All of lore.kernel.org
 help / color / mirror / Atom feed
From: Wei Liu <wei.liu2@citrix.com>
To: Juergen Gross <jgross@suse.com>
Cc: wei.liu2@citrix.com, Ian.Campbell@citrix.com,
	stefano.stabellini@eu.citrix.com, ian.jackson@eu.citrix.com,
	xen-devel@lists.xen.org, roger.pau@citrix.com
Subject: Re: [PATCH v4 8/9] libxc: rework of domain builder's page table handler
Date: Thu, 12 Nov 2015 12:39:26 +0000	[thread overview]
Message-ID: <20151112123926.GD24281@zion.uk.xensource.com> (raw)
In-Reply-To: <1446734195-20257-9-git-send-email-jgross@suse.com>

On Thu, Nov 05, 2015 at 03:36:34PM +0100, Juergen Gross wrote:
> In order to prepare a p2m list outside of the initial kernel mapping
> do a rework of the domain builder's page table handler. The goal is
> to be able to use common helpers for page table allocation and setup
> for initial kernel page tables and page tables mapping the p2m list.
> This is achieved by supporting multiple mapping areas. The mapped
> virtual addresses of the single areas must not overlap, while the
> page tables of a new area added might already be partially present.
> Especially the top level page table is existing only once, of course.
> 
> Currently restrict the number of mappings to 1 because the only mapping
> now is the initial mapping created by toolstack. There should not be
> behaviour change and guest visible change introduced.
> 
> Signed-off-by: Juergen Gross <jgross@suse.com>

Reviewed-by: Wei Liu <wei.liu2@citrix.com>

Some comments below.

[...]
>  
> -static unsigned long
> -nr_page_tables(struct xc_dom_image *dom,
> -               xen_vaddr_t start, xen_vaddr_t end, unsigned long bits)
> +static int count_pgtables(struct xc_dom_image *dom, xen_vaddr_t from,
> +                          xen_vaddr_t to, xen_pfn_t pfn)
>  {
> -    xen_vaddr_t mask = bits_to_mask(bits);
> -    int tables;
> +    struct xc_dom_image_x86 *domx86 = dom->arch_private;
> +    struct xc_dom_x86_mapping *map, *map_cmp;
> +    xen_pfn_t pfn_end;
> +    xen_vaddr_t mask;
> +    unsigned bits;
> +    int l, m;
>  
> -    if ( bits == 0 )
> -        return 0;  /* unused */
> +    if ( domx86->n_mappings == MAPPING_MAX )
> +    {
> +        xc_dom_panic(dom->xch, XC_OUT_OF_MEMORY,
> +                     "%s: too many mappings\n", __FUNCTION__);
> +        return -ENOMEM;
> +    }
> +    map = domx86->maps + domx86->n_mappings;
>  
> -    if ( bits == (8 * sizeof(unsigned long)) )
> +    pfn_end = pfn + ((to - from) >> PAGE_SHIFT_X86);
> +    if ( pfn_end >= dom->p2m_size )
>      {
> -        /* must be pgd, need one */
> -        start = 0;
> -        end = -1;
> -        tables = 1;
> +        xc_dom_panic(dom->xch, XC_OUT_OF_MEMORY,
> +                     "%s: not enough memory for initial mapping (%#"PRIpfn" > %#"PRIpfn")",
> +                     __FUNCTION__, pfn_end, dom->p2m_size);
> +        return -ENOMEM;
>      }
> -    else
> +    for ( m = 0; m < domx86->n_mappings; m++ )
>      {
> -        start = round_down(start, mask);
> -        end = round_up(end, mask);
> -        tables = ((end - start) >> bits) + 1;
> +        map_cmp = domx86->maps + m;
> +        if ( from < map_cmp->area.to && to > map_cmp->area.from )
> +        {
> +            xc_dom_panic(dom->xch, XC_INTERNAL_ERROR,
> +                         "%s: overlapping mappings\n", __FUNCTION__);
> +            return -1;

Please use -EINVAL.

> +        }
>      }
>  
> -    DOMPRINTF("%s: 0x%016" PRIx64 "/%ld: 0x%016" PRIx64
> -              " -> 0x%016" PRIx64 ", %d table(s)",
> -              __FUNCTION__, mask, bits, start, end, tables);
> -    return tables;
> +    memset(map, 0, sizeof(*map));
> +    map->area.from = from & domx86->params->vaddr_mask;
> +    map->area.to = to & domx86->params->vaddr_mask;
> +
> +    for ( l = domx86->params->levels - 1; l >= 0; l-- )
> +    {
> +        map->lvls[l].pfn = pfn + map->area.pgtables;
> +        if ( l == domx86->params->levels - 1 )
> +        {
> +            if ( domx86->n_mappings == 0 )
> +            {
> +                map->lvls[l].from = 0;
> +                map->lvls[l].to = domx86->params->vaddr_mask;
> +                map->lvls[l].pgtables = 1;
> +                map->area.pgtables++;
> +            }
> +            continue;
> +        }

Could use some comments before this hunk. Like "only one top-level
mapping is required".

