[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [Xen-devel] [v4][PATCH 2/9] xen:x86: define a new hypercall to get RMRR mappings
 
 
On 2014/8/25 20:07, Andrew Cooper wrote:
 
On 25/08/14 12:21, Chen, Tiejun wrote:
 
On 2014/8/22 18:53, Andrew Cooper wrote:
 
On 22/08/14 11:09, Tiejun Chen wrote:
 
We need this new hypercall to get RMRR mapping for VM.
Signed-off-by: Tiejun Chen <tiejun.chen@xxxxxxxxx>
---
   xen/arch/x86/mm.c           | 71
+++++++++++++++++++++++++++++++++++++++++++++
   xen/include/public/memory.h | 37 ++++++++++++++++++++++-
   2 files changed, 107 insertions(+), 1 deletion(-)
diff --git a/xen/arch/x86/mm.c b/xen/arch/x86/mm.c
index d23cb3f..e0d6650 100644
--- a/xen/arch/x86/mm.c
+++ b/xen/arch/x86/mm.c
@@ -123,6 +123,7 @@
   #include <asm/setup.h>
   #include <asm/fixmap.h>
   #include <asm/pci.h>
+#include <asm/acpi.h>
   /* Mapping of the fixmap space needed early. */
   l1_pgentry_t __attribute__ ((__section__ (".bss.page_aligned")))
@@ -4842,6 +4843,76 @@ long arch_memory_op(unsigned long cmd,
XEN_GUEST_HANDLE_PARAM(void) arg)
           return rc;
       }
+    case XENMEM_reserved_device_memory_map:
+    {
+        struct xen_reserved_device_memory_map map;
+        XEN_GUEST_HANDLE(xen_reserved_device_memory_t) buffer;
+        XEN_GUEST_HANDLE_PARAM(xen_reserved_device_memory_t)
buffer_param;
+        unsigned int i = 0;
+        static unsigned int nr_entries = 0;
+        static struct xen_reserved_device_memory *rmrr_map;
 
Absolutely not.  This hypercall can easy be run concurrently.
 
+        struct acpi_rmrr_unit *rmrr;
+
+        if ( copy_from_guest(&map, arg, 1) )
+            return -EFAULT;
+
+        if ( !nr_entries )
+            /* Currently we just need to cover RMRR. */
+            list_for_each_entry( rmrr, &acpi_rmrr_units, list )
+                nr_entries++;
 
 
Maintain a global count as entries are added/removed from this list.  It
is a waste of time recounting this list for each hypercall.
 
 
Are you saying push this 'nr_entries' as a global count somewhere? I
guess I can set this when we first construct acpi_rmrr_units in ACPI
stuff.
 
 
Not named "nr_entries", but yes.  It is constant after boot.
 
 
 
+
+        if ( !nr_entries )
+                return -ENOENT;
+        else
+        {
+            if ( rmrr_map == NULL )
+            {
+                rmrr_map = xmalloc_array(xen_reserved_device_memory_t,
+                                         nr_entries);
 
You can do all of this without any memory allocation.
 
 
 
 
 
 What is your way without any memory allocation? Do you mean I should 
predefine a static array here? But how to predetermine the size?
Or you mean I should do something with one rmrr_map, like this,
        struct xen_mem_reserved_device_memory rmrr_map;
        list_for_each_entry( rmrr, &acpi_rmrr_units, list )
        {
                rmrr_map.start_pfn = ...;
                rmrr_map.nr_pages = ...;
                if ( copy_to_guest_offset(buffer, i, &rmrr_map, 1) )            
            return -EFAULT;
                i++;
        }
I will check this.
 
 
It is easy...
 
 
 
+                if ( rmrr_map == NULL )
+                {
+                    return -ENOMEM;
+                }
+
+                list_for_each_entry( rmrr, &acpi_rmrr_units, list )
+                {
+                    rmrr_map[i].pfn = rmrr->base_address >>
PAGE_SHIFT;
+                    rmrr_map[i].count = PAGE_ALIGN(rmrr->end_address -
+
rmrr->base_address) /
+                                                   PAGE_SIZE;
+                    i++;
 
 
 
In this loop, construct one on the stack and copy_to_guest, breaking if
there is a fault or you exceed the guests array.
 
 
 Its not possible to exceed the guests array since the caller always 
check if it get such a error, -ENOBUFS, then if yes, it can reallocate 
appropriate array.
Thanks
Tiejun
 
 
+                }
+            }
+        }
+
+        if ( map.nr_entries < nr_entries )
+        {
+            map.nr_entries =  nr_entries;
+            if ( copy_to_guest(arg, &map, 1) )
+                return -EFAULT;
+            return -ENOBUFS;
+        }
+
+        map.nr_entries =  nr_entries;
+        buffer_param = guest_handle_cast(map.buffer,
+
xen_reserved_device_memory_t);
+        buffer = guest_handle_from_param(buffer_param,
+
xen_reserved_device_memory_t);
+        if ( !guest_handle_okay(buffer, map.nr_entries) )
+            return -EFAULT;
+
+        for ( i = 0; i < map.nr_entries; ++i )
+        {
+            if ( copy_to_guest_offset(buffer, i, rmrr_map + i, 1) )
+                return -EFAULT;
+        }
+
+        if ( copy_to_guest(arg, &map, 1) )
+                return -EFAULT;
+
+        return 0;
+    }
+
       default:
           return subarch_memory_op(cmd, arg);
       }
diff --git a/xen/include/public/memory.h b/xen/include/public/memory.h
index 2c57aa0..8481843 100644
--- a/xen/include/public/memory.h
+++ b/xen/include/public/memory.h
@@ -523,7 +523,42 @@ DEFINE_XEN_GUEST_HANDLE(xen_mem_sharing_op_t);
   #endif /* defined(__XEN__) || defined(__XEN_TOOLS__) */
-/* Next available subop number is 26 */
+/*
+ * Some devices may reserve some range.
 
"range" is not a useful unit of measure.
 
 
So what about this?
The regions of memory used for some devices should be reserved.
 
 
No - it is not a case of "should", it is a case of "must".
"For legacy reasons, some devices must be configured with special memory
regions to function correctly.  The guest must avoid using any of these
regions."
 
 
 
+ *
+ * Currently we just have RMRR
+ * - Reserved memory Region Reporting Structure,
+ * So returns the RMRR memory map as it was when the domain
+ * was started.
+ */
+#define XENMEM_reserved_device_memory_map   26
+struct xen_reserved_device_memory {
 
xen_mem_ to match the prevailing style
 
 
Okay.
 
 
+    /* PFN of the current mapping of the page. */
+    xen_pfn_t pfn;
+    /* Number of the current mapping pages. */
+    xen_ulong_t count;
+};
 
 
This struct marks a range, but the fields don't make it clear.  I would
suggest "start" and "nr_frames" as names.
 
 
I will prefer Jan's suggestion.
 
 
As do I,
~Andrew
 
 
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
 
 
    
     |