xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Haozhong Zhang <haozhong.zhang@intel.com>
To: Konrad Rzeszutek Wilk <konrad@darnok.org>
Cc: Xiao Guangrong <guangrong.xiao@linux.intel.com>,
	Wei Liu <wei.liu2@citrix.com>,
	Ian Jackson <ian.jackson@eu.citrix.com>,
	xen-devel@lists.xen.org
Subject: Re: [RFC XEN PATCH 06/16] tools: reserve guest memory for ACPI from device model
Date: Wed, 8 Feb 2017 09:39:09 +0800	[thread overview]
Message-ID: <20170208013909.v4v6rnthexb7ak6d@hz-desktop> (raw)
In-Reply-To: <20170127204450.GA18581@localhost.localdomain>

On 01/27/17 15:44 -0500, Konrad Rzeszutek Wilk wrote:
>On Mon, Oct 10, 2016 at 08:32:25AM +0800, Haozhong Zhang wrote:
>> One guest page is reserved for the device model to place guest ACPI. The
>
>guest ACPI what? ACPI SSDT? MADT?

For NVDIMM, it includes NFIT and SSDT. However, the mechanism
implemented in this and following libacpi patches can be a generic one
to pass guest ACPI from device model. A simple conflict detection is
implemented in patch 11.

>
>Also why one page? What if there is a need for more than one page?
>
>You add  HVM_XS_DM_ACPI_LENGTH which makes me think this is accounted
>for?
>

One page is enough for NVDIMM (NFIT + SSDT). I don't see fundamental
restriction to not allow more one page, so I use HVM_XS_DM_ACPI_LENGTH
to pass the reserved size to allow changing the size in future.

>> base address and size of the reserved area are passed to the device
>> model via XenStore keys hvmloader/dm-acpi/{address, length}.
>>
>> Signed-off-by: Haozhong Zhang <haozhong.zhang@intel.com>
>> ---
>> Cc: Ian Jackson <ian.jackson@eu.citrix.com>
>> Cc: Wei Liu <wei.liu2@citrix.com>
>> ---
>>  tools/libxc/include/xc_dom.h            |  1 +
>>  tools/libxc/xc_dom_x86.c                |  7 +++++++
>>  tools/libxl/libxl_dom.c                 | 25 +++++++++++++++++++++++++
>>  xen/include/public/hvm/hvm_xs_strings.h | 11 +++++++++++
>>  4 files changed, 44 insertions(+)
>>
>> diff --git a/tools/libxc/include/xc_dom.h b/tools/libxc/include/xc_dom.h
>> index 608cbc2..19d65cd 100644
>> --- a/tools/libxc/include/xc_dom.h
>> +++ b/tools/libxc/include/xc_dom.h
>> @@ -98,6 +98,7 @@ struct xc_dom_image {
>>      xen_pfn_t xenstore_pfn;
>>      xen_pfn_t shared_info_pfn;
>>      xen_pfn_t bootstack_pfn;
>> +    xen_pfn_t dm_acpi_pfn;
>
>Perhaps an pointer to an variable size array?
>
> xen_pfn_t *dm_acpi_pfns;
> unsigned int dm_apci_nr;
>
>?

dm_acpi_pfn is passed to QEMU via xenstore. Though passing an array of
pfns via xenstore is also doable, a pair of base pfn and length is
simpler.

