All of lore.kernel.org
 help / color / mirror / Atom feed
From: "Roger Pau Monné" <roger.pau@citrix.com>
To: Wei Liu <wei.liu2@citrix.com>
Cc: Ian Campbell <ian.campbell@citrix.com>,
	Stefano Stabellini <stefano.stabellini@eu.citrix.com>,
	Andrew Cooper <andrew.cooper3@citrix.com>,
	Ian Jackson <ian.jackson@eu.citrix.com>,
	Jan Beulich <jbeulich@suse.com>,
	xen-devel@lists.xenproject.org
Subject: Re: [PATCH v4 25/31] xen: allow HVM guests to use XENMEM_memory_map
Date: Fri, 7 Aug 2015 18:00:28 +0200	[thread overview]
Message-ID: <55C4D61C.9030005@citrix.com> (raw)
In-Reply-To: <20150807155559.GY6005@zion.uk.xensource.com>

El 07/08/15 a les 17.55, Wei Liu ha escrit:
> On Fri, Aug 07, 2015 at 05:44:22PM +0200, Roger Pau Monné wrote:
>> El 07/08/15 a les 14.22, Wei Liu ha escrit:
>>> On Fri, Aug 07, 2015 at 12:18:02PM +0200, Roger Pau Monne wrote:
>>>> Enable this hypercall for HVM guests in order to fetch the e820 memory
>>>> map in the absence of an emulated BIOS. The memory map is populated and
>>>> notified to Xen in arch_setup_meminit_hvm.
>>>>
>>>> Signed-off-by: Roger Pau Monné <roger.pau@citrix.com>
>>>> Cc: Ian Jackson <ian.jackson@eu.citrix.com>
>>>> Cc: Stefano Stabellini <stefano.stabellini@eu.citrix.com>
>>>> Cc: Ian Campbell <ian.campbell@citrix.com>
>>>> Cc: Wei Liu <wei.liu2@citrix.com>
>>>> Cc: Jan Beulich <jbeulich@suse.com>
>>>> Cc: Andrew Cooper <andrew.cooper3@citrix.com>
>>>> ---
>>>>  tools/libxc/xc_dom_x86.c | 29 ++++++++++++++++++++++++++++-
>>>>  1 file changed, 28 insertions(+), 1 deletion(-)
>>>>
>>>> diff --git a/tools/libxc/xc_dom_x86.c b/tools/libxc/xc_dom_x86.c
>>>> index b587b12..87bce6e 100644
>>>> --- a/tools/libxc/xc_dom_x86.c
>>>> +++ b/tools/libxc/xc_dom_x86.c
>>>> @@ -1205,6 +1205,7 @@ static int check_mmio_hole(uint64_t start, uint64_t memsize,
>>>>          return 1;
>>>>  }
>>>>  
>>>> +#define MAX_E820_ENTRIES    128
>>>>  static int meminit_hvm(struct xc_dom_image *dom)
>>>>  {
>>>>      unsigned long i, vmemid, nr_pages = dom->total_pages;
>>>> @@ -1225,6 +1226,8 @@ static int meminit_hvm(struct xc_dom_image *dom)
>>>>      unsigned int nr_vmemranges, nr_vnodes;
>>>>      xc_interface *xch = dom->xch;
>>>>      uint32_t domid = dom->guest_domid;
>>>> +    struct e820entry entries[MAX_E820_ENTRIES];
>>>> +    int e820_index = 0;
>>>>  
>>>>      if ( nr_pages > target_pages )
>>>>          memflags |= XENMEMF_populate_on_demand;
>>>> @@ -1275,6 +1278,13 @@ static int meminit_hvm(struct xc_dom_image *dom)
>>>>          vnode_to_pnode = dom->vnode_to_pnode;
>>>>      }
>>>>  
>>>> +    /* Add one additional memory range to account for the VGA hole */
>>>> +    if ( (nr_vmemranges + (dom->emulation ? 1 : 0)) > MAX_E820_ENTRIES )
>>>> +    {
>>>> +        DOMPRINTF("Too many memory ranges");
>>>> +        goto error_out;
>>>> +    }
>>>> +
>>>>      total_pages = 0;
>>>>      p2m_size = 0;
>>>>      for ( i = 0; i < nr_vmemranges; i++ )
>>>> @@ -1363,9 +1373,13 @@ static int meminit_hvm(struct xc_dom_image *dom)
>>>>       * Under 2MB mode, we allocate pages in batches of no more than 8MB to 
>>>>       * ensure that we can be preempted and hence dom0 remains responsive.
>>>>       */
>>>> -    if ( dom->emulation )
>>>> +    if ( dom->emulation ) {
>>>>          rc = xc_domain_populate_physmap_exact(
>>>>              xch, domid, 0xa0, 0, memflags, &dom->p2m_host[0x00]);
>>>> +        entries[e820_index].addr = 0;
>>>> +        entries[e820_index].size = 0xa0 << PAGE_SHIFT;
>>>> +        entries[e820_index++].type = E820_RAM;
>>>> +    }
>>>>  
>>>>      stat_normal_pages = 0;
>>>>      for ( vmemid = 0; vmemid < nr_vmemranges; vmemid++ )
>>>> @@ -1392,6 +1406,12 @@ static int meminit_hvm(struct xc_dom_image *dom)
>>>>          else
>>>>              cur_pages = vmemranges[vmemid].start >> PAGE_SHIFT;
>>>>  
>>>> +        /* Build an e820 map. */
>>>> +        entries[e820_index].addr = cur_pages << PAGE_SHIFT;
>>>> +        entries[e820_index].size = vmemranges[vmemid].end -
>>>> +                                   entries[e820_index].addr;
>>>> +        entries[e820_index++].type = E820_RAM;
>>>> +
>>>>          while ( (rc == 0) && (end_pages > cur_pages) )
>>>>          {
>>>>              /* Clip count to maximum 1GB extent. */
>>>> @@ -1509,6 +1529,13 @@ static int meminit_hvm(struct xc_dom_image *dom)
>>>>      DPRINTF("  2MB PAGES: 0x%016lx\n", stat_2mb_pages);
>>>>      DPRINTF("  1GB PAGES: 0x%016lx\n", stat_1gb_pages);
>>>>  
>>>> +    rc = xc_domain_set_memory_map(xch, domid, entries, e820_index);
>>>> +    if ( rc != 0 )
>>>> +    {
>>>> +        DOMPRINTF("unable to set memory map.");
>>>> +        goto error_out;
>>>> +    }
>>>> +
>>>
>>> I think in RDM series there is already a memory map generated in libxl.
>>>
>>> You might want to move this to libxl, which is supposed to be the
>>> arbitrator of what a guest should look like.
>>>
>>> What do you think?
>>
>> I would like to do that, the only problem I see is that libxl doesn't
>> have any notion of the "special pages", so it doesn't know the size of
>> the hole it has to made. I guess one solution would be moving the
>> defines at the top of xc_dom_x86.c to a public libxc header so libxl can
>> pick up the size and position of the hole.
> 
> But the code above has no notion of special pages either. Can it not
> just use the E820 map generated in libxl? I think at the time you wrote
> this patch libxl doesn't generate E820 for HVM guest, but it does now,
> so maybe you can drop this patch?

