series' first patch has been merged
two weeks ago by Ian Campbell ([2]), and this is why it is missing from this
patchset.
Patch 0001 has been fixed according to suggestions provided by Julien Grall
and Ian Campbell; it is also worthy to say that now the added checks don't stop
unmapping when failing to unmap an I/O-memory mapping, but merely emit a
warning. This choice has two benefits: it prevents I/O-memory regions from
remaining partially accessible to a domain, and it lets the handling of such a
failure match the one introduced for x86 by patch 0005 in the lighter warn-
only form requested by Jan Beulich.
Patch 0004 has been modified according to directives given by Julien Grall and
Ian Campbell: it now lets the function apply_p2m_changes() unwind its own
progress when failing to INSERT a new mapping.
Patch 0007 now adds the MTRR-related memory_type_changed() function for ARM
as just a stub instead of creating and ad-hoc file and header, as suggested by
Julien Grall and seconded by Jan Beulich and Ian Campbell.
Patch 0008 has been fixed according to requests from Jan Beulich.
Patch 0009 no more exposes mfn_t to the common code, as requested by Julien
Grall and approved by Ian Campbell and Tim Deegan.
Patch 0011 has been fixed as per Julien Grall's indications.
A new patch 0012 has been added to the patch series. The patch attempts to
address an issue pointed out by Jan Beulich, concerning the passthru of
different GPUs to different domain, each one designed as primary VGA device
of its own domain with gfx_passthru = 1 in the domain config. Patch 0013
would grant access permission to the VGA framebuffer to each domain with
gfx_passthru in its config, while access permission must be granted only to
the domain having the primary GPU passthru to it.
Unfortunately, I haven't found a way to distinguish the primary GPU from the
other ones, and I decided to rely on user input. Patch 0012, in fact, adds a
new option to libxl configuration, which allows the user to specify if one of
the passthru VGA devices is primary. Only a domain with both gfx_passthru = 1
and gfx_passthru_primary = 1 (and its stubdomain, see the comment on patch
0013 below) will have access permission to VGA-specific I/O-memory regions.
Please note that the default for the new option is true, to avoid breaking
interaction with QEMU when possible; AFAIK QEMU will however try to map the
I/O-memory region to all guests requesting GFX passthrough.
Patch 0013 now grants access permission to VGA-specific I/O-memory regions
both to the domain with gfx_passthru = 1 and gfx_passthru_primary = 1 and its
stubdomain, as, after patch 0014, the memory_mapping DOMCTL will check for
both, as pointed out by Julien Grall.
The code has again been tested on a cubieboard2, with Linux v3.15-rc3 as a dom0
and ERIKA Enterprise ([3]) as a domU. The x86 bits have been tested on an x86_64
machine with Linux 3.15.0-rc5 as both dom0 and domU.