>>      xen_pfn_t pfn_alloc_end;
>>      xen_vaddr_t virt_alloc_end;
>>      xen_vaddr_t bsd_symtab_start;
>> diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
>> index 0eab8a7..47f14a1 100644
>> --- a/tools/libxc/xc_dom_x86.c
>> +++ b/tools/libxc/xc_dom_x86.c
>> @@ -674,6 +674,13 @@ static int alloc_magic_pages_hvm(struct xc_dom_image *dom)
>>                           ioreq_server_pfn(0));
>>          xc_hvm_param_set(xch, domid, HVM_PARAM_NR_IOREQ_SERVER_PAGES,
>>                           NR_IOREQ_SERVER_PAGES);
>> +
>> +        dom->dm_acpi_pfn = xc_dom_alloc_page(dom, "DM ACPI");
>> +        if ( dom->dm_acpi_pfn == INVALID_PFN )
>> +        {
>> +            DOMPRINTF("Could not allocate page for device model ACPI.");
>> +            goto error_out;
>> +        }
>>      }
>>
>>      rc = xc_dom_alloc_segment(dom, &dom->start_info_seg,
>> diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
>> index d519c8d..f0a1d97 100644
>> --- a/tools/libxl/libxl_dom.c
>> +++ b/tools/libxl/libxl_dom.c
>> @@ -865,6 +865,31 @@ static int hvm_build_set_xs_values(libxl__gc *gc,
>>              goto err;
>>      }
>>
>> +    if (dom->dm_acpi_pfn) {
>> +        uint64_t guest_addr_out = dom->dm_acpi_pfn * XC_DOM_PAGE_SIZE(dom);
>> +
>> +        if (guest_addr_out >= 0x100000000ULL) {
>> +            LOG(ERROR,
>> +                "Guest address of DM ACPI is 0x%"PRIx64", but expected below 4G",
>> +                guest_addr_out);
>> +            goto err;
>> +        }
>> +
>> +        path = GCSPRINTF("/local/domain/%d/"HVM_XS_DM_ACPI_ADDRESS, domid);
>> +
>> +        ret = libxl__xs_printf(gc, XBT_NULL, path, "0x%"PRIx64,
>> +                               guest_addr_out);
>> +        if (ret)
>> +            goto err;
>> +
>> +        path = GCSPRINTF("/local/domain/%d/"HVM_XS_DM_ACPI_LENGTH, domid);
>> +
>> +        ret = libxl__xs_printf(gc, XBT_NULL, path, "0x%"PRIx64,
>> +                               (uint64_t) XC_DOM_PAGE_SIZE(dom));
>I don't think you need the space here:      ^

will remove the space here and in other patches

Thanks,
Haozhong

>> +        if (ret)
>> +            goto err;
>> +    }
>> +
>>      return 0;
>>
>>  err:
>> diff --git a/xen/include/public/hvm/hvm_xs_strings.h b/xen/include/public/hvm/hvm_xs_strings.h
>> index 146b0b0..f44f71f 100644
>> --- a/xen/include/public/hvm/hvm_xs_strings.h
>> +++ b/xen/include/public/hvm/hvm_xs_strings.h
>> @@ -79,4 +79,15 @@
>>   */
>>  #define HVM_XS_OEM_STRINGS             "bios-strings/oem-%d"
>>
>> +/* Follows are XenStore keys for DM ACPI (ACPI built by device model,
>> + * e.g. QEMU).
>> + *
>> + * A reserved area of guest physical memory is used to pass DM
>> + * ACPI. Values of following two keys specify the base address and
>> + * length (in bytes) of the reserved area.
>> + */
>> +#define HVM_XS_DM_ACPI_ROOT              "hvmloader/dm-acpi"
>> +#define HVM_XS_DM_ACPI_ADDRESS           HVM_XS_DM_ACPI_ROOT"/address"
>> +#define HVM_XS_DM_ACPI_LENGTH            HVM_XS_DM_ACPI_ROOT"/length"
>> +
>>  #endif /* __XEN_PUBLIC_HVM_HVM_XS_STRINGS_H__ */
>> --
>> 2.10.1
>>
>>
>> _______________________________________________
>> Xen-devel mailing list
>> Xen-devel@lists.xen.org
>> https://lists.xen.org/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel

  reply	other threads:[~2017-02-08  1:39 UTC|newest]