Yes, by the time I did that libxl was not building any memory map for
HVM guests. This was a preparatory patch so HVMlite guests could fetch a
memory map using the hypercall interface.

I agree that now that libxl builds a memory map this is no longer
needed, I will find a way to build a correct memory map for HVMlite
guests from libxl.

> BTW the title is not very accurate because this patch doesn't involve
> allowing / disallowing hvm to use that hypercall.

>From our talk above I guess this is going to be dropped/replaced from
the series anyway, so no need to think of a better subject :).

Roger.

  reply	other threads:[~2015-08-07 16:01 UTC|newest]

Thread overview: 84+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2015-08-07 10:17 [PATCH v4 00/31] Introduce HVM without dm and new boot ABI Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 01/31] libxl: fix libxl__build_hvm error handling Roger Pau Monne
2015-08-07 10:49   ` Wei Liu
2015-08-07 10:55     ` Roger Pau Monné
2015-08-07 11:03       ` Wei Liu
2015-08-07 11:28         ` Roger Pau Monné
2015-08-07 11:43           ` Wei Liu
2015-08-13 15:04   ` Ian Jackson
2015-08-13 15:06   ` Wei Liu
2015-08-16  8:01     ` Ian Campbell
2015-08-07 10:17 ` [PATCH v4 02/31] libxc: split x86 HVM setup_guest into smaller logical functions Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 03/31] libxc: unify xc_dom_p2m_{host/guest} Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 04/31] libxc: introduce the notion of a container type Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 05/31] libxc: introduce a domain loader for HVM guest firmware Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 06/31] libxc: make arch_setup_meminit a xc_dom_arch hook Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 07/31] libxc: make arch_setup_boot{init/late} xc_dom_arch hooks Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 08/31] libxc: rework BSP initialization Roger Pau Monne
2015-08-07 11:31   ` Wei Liu
2015-08-07 12:04     ` Roger Pau Monné
2015-08-07 12:06       ` Wei Liu
2015-08-07 15:30         ` Andrew Cooper
2015-08-07 15:22   ` Andrew Cooper
2015-08-07 10:17 ` [PATCH v4 09/31] libxc: introduce a xc_dom_arch for hvm-3.0-x86_32 guests Roger Pau Monne
2015-08-07 12:00   ` Wei Liu
2015-08-07 15:58   ` Andrew Cooper
2015-08-07 10:17 ` [PATCH v4 10/31] libxl: switch HVM domain building to use xc_dom_* helpers Roger Pau Monne
2015-08-07 12:12   ` Wei Liu
2015-08-07 10:17 ` [PATCH v4 11/31] libxc: remove dead HVM building code Roger Pau Monne
2015-08-07 12:12   ` Wei Liu
2015-08-07 15:59   ` Andrew Cooper
2015-08-07 10:17 ` [PATCH v4 12/31] xen/x86: add bitmap of enabled emulated devices Roger Pau Monne
2015-08-07 16:08   ` Andrew Cooper
2015-08-07 10:17 ` [PATCH v4 13/31] xen/x86: allow disabling the emulated local apic Roger Pau Monne
2015-08-07 14:09   ` Boris Ostrovsky
2015-08-07 15:41     ` Roger Pau Monné
2015-08-07 16:11       ` Boris Ostrovsky
2015-08-07 16:18         ` Roger Pau Monné
2015-08-07 16:29   ` Andrew Cooper
2015-08-07 10:17 ` [PATCH v4 14/31] xen/x86: allow disabling the emulated HPET Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 15/31] xen/x86: allow disabling the pmtimer Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 16/31] xen/x86: allow disabling the emulated RTC Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 17/31] xen/x86: allow disabling the emulated IO APIC Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 18/31] xen/x86: allow disabling the emulated PIC Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 19/31] xen/x86: allow disabling the emulated pmu Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 20/31] xen/x86: allow disabling the emulated VGA Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 21/31] xen/x86: allow disabling the emulated IOMMU Roger Pau Monne
2015-08-07 10:17 ` [PATCH v4 22/31] xen/x86: allow disabling all emulated devices inside of Xen Roger Pau Monne
2015-08-07 16:32   ` Andrew Cooper
2015-08-07 10:18 ` [PATCH v4 23/31] elfnotes: intorduce a new PHYS_ENTRY elfnote Roger Pau Monne
2015-08-07 16:37   ` Andrew Cooper
2015-08-07 16:44   ` Wei Liu
2015-08-07 10:18 ` [PATCH v4 24/31] libxc: allow creating domains without emulated devices Roger Pau Monne
2015-08-07 12:18   ` Wei Liu
2015-08-07 16:36   ` Andrew Cooper
2015-08-17 15:55     ` Roger Pau Monné
2015-08-18 16:25       ` Andrew Cooper
2015-08-07 10:18 ` [PATCH v4 25/31] xen: allow HVM guests to use XENMEM_memory_map Roger Pau Monne
2015-08-07 12:22   ` Wei Liu
2015-08-07 15:44     ` Roger Pau Monné
2015-08-07 15:55       ` Wei Liu
2015-08-07 16:00         ` Roger Pau Monné [this message]
2015-08-07 10:18 ` [PATCH v4 26/31] xen/x86: allow HVM guests to use hypercalls to bring up vCPUs Roger Pau Monne
2015-08-07 19:03   ` Andrew Cooper
2015-08-12  8:22     ` Jan Beulich
2015-08-07 10:18 ` [PATCH v4 27/31] xenconsole: try to attach to PV console if HVM fails Roger Pau Monne
2015-08-07 12:25   ` Wei Liu
2015-08-07 10:18 ` [PATCH v4 28/31] libxc/xen: introduce HVM_PARAM_CMDLINE_PFN Roger Pau Monne
2015-08-07 12:32   ` Wei Liu
2015-08-07 17:30   ` Andrew Cooper
2015-08-18 10:01     ` Roger Pau Monné
2015-08-18 16:32       ` Andrew Cooper
2015-08-07 10:18 ` [PATCH v4 29/31] libxc/xen: introduce HVM_PARAM_MODLIST_PFN Roger Pau Monne
2015-08-07 12:36   ` Wei Liu
2015-08-07 10:18 ` [PATCH v4 30/31] libxc: switch xc_dom_elfloader to be used with HVMlite domains Roger Pau Monne
2015-08-07 17:43   ` Andrew Cooper
2015-08-07 10:18 ` [PATCH v4 31/31] libxl: allow the creation of HVM domains without a device model Roger Pau Monne
2015-08-07 12:58   ` Wei Liu
2015-08-07 15:51     ` Roger Pau Monné
2015-08-07 16:24       ` Wei Liu
2015-08-07 18:41         ` Andrew Cooper
2015-08-10  7:57           ` Paul Durrant
2015-08-07 15:18   ` Konrad Rzeszutek Wilk
2015-08-07 15:57     ` Roger Pau Monné
2015-08-07 17:52       ` Andrew Cooper

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=55C4D61C.9030005@citrix.com \
    --to=roger.pau@citrix.com \
    --cc=andrew.cooper3@citrix.com \
    --cc=ian.campbell@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=jbeulich@suse.com \
    --cc=stefano.stabellini@eu.citrix.com \
    --cc=wei.liu2@citrix.com \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.