From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-10.8 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id E2E5BC433DB for ; Fri, 15 Jan 2021 14:57:33 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 8622423370 for ; Fri, 15 Jan 2021 14:57:33 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 8622423370 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=linaro.org Authentication-Results: mail.kernel.org; spf=pass smtp.mailfrom=xen-devel-bounces@lists.xenproject.org Received: from list by lists.xenproject.org with outflank-mailman.68227.122096 (Exim 4.92) (envelope-from ) id 1l0QXN-0005Mu-3z; Fri, 15 Jan 2021 14:57:17 +0000 X-Outflank-Mailman: Message body and most headers restored to incoming version Received: by outflank-mailman (output) from mailman id 68227.122096; Fri, 15 Jan 2021 14:57:17 +0000 Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1l0QXN-0005Mn-0u; Fri, 15 Jan 2021 14:57:17 +0000 Received: by outflank-mailman (input) for mailman id 68227; Fri, 15 Jan 2021 14:57:15 +0000 Received: from us1-rack-iad1.inumbo.com ([172.99.69.81]) by lists.xenproject.org with esmtp (Exim 4.92) (envelope-from ) id 1l0QXL-0005Mh-PB for xen-devel@lists.xenproject.org; Fri, 15 Jan 2021 14:57:15 +0000 Received: from mail-wr1-x42a.google.com (unknown [2a00:1450:4864:20::42a]) by us1-rack-iad1.inumbo.com (Halon) with ESMTPS id 83205f9e-5bf6-423f-9c97-aacd4aad2709; Fri, 15 Jan 2021 14:57:14 +0000 (UTC) Received: by mail-wr1-x42a.google.com with SMTP id d26so9549717wrb.12 for ; Fri, 15 Jan 2021 06:57:14 -0800 (PST) Received: from zen.linaroharston ([51.148.130.216]) by smtp.gmail.com with ESMTPSA id s1sm15716422wrv.97.2021.01.15.06.57.10 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 15 Jan 2021 06:57:10 -0800 (PST) Received: from zen (localhost [127.0.0.1]) by zen.linaroharston (Postfix) with ESMTP id 6550F1FF7E; Fri, 15 Jan 2021 14:57:10 +0000 (GMT) X-BeenThere: xen-devel@lists.xenproject.org List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xenproject.org Precedence: list Sender: "Xen-devel" X-Inumbo-ID: 83205f9e-5bf6-423f-9c97-aacd4aad2709 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=linaro.org; s=google; h=references:user-agent:from:to:cc:subject:date:in-reply-to :message-id:mime-version:content-transfer-encoding; bh=jBAVQdWfTvoD+1gnfoIuv6xKVSuhqLyAYa66vCiHy5k=; b=j9Sz4APRLtPIWo9eO2evt/iKIuS/E+KMr+t0bBkMlHaIQu7Wem9977ynpPrJ1kfo5P eSSb91XFp+sBSMCYKfnF9teUuIRMcDAU0ILbzj5bJ7xoIXrQoLFUkBYdWYXMMzpDKePS g3vdblaVbSBnwfCu53j6dJSyBVNRokW/1ufChN5QAqmp4RGpK2raAF2TkIzSW+0LPvMf sPGE6pVXxUnI5RU74rKjo7mLmEkHCh6MYf1YW8rD+HdqioShoELWZDrGwFPEIBdiOey3 z88uod82vCJ2HoWPfAj9mg859QLY+dyZt/RGtHkohsyrOTlmJi8dRWHcC6es2p5t08of rmEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:references:user-agent:from:to:cc:subject:date :in-reply-to:message-id:mime-version:content-transfer-encoding; bh=jBAVQdWfTvoD+1gnfoIuv6xKVSuhqLyAYa66vCiHy5k=; b=CGANnjXc6SfC00lKASogjf4A0vnzWvRl/hTpgi317nkU/UfzOFUd0j13zZFkTO9vE3 tJkMybVCw9nXvnBZRWBDGNVqG4ZEWWc/DR+IonArPORSWgmOBwAub+9jMu5RJXuPes8S +a+WsGul7J5i++YG+iNJmLLjnLUwZFVGfIATYl/viWaB2mGvT4szNnkhMXkVN4l2KNb0 lnWegLIJaOQd8whiI5jbnPHy+k3QBbTJWbrO95NMfN6K+L2HEXsQEn8H5MwDH1eME2LU bBppQnZ3LxZ0juHpzZgzQf9MHX0kvAbjqAz1IyQcJmjZcIkNdqhamH6CLHtVC52JJm2R eq8g== X-Gm-Message-State: AOAM530pADqQmtEqba3hS2O0I9X9YxzLNwUUZvUWdYabOPFechoAZG8o Ab4Mx1/tkT04Wk0R7ZzdYWdcCw== X-Google-Smtp-Source: ABdhPJw3WkyPoaWAFhdo75d+wBoMQ+eZxQ2mVvU6lDKL2nU11PGh92HJ1qs33eHbiuuTQ+AXaRG/MA== X-Received: by 2002:adf:8145:: with SMTP id 63mr13200498wrm.8.1610722633094; Fri, 15 Jan 2021 06:57:13 -0800 (PST) References: <1610488352-18494-1-git-send-email-olekstysh@gmail.com> <1610488352-18494-5-git-send-email-olekstysh@gmail.com> User-agent: mu4e 1.5.7; emacs 28.0.50 From: Alex =?utf-8?Q?Benn=C3=A9e?= To: Oleksandr Tyshchenko Cc: Oleksandr Tyshchenko , Andrew Cooper , George Dunlap , Ian Jackson , Jan Beulich , Julien Grall , Stefano Stabellini , Wei Liu , Roger Pau =?utf-8?Q?Monn=C3=A9?= , Paul Durrant , Jun Nakajima , Kevin Tian , Tim Deegan , Julien Grall , xen-devel@lists.xenproject.org Subject: Re: [PATCH V4 04/24] xen/ioreq: Make x86's IOREQ feature common Date: Fri, 15 Jan 2021 14:55:12 +0000 In-reply-to: <1610488352-18494-5-git-send-email-olekstysh@gmail.com> Message-ID: <87y2gujlix.fsf@linaro.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Oleksandr Tyshchenko writes: > From: Oleksandr Tyshchenko > > As a lot of x86 code can be re-used on Arm later on, this patch > moves previously prepared IOREQ support to the common code > (the code movement is verbatim copy). > > The "legacy" mechanism of mapping magic pages for the IOREQ servers > remains x86 specific and not exposed to the common code. > > The common IOREQ feature is supposed to be built with IOREQ_SERVER > option enabled, which is selected for x86's config HVM for now. > > In order to avoid having a gigantic patch here, the subsequent > patches will update remaining bits in the common code step by step: > - Make IOREQ related structs/materials common > - Drop the "hvm" prefixes and infixes > - Remove layering violation by moving corresponding fields > out of *arch.hvm* or abstracting away accesses to them > > Also include which will be needed on Arm > to avoid touch the common code again when introducing Arm specific bits. > > This support is going to be used on Arm to be able run device > emulator outside of Xen hypervisor. > > Signed-off-by: Oleksandr Tyshchenko > CC: Julien Grall > [On Arm only] > Tested-by: Wei Chen > > --- > Please note, this is a split/cleanup/hardening of Julien's PoC: > "Add support for Guest IO forwarding to a device emulator" > > *** > Please note, this patch depends on the following which is > on review: > https://patchwork.kernel.org/patch/11816689/ > *** Just a note on process because I got tripped up again after applying the series to a clean branch. I tend to just include any pre-requisite patches in my series just to make them easy to apply as a standalone series even if I'm expecting the master version of the patch to get merged before my series. It usually disappears on the next re-base ;-) --=20 Alex Benn=C3=A9e