Thread overview: 77+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-10-10  0:32 [RFC XEN PATCH 00/16] Add vNVDIMM support to HVM domains Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 01/16] x86_64/mm: explicitly specify the location to place the frame table Haozhong Zhang
2016-12-09 21:35   ` Konrad Rzeszutek Wilk
2016-12-12  2:27     ` Haozhong Zhang
2016-12-12  8:25       ` Jan Beulich
2016-10-10  0:32 ` [RFC XEN PATCH 02/16] x86_64/mm: explicitly specify the location to place the M2P table Haozhong Zhang
2016-12-09 21:38   ` Konrad Rzeszutek Wilk
2016-12-12  2:31     ` Haozhong Zhang
2016-12-12  8:26       ` Jan Beulich
2016-12-12  8:35         ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 03/16] xen/x86: add a hypercall XENPF_pmem_add to report host pmem regions Haozhong Zhang
2016-10-11 19:13   ` Andrew Cooper
2016-12-09 22:02   ` Konrad Rzeszutek Wilk
2016-12-12  4:16     ` Haozhong Zhang
2016-12-12  8:30       ` Jan Beulich
2016-12-12  8:38         ` Haozhong Zhang
2016-12-12 14:44           ` Konrad Rzeszutek Wilk
2016-12-13  1:08             ` Haozhong Zhang
2016-12-22 11:58   ` Jan Beulich
2016-10-10  0:32 ` [RFC XEN PATCH 04/16] xen/x86: add XENMEM_populate_pmemmap to map host pmem pages to guest Haozhong Zhang
2016-12-09 22:22   ` Konrad Rzeszutek Wilk
2016-12-12  4:38     ` Haozhong Zhang
2016-12-22 12:19   ` Jan Beulich
2016-10-10  0:32 ` [RFC XEN PATCH 05/16] xen/x86: release pmem pages at domain destroy Haozhong Zhang
2016-12-09 22:27   ` Konrad Rzeszutek Wilk
2016-12-12  4:47     ` Haozhong Zhang
2016-12-22 12:22   ` Jan Beulich
2016-10-10  0:32 ` [RFC XEN PATCH 06/16] tools: reserve guest memory for ACPI from device model Haozhong Zhang
2017-01-27 20:44   ` Konrad Rzeszutek Wilk
2017-02-08  1:39     ` Haozhong Zhang [this message]
2017-02-08 14:31       ` Konrad Rzeszutek Wilk
2016-10-10  0:32 ` [RFC XEN PATCH 07/16] tools/libacpi: add callback acpi_ctxt.p2v to get a pointer from physical address Haozhong Zhang
2017-01-27 20:46   ` Konrad Rzeszutek Wilk
2017-02-08  1:42     ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 08/16] tools/libacpi: expose details of memory allocation callback Haozhong Zhang
2017-01-27 20:58   ` Konrad Rzeszutek Wilk
2017-02-08  2:12     ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 09/16] tools/libacpi: add callbacks to access XenStore Haozhong Zhang
2017-01-27 21:10   ` Konrad Rzeszutek Wilk
2017-02-08  2:19     ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 10/16] tools/libacpi: add a simple AML builder Haozhong Zhang
2017-01-27 21:19   ` Konrad Rzeszutek Wilk
2017-02-08  2:33     ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 11/16] tools/libacpi: load ACPI built by the device model Haozhong Zhang
2017-01-27 21:40   ` Konrad Rzeszutek Wilk
2017-02-08  5:38     ` Haozhong Zhang
2017-02-08 14:35       ` Konrad Rzeszutek Wilk
2016-10-10  0:32 ` [RFC XEN PATCH 12/16] tools/libxl: build qemu options from xl vNVDIMM configs Haozhong Zhang
2017-01-27 21:47   ` Konrad Rzeszutek Wilk
2017-02-08  5:42     ` Haozhong Zhang
2017-01-27 21:48   ` Konrad Rzeszutek Wilk
2017-02-08  5:47     ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 13/16] tools/libxl: add support to map host pmem device to guests Haozhong Zhang
2017-01-27 22:06   ` Konrad Rzeszutek Wilk
2017-01-27 22:09     ` Konrad Rzeszutek Wilk
2017-02-08  5:59     ` Haozhong Zhang
2017-02-08 14:37       ` Konrad Rzeszutek Wilk
2016-10-10  0:32 ` [RFC XEN PATCH 14/16] tools/libxl: add support to map files on pmem devices " Haozhong Zhang
2017-01-27 22:10   ` Konrad Rzeszutek Wilk
2017-02-08  6:03     ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 15/16] tools/libxl: handle return code of libxl__qmp_initializations() Haozhong Zhang
2017-01-27 22:11   ` Konrad Rzeszutek Wilk
2017-02-08  6:07     ` Haozhong Zhang
2017-02-08 10:31       ` Wei Liu
2017-02-09  2:47         ` Haozhong Zhang
2017-02-09 10:13           ` Wei Liu
2017-02-09 10:16             ` Wei Liu
2017-02-10  2:37             ` Haozhong Zhang
2017-02-10  8:11               ` Wei Liu
2017-02-10  8:23                 ` Wei Liu
2017-02-10  8:24                 ` Haozhong Zhang
2016-10-10  0:32 ` [RFC XEN PATCH 16/16] tools/libxl: initiate pmem mapping via qmp callback Haozhong Zhang
2017-01-27 22:13   ` Konrad Rzeszutek Wilk
2017-02-08  6:08     ` Haozhong Zhang
2016-10-24 16:37 ` [RFC XEN PATCH 00/16] Add vNVDIMM support to HVM domains Wei Liu
2016-10-25  6:55   ` Haozhong Zhang
2016-10-25 11:28     ` Wei Liu

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20170208013909.v4v6rnthexb7ak6d@hz-desktop \
    --to=haozhong.zhang@intel.com \
    --cc=guangrong.xiao@linux.intel.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=konrad@darnok.org \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).