All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Chen, Tiejun" <tiejun.chen@intel.com>
To: Jan Beulich <JBeulich@suse.com>
Cc: kevin.tian@intel.com, ian.campbell@citrix.com,
	stefano.stabellini@eu.citrix.com,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	ian.jackson@eu.citrix.com, xen-devel@lists.xen.org,
	yang.z.zhang@intel.com
Subject: Re: [v5][PATCH 03/10] xen:x86: define a new hypercall to get RMRR mappings
Date: Wed, 03 Sep 2014 17:54:58 +0800	[thread overview]
Message-ID: <5406E572.4030301@intel.com> (raw)
In-Reply-To: <5406D8DB.7020503@intel.com>

On 2014/9/3 17:01, Chen, Tiejun wrote:
> On 2014/9/3 16:59, Chen, Tiejun wrote:
>> On 2014/9/3 16:41, Jan Beulich wrote:
>>>>>> On 03.09.14 at 10:31, <tiejun.chen@intel.com> wrote:
>>>> On 2014/9/3 9:45, Chen, Tiejun wrote:
>>>>> On 2014/9/2 21:15, Jan Beulich wrote:
>>>>>>>>> On 02.09.14 at 13:10, <tiejun.chen@intel.com> wrote:
>>>>>>> On 2014/9/2 18:15, Jan Beulich wrote:
>>>>>>>>>>> On 02.09.14 at 11:59, <tiejun.chen@intel.com> wrote:
>>>>>>>>> +    case XENMEM_reserved_device_memory_map:
>>>>>>>>> +    {
>>>>>>>>> +        struct xen_mem_reserved_device_memory *xmrdm = NULL;
>>>>>>>>> +        struct xen_mem_reserved_device_memory_map xmrdmm;
>>>>>>>>> +        XEN_GUEST_HANDLE(xen_mem_reserved_device_memory_t)
>>>>>>>>> buffer;
>>>>>>>>> +        XEN_GUEST_HANDLE_PARAM(xen_mem_reserved_device_memory_t)
>>>>>>>>> buffer_param;
>>>>>>>>> +        const struct iommu_ops *ops = iommu_get_ops();
>>>>>>>>> +        unsigned int nr_entries = 0;
>>>>>>>>> +        unsigned int i = 0;
>>>>>>>>> +
>>>>>>>>> +        xmrdm = ops->get_device_reserved_memory(&nr_entries);
>>>>>>>
>>>>>>> Do we still need this iommu_ops somewhere else?
>>>>>>
>>>>>> Not this one, but another one (as I had described further down).
>>>>>>
>>>>>>>>> +        if ( !nr_entries )
>>>>>>>
>>>>>>> Do we still need this 'nr_entries' here?
>>>>>>
>>>>>> Doesn't look like so. But it's you coding this up - you ought to
>>>>>> clearly
>>>>>> see what is needed and what not.
>>>>>>
>>>>>
>>>>> I mean we need to get 'nr_entries' before any real operations since if
>>>>> that is zero, any following operations are pointless. And even that is
>>>>> nonzero, but actually the user don't know how many buffer should be
>>>>> passed, so often we may need to notify user again at the first time
>>>>> then
>>>>> the user call this again with a appropriate buffer. Right?
>>>>>
>>>>> So how do we get this 'nr_entries'? Seems we have to to go VT-D
>>>>> stuff to
>>>>> walk that list or other similar approaches. If so, why we still get
>>>>> those real mapping entries later by accessing VT-D stuff again?
>>>>>
>>>>> Shouldn't we figure out a approach we just call one time?
>>>>>
>>>>
>>>> I update this patch based on this point:
>>>
>>> I'm afraid I have to give up and instead go and implement this for
>>> you (which already by now would clearly have been the much less
>>> time consuming thing at least on my end).
>>>
>>
>> I think I should cover your latest comment:
>
> I mean last revision I pasted already covered your latest comment.

I guess finally you will "go and implement this" as you said. So thanks 
for your time and guidance on this series of RFC patches.

Once you finish it, please tell me then I can test them.

Thanks
Tiejun

>
> Thanks
> Tiejun
>
>>
>> "> Just go look for other examples of similar operations: There's
>>  > absolutely no need to know the number of entries up front. Just
>>  > have a way for the callback function to signal its caller that it
>>  > can abort the loop and return right away if you really need this.
>>  > But I doubt you do, since even when the caller has provided too
>>  > little buffer space you still want to tell it how much is needed. And
>>  > the necessary counting would still be done in the callback function.
>>  >
>>  > Jan
>> "
>> #1 Don't need to know entries in advance
>> #2 Just copy the entries as the caller but return a -ENOBUFS
>>
>> +    case XENMEM_reserved_device_memory_map:
>> +    {
>> +        struct xen_mem_reserved_device_memory_map xmrdmmap;
>> +
>> +        if ( copy_from_guest(&xmrdmmap, arg, 1) )
>> +            return -EFAULT;
>> +
>> +        rc = copy_drmmap_to_guest(do_copy_device_reserved_memory,
>> &xmrdmmap);
>> +
>> +        if ( __copy_to_guest(arg, &xmrdmmap, 1) )
>> +                rc = -EFAULT;
>> +
>> +        return rc;
>> +    }
>> +
>>
>> And
>>
>> +int
>> +do_copy_device_reserved_memory(struct
>> xen_mem_reserved_device_memory_map *xmrdmmap)
>> +{
>> +    struct acpi_rmrr_unit *rmrru;
>> +    struct xen_mem_reserved_device_memory xmrdm;
>> +    int i = 0, rc = 0;
>> +    XEN_GUEST_HANDLE_PARAM(xen_mem_reserved_device_memory_t)
>> buffer_param;
>> +    XEN_GUEST_HANDLE(xen_mem_reserved_device_memory_t) buffer;
>> +
>> +    if ( list_empty(&acpi_rmrr_units) )
>> +        return -ENOENT;
>> +
>> +    buffer_param = guest_handle_cast(xmrdmmap->buffer,
>> +                                     xen_mem_reserved_device_memory_t);
>> +    buffer = guest_handle_from_param(buffer_param,
>> +                                     xen_mem_reserved_device_memory_t);
>> +    if ( !guest_handle_okay(buffer, xmrdmmap->nr_entries) )
>> +        return -EFAULT;
>> +
>> +    list_for_each_entry(rmrru, &acpi_rmrr_units, list)
>> +    {
>> +        if ( i < xmrdmmap->nr_entries )
>> +        {
>> +            xmrdm.start_pfn = rmrru->base_address >> PAGE_SHIFT;
>> +            xmrdm.nr_pages = PAGE_ALIGN(rmrru->end_address -
>> +                                        rmrru->base_address) /
>> +                                        PAGE_SIZE;
>> +            if ( __copy_to_guest_offset(buffer, i, &xmrdm, 1) )
>> +                return -EFAULT;
>> +        }
>> +        else
>> +            rc = -ENOBUFS;
>> +        i++;
>> +    }
>> +
>> +    xmrdmmap->nr_entries = i;
>> +
>> +    return rc;
>> +}
>> +
>>
>> Thanks
>> Tiejun

  reply	other threads:[~2014-09-03  9:54 UTC|newest]

Thread overview: 53+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2014-08-26 11:02 [v5][PATCH 0/10] xen: reserve RMRR to avoid conflicting MMIO/RAM Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 01/10] xen:vtd:rmrr: export acpi_rmrr_units Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 02/10] xen:vtd:rmrr: introduce acpi_rmrr_unit_entries Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 03/10] xen:x86: define a new hypercall to get RMRR mappings Tiejun Chen
2014-08-26 12:02   ` Andrew Cooper
2014-08-26 12:37     ` Jan Beulich
2014-08-27  1:37       ` Chen, Tiejun
2014-08-27  6:51         ` Jan Beulich
2014-08-27  7:21           ` Chen, Tiejun
2014-08-28  2:24             ` Chen, Tiejun
2014-08-28  6:50               ` Jan Beulich
2014-08-28  7:09                 ` Chen, Tiejun
2014-08-28  7:19                   ` Chen, Tiejun
2014-08-28  7:29                     ` Chen, Tiejun
2014-08-28  7:44                     ` Jan Beulich
2014-08-29  3:02                       ` Chen, Tiejun
2014-08-29  9:18                         ` Jan Beulich
2014-09-01  9:44                           ` Chen, Tiejun
2014-09-01 10:29                             ` Jan Beulich
2014-09-02  9:59                               ` Chen, Tiejun
2014-09-02 10:15                                 ` Jan Beulich
2014-09-02 11:10                                   ` Chen, Tiejun
2014-09-02 13:15                                     ` Jan Beulich
2014-09-03  1:45                                       ` Chen, Tiejun
2014-09-03  8:31                                         ` Chen, Tiejun
2014-09-03  8:41                                           ` Jan Beulich
2014-09-03  8:59                                             ` Chen, Tiejun
2014-09-03  9:01                                               ` Chen, Tiejun
2014-09-03  9:54                                                 ` Chen, Tiejun [this message]
2014-09-03 12:54                                             ` Jan Beulich
2014-09-04  1:15                                               ` Chen, Tiejun
2014-09-03  8:35                                         ` Jan Beulich
2014-08-27  1:15     ` Chen, Tiejun
2014-09-02  8:25   ` Jan Beulich
2014-08-26 11:02 ` [v5][PATCH 04/10] tools:libxc: introduce hypercall for xc_reserved_device_memory_map Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 05/10] tools:libxc: check if mmio BAR is out of RMRR mappings Tiejun Chen
2014-08-26 11:02 ` [v5][PATCH 06/10] hvm_info_table: introduce nr_reserved_device_memory_map Tiejun Chen
2014-09-02  8:34   ` Jan Beulich
2014-09-04  2:07     ` Chen, Tiejun
2014-09-04  6:32       ` Jan Beulich
2014-09-04  6:55         ` Chen, Tiejun
     [not found]           ` <54082E3B0200007800030BCB@mail.emea.novell.com>
2014-09-09  6:40             ` Chen, Tiejun
2014-08-26 11:02 ` [v5][PATCH 07/10] xen:x86:: support xc_reserved_device_memory_map in compat case Tiejun Chen
2014-09-02  8:35   ` Jan Beulich
2014-09-04  2:13     ` Chen, Tiejun
2014-08-26 11:02 ` [v5][PATCH 08/10] tools:firmware:hvmloader: introduce hypercall for xc_reserved_device_memory_map Tiejun Chen
2014-09-02  8:37   ` Jan Beulich
2014-08-26 11:02 ` [v5][PATCH 09/10] tools:firmware:hvmloader: check to reserve RMRR mappings in e820 Tiejun Chen
2014-09-02  8:47   ` Jan Beulich
2014-09-04  3:04     ` Chen, Tiejun
2014-09-04  4:32       ` Chen, Tiejun
2014-09-04  6:36       ` Jan Beulich
2014-08-26 11:03 ` [v5][PATCH 10/10] xen:vtd: make USB RMRR mapping safe Tiejun Chen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=5406E572.4030301@intel.com \
    --to=tiejun.chen@intel.com \
    --cc=JBeulich@suse.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=kevin.tian@intel.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=xen-devel@lists.xen.org \
    --cc=yang.z.zhang@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.