> +
> +        bits = PAGE_SHIFT_X86 + (l + 1) * PGTBL_LEVEL_SHIFT_X86;
> +        mask = bits_to_mask(bits);
> +        map->lvls[l].from = map->area.from & ~mask;
> +        map->lvls[l].to = map->area.to | mask;
> +
> +        if ( domx86->params->levels == 3 && domx86->n_mappings == 0 &&

Please use PGTBL_LEVELS_I386.

> +             to < 0xc0000000 && l == 1 )
> +        {
> +            DOMPRINTF("%s: PAE: extra l2 page table for l3#3", __FUNCTION__);
> +            map->lvls[l].to = domx86->params->vaddr_mask;
> +        }
> +
> +        for ( m = 0; m < domx86->n_mappings; m++ )
> +        {
> +            map_cmp = domx86->maps + m;
> +            if ( map_cmp->lvls[l].from == map_cmp->lvls[l].to )
> +                continue;
> +            if ( map->lvls[l].from >= map_cmp->lvls[l].from &&
> +                 map->lvls[l].to <= map_cmp->lvls[l].to )
> +            {
> +                map->lvls[l].from = 0;
> +                map->lvls[l].to = 0;
> +                break;
> +            }
> +            assert(map->lvls[l].from >= map_cmp->lvls[l].from ||
> +                   map->lvls[l].to <= map_cmp->lvls[l].to);
> +            if ( map->lvls[l].from >= map_cmp->lvls[l].from &&
> +                 map->lvls[l].from <= map_cmp->lvls[l].to )
> +                map->lvls[l].from = map_cmp->lvls[l].to + 1;
> +            if ( map->lvls[l].to >= map_cmp->lvls[l].from &&
> +                 map->lvls[l].to <= map_cmp->lvls[l].to )
> +                map->lvls[l].to = map_cmp->lvls[l].from - 1;
> +        }
> +        if ( map->lvls[l].from < map->lvls[l].to )
> +            map->lvls[l].pgtables =
> +                ((map->lvls[l].to - map->lvls[l].from) >> bits) + 1;
> +        DOMPRINTF("%s: 0x%016" PRIx64 "/%d: 0x%016" PRIx64 " -> 0x%016" PRIx64
> +                  ", %d table(s)", __FUNCTION__, mask, bits,
> +                  map->lvls[l].from, map->lvls[l].to, map->lvls[l].pgtables);
> +        map->area.pgtables += map->lvls[l].pgtables;
> +    }
> +
> +    return 0;
>  }

  reply	other threads:[~2015-11-12 12:39 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-11-05 14:36 [PATCH v4 0/9] libxc: support building large pv-domains Juergen Gross
2015-11-05 14:36 ` [PATCH v4 1/9] libxc: reorganize domain builder guest memory allocator Juergen Gross
2015-11-12 11:14   ` Wei Liu
2015-11-12 11:20     ` Ian Campbell
2015-11-12 11:22       ` Wei Liu
2015-11-12 11:29       ` Juergen Gross
2015-11-12 11:32         ` Wei Liu
2015-11-12 12:28           ` Juergen Gross
2015-11-12 11:21     ` Juergen Gross
2015-11-12 11:24       ` Wei Liu
2015-11-05 14:36 ` [PATCH v4 2/9] xen: add generic flag to elf_dom_parms indicating support of unmapped initrd Juergen Gross
2015-11-05 17:38   ` Andrew Cooper
2015-11-05 14:36 ` [PATCH v4 3/9] libxc: rename domain builder count_pgtables to alloc_pgtables Juergen Gross
2015-11-05 14:36 ` [PATCH v4 4/9] libxc: introduce domain builder architecture specific data Juergen Gross
2015-11-05 14:36 ` [PATCH v4 5/9] libxc: use domain builder architecture private data for x86 pv domains Juergen Gross
2015-11-05 14:36 ` [PATCH v4 6/9] libxc: create unmapped initrd in domain builder if supported Juergen Gross
2015-11-05 14:36 ` [PATCH v4 7/9] libxc: split p2m allocation in domain builder from other magic pages Juergen Gross
2015-11-05 14:36 ` [PATCH v4 8/9] libxc: rework of domain builder's page table handler Juergen Gross
2015-11-12 12:39   ` Wei Liu [this message]
2015-11-12 12:45     ` Juergen Gross
2015-11-05 14:36 ` [PATCH v4 9/9] libxc: create p2m list outside of kernel mapping if supported Juergen Gross
2015-11-12 12:42   ` Wei Liu
2015-11-12  5:09 ` [PATCH v4 0/9] libxc: support building large pv-domains Juergen Gross
2015-11-12  9:39   ` Wei Liu
2015-11-12  9:41     ` Juergen Gross

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20151112123926.GD24281@zion.uk.xensource.com \
    --to=wei.liu2@citrix.com \
    --cc=Ian.Campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=jgross@suse.com \
    --cc=roger.pau@citrix.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=xen-devel@lists.xen.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.