Any feedback about this new version of the patchset is more than welcome,
Arianna
[1] http://lists.xen.org/archives/html/xen-devel/2014-03/msg01724.html
[2] http://markmail.org/message/svp3byd62eol375y
[3] http://erika.tuxfamily.org/drupal/
Arianna Avanzini (14):
arch/arm: add consistency check to REMOVE p2m changes
arch/arm: let map_mmio_regions() take pfn as parameters
arch/arm: let map_mmio_regions() use start and count
arch/arm: unmap partially-mapped I/O-memory regions
arch/x86: warn if to-be-removed mapping does not exist
arch/x86: cleanup memory_mapping DOMCTL
xen/common: add ARM stub for the function memory_type_changed()
xen/x86: factor out map and unmap from the memory_mapping DOMCTL
xen/common: move the memory_mapping DOMCTL hypercall to common code
tools/libxl: parse optional start gfn from the iomem config option
tools/libxl: handle the iomem parameter with the memory_mapping hcall
tools/libxl: read from config if passing through primary GPU
tools/libxl: explicitly grant access to needed I/O-memory ranges
xen/common: do not implicitly permit access to mapped I/O memory
docs/man/xl.cfg.pod.5 | 25 +++++++++---
tools/libxc/xc_domain.c | 10 +++++
tools/libxl/libxl.h | 17 ++++++++
tools/libxl/libxl_create.c | 51 ++++++++++++++++++++++++
tools/libxl/libxl_internal.h | 1 +
tools/libxl/libxl_pci.c | 26 +++++-------
tools/libxl/libxl_types.idl | 7 +++-
tools/libxl/xl_cmdimpl.c | 19 +++++----
xen/arch/arm/domain_build.c | 7 ++--
xen/arch/arm/gic.c | 15 +++----
xen/arch/arm/p2m.c | 77 ++++++++++++++++++++++++++++++------
xen/arch/arm/platforms/exynos5.c | 9 ++---
xen/arch/arm/platforms/omap5.c | 17 ++++----
xen/arch/arm/platforms/xgene-storm.c | 16 +++++---
xen/arch/x86/domctl.c | 76 -----------------------------------
xen/arch/x86/mm/p2m.c | 55 ++++++++++++++++++++++++--
xen/common/domctl.c | 54 ++++++++++++++++++++++++-
xen/include/asm-arm/mm.h | 2 +
xen/include/asm-arm/p2m.h | 11 +++---
xen/include/asm-x86/p2m.h | 3 +-
xen/include/xen/p2m-common.h | 16 ++++++++
21 files changed, 354 insertions(+), 160 deletions(-)
create mode 100644 xen/include/xen/p2m-common.h
--
1.9.3
next reply other threads:[~2014-07-02 18:42 UTC|newest]
Thread overview: 69+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-07-02 18:42 Arianna Avanzini [this message]
2014-07-02 18:42 ` [PATCH v9 01/14] arch/arm: add consistency check to REMOVE p2m changes Arianna Avanzini
2014-07-03 10:24 ` Julien Grall
2014-07-03 11:03 ` Julien Grall
2014-07-03 14:28 ` Ian Campbell
2014-07-03 14:44 ` Julien Grall
2014-07-02 18:42 ` [PATCH v9 02/14] arch/arm: let map_mmio_regions() take pfn as parameters Arianna Avanzini
2014-07-03 10:26 ` Julien Grall
2014-07-02 18:42 ` [PATCH v9 03/14] arch/arm: let map_mmio_regions() use start and count Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 04/14] arch/arm: unmap partially-mapped I/O-memory regions Arianna Avanzini
2014-07-03 14:40 ` Ian Campbell
2014-07-03 15:00 ` Julien Grall
2014-07-03 15:15 ` Ian Campbell
2014-07-02 18:42 ` [PATCH v9 05/14] arch/x86: warn if to-be-removed mapping does not exist Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 06/14] arch/x86: cleanup memory_mapping DOMCTL Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 07/14] xen/common: add ARM stub for the function memory_type_changed() Arianna Avanzini
2014-07-03 14:41 ` Ian Campbell
2014-07-02 18:42 ` [PATCH v9 08/14] xen/x86: factor out map and unmap from the memory_mapping DOMCTL Arianna Avanzini
2014-07-03 10:43 ` Jan Beulich
2014-07-02 18:42 ` [PATCH v9 09/14] xen/common: move the memory_mapping DOMCTL hypercall to common code Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 10/14] tools/libxl: parse optional start gfn from the iomem config option Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 11/14] tools/libxl: handle the iomem parameter with the memory_mapping hcall Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 12/14] tools/libxl: read from config if passing through primary GPU Arianna Avanzini
