xen-devel.lists.xenproject.org archive mirror
 help / color / mirror / Atom feed
From: Julien Grall <julien.grall@arm.com>
To: Zhongze Liu <blackskygg@gmail.com>
Cc: Ian Jackson <ian.jackson@eu.citrix.com>,
	Stefano Stabellini <sstabellini@kernel.org>,
	Wei Liu <wei.liu2@citrix.com>,
	xen-devel@lists.xen.org
Subject: Re: [PATCH v4 4/7] libxl: support mapping static shared memory areas during domain creation
Date: Tue, 6 Feb 2018 17:30:50 +0000	[thread overview]
Message-ID: <6250f75c-570a-45d2-6c6c-1e82771abb73@arm.com> (raw)
In-Reply-To: <CAHrd_jrTUaNwD3YEaqFvqSHACouOq=tK19rk3GCTK2GBkd70mw@mail.gmail.com>



On 02/06/2018 03:59 PM, Zhongze Liu wrote:
> Hi Julien,

Hi,


> 2018-02-06 21:07 GMT+08:00 Julien Grall <julien.grall@arm.com>:
>> Hi,
>>
>> On 01/30/2018 05:50 PM, Zhongze Liu wrote:
>>>
>>> Add libxl__sshm_add to map shared pages from one DomU to another, The
>>> mapping
>>> process involves the follwing steps:
> 
> [...]
> 
>>> +
>>> +/* Set default values for libxl_static_shm */
>>> +int libxl__sshm_setdefault(libxl__gc *gc, uint32_t domid,
>>> +                           libxl_static_shm *sshm)
>>> +{
>>> +    int rc;
>>> +
>>> +    if (sshm->role == LIBXL_SSHM_ROLE_UNKNOWN)
>>> +        sshm->role = LIBXL_SSHM_ROLE_SLAVE;
>>> +    if (sshm->prot == LIBXL_SSHM_PROT_UNKNOWN)
>>> +        sshm->prot = LIBXL_SSHM_PROT_RW;
>>
>>
>> What is the purpose of {ROLE,PROT}_UNKNOWN if you default it resp. to
>> ROLE_SLAVE and PROT_RW.  Would not it be easier to just drop them?
> 
> The *_UNKNOWN values are used by the libxlu code to check whether a specific
> option was set more than once.

AFAIK, a toolstack is free to not use libxlu. Someone may implement 
their own toolstack on top of libxl and may use ROLE_UNKNOWN by mistake.

> Without the default *_UNKNOWN value, I will not
> be able to judge if, say, role is set to 'slave' by the user or not,
> and therefore, if I
> see the user setting role to 'master', I won't be able to tell if role
> is specified twice
> or not.
> 
> I think treating re-specification of options as errors will be good
> for the users.

In that case, you should treat that as an error for everyone and not 
only xl. This would avoid confusion on other toolstack.

> 
> [...]
> 
>>> +
>>> +/*   libxl__sshm_do_map -- map pages into slave's physmap
>>> + *
>>> + *   This functions maps
>>> + *     master gfn: [@msshm->begin + @sshm->offset, @msshm->end +
>>> @sshm->offset)
>>> + *   into
>>> + *     slave gfn: [@sshm->begin, @sshm->end)
>>> + *
>>> + *   The gfns of the pages that are successfully mapped will be stored
>>> + *   in @mapped, and the number of the gfns will be stored in @nmapped.
>>> + *
>>> + *   The caller have to guarentee that sshm->begin < sshm->end and all
>>> the
>>
>>
>> s/have to/has to/ I think.
>> s/guarentee/guarantee/
>>
>>> + *   values are page-aligned.
>>
>>
>> Hmmm, I don't see the alignement check in libxl. So do you rely on the
>> toolstack to do it?
> 
> Yes, This was done in libxlu_sshm.c.

Same remark as above regarding libxlu. Note that I am maintaining the 
tools. Ian and Wei may have a different opinion here.

Cheers,

-- 
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  reply	other threads:[~2018-02-06 17:30 UTC|newest]

Thread overview: 45+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2018-01-30 17:50 [PATCH v4 0/7] Allow setting up shared memory areas between VMs from xl config files Zhongze Liu
2018-01-30 17:50 ` [PATCH v4 1/7] libxc: add xc_domain_remove_from_physmap to wrap XENMEM_remove_from_physmap Zhongze Liu
2018-01-30 17:50 ` [PATCH v4 2/7] xen: xsm: flask: introduce XENMAPSPACE_gmfn_share for memory sharing Zhongze Liu
2018-02-01 10:23   ` Jan Beulich
2018-02-01 18:11     ` Zhongze Liu
2018-02-02  8:32       ` Jan Beulich
2018-02-05  9:59         ` Zhongze Liu
2018-02-13 15:15     ` Zhongze Liu
2018-02-13 15:26       ` Jan Beulich
2018-02-14  7:15         ` Zhongze Liu
2018-02-14  8:37           ` Jan Beulich
2018-02-14 17:02             ` Zhongze Liu
2018-02-15  8:58               ` Jan Beulich
2018-02-24  2:50                 ` Zhongze Liu
2018-02-24  5:37                   ` Zhongze Liu
2018-02-26  7:53                     ` Jan Beulich
2018-02-06 11:04   ` Julien Grall
2018-01-30 17:50 ` [PATCH v4 3/7] libxl: introduce a new structure to represent static shared memory regions Zhongze Liu
2018-02-06 11:27   ` Julien Grall
2018-02-06 15:41     ` Zhongze Liu
2018-02-06 15:46       ` Julien Grall
2018-02-06 16:06         ` Zhongze Liu
2018-02-06 17:23           ` Julien Grall
2018-01-30 17:50 ` [PATCH v4 4/7] libxl: support mapping static shared memory areas during domain creation Zhongze Liu
2018-02-06 13:07   ` Julien Grall
2018-02-06 15:59     ` Zhongze Liu
2018-02-06 17:30       ` Julien Grall [this message]
2018-02-06 17:47         ` Wei Liu
2018-02-12 15:08           ` Zhongze Liu
2018-02-14 14:26             ` Wei Liu
2018-01-30 17:50 ` [PATCH v4 5/7] libxl: support unmapping static shared memory areas during domain destruction Zhongze Liu
2018-02-06 13:24   ` Julien Grall
2018-02-06 18:06     ` Wei Liu
2018-02-07 16:27       ` Zhongze Liu
2018-02-07 16:54         ` Julien Grall
2018-02-12 14:52           ` Zhongze Liu
2018-02-12 15:09             ` Julien Grall
2018-02-12 15:17               ` Zhongze Liu
2018-02-12 15:24                 ` Julien Grall
2018-02-14 14:35                   ` Wei Liu
2018-02-14 14:39                   ` Wei Liu
2018-02-26 12:08                     ` Ian Jackson
2018-01-30 17:50 ` [PATCH v4 6/7] libxl:xl: add parsing code to parse "libxl_static_sshm" from xl config files Zhongze Liu
2018-01-30 17:50 ` [PATCH v4 7/7] docs: documentation about static shared memory regions Zhongze Liu
2018-02-06 13:28   ` Julien Grall

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=6250f75c-570a-45d2-6c6c-1e82771abb73@arm.com \
    --to=julien.grall@arm.com \
    --cc=blackskygg@gmail.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=sstabellini@kernel.org \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).