[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v3 1/3] x86/ioreq server(patch for 4.7): Rename p2m_mmio_write_dm to p2m_ioreq_server.
On Mon, Apr 25, 2016 at 11:35 AM, Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx> wrote: > Previously p2m type p2m_mmio_write_dm was introduced for write- > protected memory pages whose write operations are supposed to be > forwarded to and emulated by an ioreq server. Yet limitations of > rangeset restrict the number of guest pages to be write-protected. > > This patch replaces the p2m type p2m_mmio_write_dm with a new name: > p2m_ioreq_server, which means this p2m type can be claimed by one > ioreq server, instead of being tracked inside the rangeset of ioreq > server. Patches following up will add the related hvmop handling > code which map/unmap type p2m_ioreq_server to/from an ioreq server. > > changes in v3: > - According to Jan & George's comments, keep HVMMEM_mmio_write_dm > for old xen interface versions, and replace it with HVMMEM_unused > for xen interfaces newer than 4.7.0; For p2m_ioreq_server, a new > enum - HVMMEM_ioreq_server is introduced for the get/set mem type > interfaces; > - Add George's Reviewed-by and Acked-by from Tim & Andrew. Unfortunately these rather contradict each other -- I consider Reviewed-by to only stick if the code I've specified hasn't changed (or has only changed trivially). Also... > > changes in v2: > - According to George Dunlap's comments, only rename the p2m type, > with no behavior changes. > > Signed-off-by: Paul Durrant <paul.durrant@xxxxxxxxxx> > Signed-off-by: Yu Zhang <yu.c.zhang@xxxxxxxxxxxxxxx> > Acked-by: Tim Deegan <tim@xxxxxxx> > Acked-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > Reviewed-by: George Dunlap <george.dunlap@xxxxxxxxxx> > Cc: Keir Fraser <keir@xxxxxxx> > Cc: Jan Beulich <jbeulich@xxxxxxxx> > Cc: Andrew Cooper <andrew.cooper3@xxxxxxxxxx> > Cc: Jun Nakajima <jun.nakajima@xxxxxxxxx> > Cc: Kevin Tian <kevin.tian@xxxxxxxxx> > Cc: George Dunlap <george.dunlap@xxxxxxxxxxxxx> > Cc: Tim Deegan <tim@xxxxxxx> > --- > xen/arch/x86/hvm/hvm.c | 14 ++++++++------ > xen/arch/x86/mm/p2m-ept.c | 2 +- > xen/arch/x86/mm/p2m-pt.c | 2 +- > xen/arch/x86/mm/shadow/multi.c | 2 +- > xen/include/asm-x86/p2m.h | 4 ++-- > xen/include/public/hvm/hvm_op.h | 8 +++++++- > 6 files changed, 20 insertions(+), 12 deletions(-) > > diff --git a/xen/arch/x86/hvm/hvm.c b/xen/arch/x86/hvm/hvm.c > index f24126d..874cb0f 100644 > --- a/xen/arch/x86/hvm/hvm.c > +++ b/xen/arch/x86/hvm/hvm.c > @@ -1857,7 +1857,7 @@ int hvm_hap_nested_page_fault(paddr_t gpa, unsigned > long gla, > */ > if ( (p2mt == p2m_mmio_dm) || > (npfec.write_access && > - (p2m_is_discard_write(p2mt) || (p2mt == p2m_mmio_write_dm))) ) > + (p2m_is_discard_write(p2mt) || (p2mt == p2m_ioreq_server))) ) > { > __put_gfn(p2m, gfn); > if ( ap2m_active ) > @@ -5499,8 +5499,8 @@ long do_hvm_op(unsigned long op, > XEN_GUEST_HANDLE_PARAM(void) arg) > get_gfn_query_unlocked(d, a.pfn, &t); > if ( p2m_is_mmio(t) ) > a.mem_type = HVMMEM_mmio_dm; > - else if ( t == p2m_mmio_write_dm ) > - a.mem_type = HVMMEM_mmio_write_dm; > + else if ( t == p2m_ioreq_server ) > + a.mem_type = HVMMEM_ioreq_server; > else if ( p2m_is_readonly(t) ) > a.mem_type = HVMMEM_ram_ro; > else if ( p2m_is_ram(t) ) > @@ -5531,7 +5531,8 @@ long do_hvm_op(unsigned long op, > XEN_GUEST_HANDLE_PARAM(void) arg) > [HVMMEM_ram_rw] = p2m_ram_rw, > [HVMMEM_ram_ro] = p2m_ram_ro, > [HVMMEM_mmio_dm] = p2m_mmio_dm, > - [HVMMEM_mmio_write_dm] = p2m_mmio_write_dm > + [HVMMEM_unused] = p2m_invalid, > + [HVMMEM_ioreq_server] = p2m_ioreq_server > }; > > if ( copy_from_guest(&a, arg, 1) ) > @@ -5555,7 +5556,8 @@ long do_hvm_op(unsigned long op, > XEN_GUEST_HANDLE_PARAM(void) arg) > ((a.first_pfn + a.nr - 1) > domain_get_maximum_gpfn(d)) ) > goto setmemtype_fail; > > - if ( a.hvmmem_type >= ARRAY_SIZE(memtype) ) > + if ( a.hvmmem_type >= ARRAY_SIZE(memtype) || > + unlikely(a.hvmmem_type == HVMMEM_unused) ) > goto setmemtype_fail; > > while ( a.nr > start_iter ) > @@ -5579,7 +5581,7 @@ long do_hvm_op(unsigned long op, > XEN_GUEST_HANDLE_PARAM(void) arg) > } > if ( !p2m_is_ram(t) && > (!p2m_is_hole(t) || a.hvmmem_type != HVMMEM_mmio_dm) && > - (t != p2m_mmio_write_dm || a.hvmmem_type != HVMMEM_ram_rw) ) > + (t != p2m_ioreq_server || a.hvmmem_type != HVMMEM_ram_rw) ) > { > put_gfn(d, pfn); > goto setmemtype_fail; > diff --git a/xen/arch/x86/mm/p2m-ept.c b/xen/arch/x86/mm/p2m-ept.c > index 3cb6868..380ec25 100644 > --- a/xen/arch/x86/mm/p2m-ept.c > +++ b/xen/arch/x86/mm/p2m-ept.c > @@ -171,7 +171,7 @@ static void ept_p2m_type_to_flags(struct p2m_domain *p2m, > ept_entry_t *entry, > entry->a = entry->d = !!cpu_has_vmx_ept_ad; > break; > case p2m_grant_map_ro: > - case p2m_mmio_write_dm: > + case p2m_ioreq_server: > entry->r = 1; > entry->w = entry->x = 0; > entry->a = !!cpu_has_vmx_ept_ad; > diff --git a/xen/arch/x86/mm/p2m-pt.c b/xen/arch/x86/mm/p2m-pt.c > index 3d80612..eabd2e3 100644 > --- a/xen/arch/x86/mm/p2m-pt.c > +++ b/xen/arch/x86/mm/p2m-pt.c > @@ -94,7 +94,7 @@ static unsigned long p2m_type_to_flags(p2m_type_t t, mfn_t > mfn, > default: > return flags | _PAGE_NX_BIT; > case p2m_grant_map_ro: > - case p2m_mmio_write_dm: > + case p2m_ioreq_server: > return flags | P2M_BASE_FLAGS | _PAGE_NX_BIT; > case p2m_ram_ro: > case p2m_ram_logdirty: > diff --git a/xen/arch/x86/mm/shadow/multi.c b/xen/arch/x86/mm/shadow/multi.c > index e5c8499..c81302a 100644 > --- a/xen/arch/x86/mm/shadow/multi.c > +++ b/xen/arch/x86/mm/shadow/multi.c > @@ -3225,7 +3225,7 @@ static int sh_page_fault(struct vcpu *v, > > /* Need to hand off device-model MMIO to the device model */ > if ( p2mt == p2m_mmio_dm > - || (p2mt == p2m_mmio_write_dm && ft == ft_demand_write) ) > + || (p2mt == p2m_ioreq_server && ft == ft_demand_write) ) > { > gpa = guest_walk_to_gpa(&gw); > goto mmio; > diff --git a/xen/include/asm-x86/p2m.h b/xen/include/asm-x86/p2m.h > index 5392eb0..ee2ea9c 100644 > --- a/xen/include/asm-x86/p2m.h > +++ b/xen/include/asm-x86/p2m.h > @@ -71,7 +71,7 @@ typedef enum { > p2m_ram_shared = 12, /* Shared or sharable memory */ > p2m_ram_broken = 13, /* Broken page, access cause domain crash > */ > p2m_map_foreign = 14, /* ram pages from foreign domain */ > - p2m_mmio_write_dm = 15, /* Read-only; writes go to the device > model */ > + p2m_ioreq_server = 15, > } p2m_type_t; > > /* Modifiers to the query */ > @@ -112,7 +112,7 @@ typedef unsigned int p2m_query_t; > | p2m_to_mask(p2m_ram_ro) \ > | p2m_to_mask(p2m_grant_map_ro) \ > | p2m_to_mask(p2m_ram_shared) \ > - | p2m_to_mask(p2m_mmio_write_dm)) > + | p2m_to_mask(p2m_ioreq_server)) > > /* Write-discard types, which should discard the write operations */ > #define P2M_DISCARD_WRITE_TYPES (p2m_to_mask(p2m_ram_ro) \ > diff --git a/xen/include/public/hvm/hvm_op.h b/xen/include/public/hvm/hvm_op.h > index 1606185..b3e45cf 100644 > --- a/xen/include/public/hvm/hvm_op.h > +++ b/xen/include/public/hvm/hvm_op.h > @@ -83,7 +83,13 @@ typedef enum { > HVMMEM_ram_rw, /* Normal read/write guest RAM */ > HVMMEM_ram_ro, /* Read-only; writes are discarded */ > HVMMEM_mmio_dm, /* Reads and write go to the device model */ > - HVMMEM_mmio_write_dm /* Read-only; writes go to the device model */ > +#if __XEN_INTERFACE_VERSION__ < 0x00040700 > + HVMMEM_mmio_write_dm, /* Read-only; writes go to the device model */ > +#else > + HVMMEM_unused, /* Placeholder; setting memory to this type > + will fail for code after 4.7.0 */ > +#endif > + HVMMEM_ioreq_server Also, I don't think we've had a convincing argument for why this patch needs to be in 4.7. The p2m name changes are internal only, and so don't need to be made at all; and the old functionality will work as well as it ever did. Furthermore, the whole reason we're in this situation is that we checked in a publicly-visible change to the interface before it was properly ready; I think we should avoid making the same mistake this time. So personally I'd just leave this patch entirely for 4.8; but if Paul and/or Jan have strong opinions, then I would say check in only a patch to do the #if/#else/#endif, and leave both the p2m type changes and the new HVMMEM_ioreq_server enum for when the 4.8 development window opens. -George _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |