[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [XenPPC] Xencomm for xen/ia64



(CCed to xen-devel for completeness. ;)

On Wed, 2006-08-16 at 17:24 +0200, Tristan Gingold wrote:
> I am porting xen-ppc's xencomm to xen/ia64.
> Currently on xen/ia64 copy_from/to_guest uses guest virtual address.  This 
> works well as long as the virtual addresses are in the TLB.  When not in TLB 
> (or vTLB) the hypercall can't success without domain help.  The possible 
> solution is either to touch the memory areas before doing the hypercall 
> and/or restarting the hypercall.
> 
> Touching the memory area is an hack and we can't be sure it works.
> Restarting the hypercall is not always possible (some hypercalls are atomic: 
> DOM0_SHADOW_CONTROL_OP_CLEAN) or can result in a live-lock.
> 
> The most simple solution is to use guest physical addresses instead of 
> virtual 
> addresses.

Absolutely agreed.

> For hypercalls directly issued by the kernel, the translation is very easy.  
> For hypercalls (indirectly) issued by dom0 though the ioctl, kernel has to do 
> the translation.  Because it may not be linear in guest physical memory the 
> parameter is a pointer to a list of page (xencomm).
> 
> The pros of such approach is simplicity and reliability.
> 
> The main cons is maybe speed.  Hopefully the most frequent hypercalls (dom0vp 
> and eoi) either don't use in memory parameters (dom0vp) or may be modified so 
> that they pass parameters through registers (eoi).  IMHO speed won't be 
> affected.
> 
> Access to guest memory is also performed during vcpu_translate (to read vhpt) 
> or EFI/PAL/SAL calls.  We can either do not change that code (ie both 
> mechanisms are not exclusive) or change the code.  This point will be 
> postpone.

Right, by switching to the xencomm approach for copy_*_guest(), you lose
the ability to copy_*_guest() with arbitrary addresses, because
copy_*_guest() *requires* that the guest kernel has passed in a xencomm
structure.

x86 has a copy_*_user() implementation, which is used only in x86 code
and is independent of the copy_*_guest() API. You could create a similar
parallel API if you need to.

> If we agree on using xencomm we will have to work with xen/ppc people in 
> order 
> not to duplicate the code.  Hopefully it is rather small.  I have enhanced 
> the xencomm code so that the kernel may not use xencomm area but pass the 
> guest physical address with a flag to know the space is linear in memory.
> 
> At this time I can boot dom0 with xencomm.  I will publish the patch later.

I'll be very interested to see your patch. I guess the "flag" is a
reserved bit in the (physical) address passed from kernel to hypervisor?
Does that really gain much performance?

I guess you will need to do the same thing we need to with privcmd ioctl
handling, i.e. copy and modify the pointers in the dom0_op data
structures passed to the kernel. :(

We need to do one more thing though: we *also* need to change fix up the
size of longs and pointers in our code (since 32-bit userland is passing
structures to a 64-bit kernel). So perhaps these two fixup passes could
be split: we could share the xencomm conversion in common code, and PPC
arch code could contain the size munging.

This is why passing complex data structures as hcall parameters will
always be a bad thing.

-- 
Hollis Blanchard
IBM Linux Technology Center


_______________________________________________
Xen-ppc-devel mailing list
Xen-ppc-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-ppc-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.