2014-07-02 19:00 ` Sander Eikelenboom
2014-07-03 10:30 ` Jan Beulich
2014-07-03 10:49 ` Sander Eikelenboom
2014-07-03 10:58 ` Jan Beulich
2014-07-03 14:50 ` Ian Campbell
2014-07-03 14:53 ` Ian Campbell
2014-07-03 15:17 ` Jan Beulich
2014-07-03 15:25 ` Ian Campbell
2014-07-03 15:37 ` Jan Beulich
2014-07-03 16:11 ` Ian Campbell
2014-07-03 15:45 ` Sander Eikelenboom
2014-07-03 14:47 ` Ian Campbell
2014-07-02 18:42 ` [PATCH v9 13/14] tools/libxl: explicitly grant access to needed I/O-memory ranges Arianna Avanzini
2014-07-02 18:42 ` [PATCH v9 14/14] xen/common: do not implicitly permit access to mapped I/O memory Arianna Avanzini
2014-07-11 13:51 ` [PATCH v9 00/14] Implement the XEN_DOMCTL_memory_mapping hypercall for ARM Julien Grall
2014-07-11 14:24 ` Ian Campbell
2014-07-11 17:00 ` Arianna Avanzini
2014-07-14 8:54 ` Ian Campbell
2014-07-14 9:22 ` Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND " Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 01/14] arch/arm: add consistency check to REMOVE p2m changes Arianna Avanzini
2014-07-14 10:57 ` Julien Grall
2014-07-17 12:56 ` Ian Campbell
2014-07-14 0:50 ` [PATCH RESEND v9 02/14] arch/arm: let map_mmio_regions() take pfn as parameters Arianna Avanzini
2014-07-17 12:57 ` Ian Campbell
2014-07-18 12:43 ` Ian Campbell
2014-07-14 0:50 ` [PATCH RESEND v9 03/14] arch/arm: let map_mmio_regions() use start and count Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 04/14] arch/arm: unmap partially-mapped I/O-memory regions Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 05/14] arch/x86: warn if to-be-removed mapping does not exist Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 06/14] arch/x86: cleanup memory_mapping DOMCTL Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 07/14] xen/common: add ARM stub for the function memory_type_changed() Arianna Avanzini
2014-07-17 12:59 ` Ian Campbell
2014-07-24 14:07 ` Julien Grall
2014-07-14 0:50 ` [PATCH RESEND v9 08/14] xen/x86: factor out map and unmap from the memory_mapping DOMCTL Arianna Avanzini
2014-07-17 13:00 ` Ian Campbell
2014-07-23 11:59 ` Jan Beulich
2014-07-23 12:54 ` Arianna Avanzini
2014-07-23 13:04 ` Ian Campbell
2014-07-14 0:50 ` [PATCH RESEND v9 09/14] xen/common: move the memory_mapping DOMCTL hypercall to common code Arianna Avanzini
2014-07-24 14:10 ` Julien Grall
2014-07-14 0:50 ` [PATCH RESEND v9 10/14] tools/libxl: parse optional start gfn from the iomem config option Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 11/14] tools/libxl: handle the iomem parameter with the memory_mapping hcall Arianna Avanzini
2014-07-24 14:12 ` Julien Grall
2014-07-14 0:50 ` [PATCH RESEND v9 12/14] tools/libxl: read from config if passing through primary GPU Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 13/14] tools/libxl: explicitly grant access to needed I/O-memory ranges Arianna Avanzini
2014-07-14 0:50 ` [PATCH RESEND v9 14/14] xen/common: do not implicitly permit access to mapped I/O memory Arianna Avanzini
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1404326543-16875-1-git-send-email-avanzini.arianna@gmail.com \
--to=avanzini.arianna@gmail.com \
--cc=Ian.Campbell@eu.citrix.com \
--cc=Ian.Jackson@eu.citrix.com \
--cc=JBeulich@suse.com \
--cc=andrew.cooper3@citrix.com \
--cc=dario.faggioli@citrix.com \
--cc=etrudeau@broadcom.com \
--cc=julien.grall@citrix.com \
--cc=keir@xen.org \
--cc=paolo.valente@unimore.it \
--cc=stefano.stabellini@eu.citrix.com \
--cc=tim@xen.org \
--cc=viktor.kleinik@globallogic.com \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).