|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC Design Doc v2] Add vNVDIMM support for Xen
>>> On 18.07.16 at 02:29, <haozhong.zhang@xxxxxxxxx> wrote:
> 4.2.2 Detection of Host pmem Devices
>
> The detection and initialize host pmem devices require a non-trivial
> driver to interact with the corresponding ACPI namespace devices,
> parse namespace labels and make necessary recovery actions. Instead
> of duplicating the comprehensive Linux pmem driver in Xen hypervisor,
> our designs leaves it to Dom0 Linux and let Dom0 Linux report
> detected host pmem devices to Xen hypervisor.
>
> Our design takes following steps to detect host pmem devices when Xen
> boots.
> (1) As booting on bare metal, host pmem devices are detected by Dom0
> Linux NVDIMM driver.
>
> (2) Our design extends Linux NVDIMM driver to reports SPA's and sizes
> of the pmem devices and reserved areas to Xen hypervisor via a
> new hypercall.
>
> (3) Xen hypervisor then checks
> - whether SPA and size of the newly reported pmem device is overlap
> with any previously reported pmem devices;
... or with system RAM.
> - whether the reserved area can fit in the pmem device and is
> large enough to hold page_info structs for itself.
So "reserved" here means available for Xen's use, but not for more
general purposes? How would the area Linux uses for its own
purposes get represented?
> (4) Because the reserved area is now used by Xen hypervisor, it
> should not be accessible by Dom0 any more. Therefore, if a host
> pmem device is recorded by Xen hypervisor, Xen will unmap its
> reserved area from Dom0. Our design also needs to extend Linux
> NVDIMM driver to "balloon out" the reserved area after it
> successfully reports a pmem device to Xen hypervisor.
... "balloon out" ... _after_? That'd be unsafe.
> 4.2.3 Get Host Machine Address (SPA) of Host pmem Files
>
> Before a pmem file is assigned to a domain, we need to know the host
> SPA ranges that are allocated to this file. We do this work in xl.
>
> If a pmem device /dev/pmem0 is given, xl will read
> /sys/block/pmem0/device/{resource,size} respectively for the start
> SPA and size of the pmem device.
>
> If a pre-allocated file /mnt/dax/file is given,
> (1) xl first finds the host pmem device where /mnt/dax/file is. Then
> it uses the method above to get the start SPA of the host pmem
> device.
> (2) xl then uses fiemap ioctl to get the extend mappings of
> /mnt/dax/file, and adds the corresponding physical offsets and
> lengths in each mapping entries to above start SPA to get the SPA
> ranges pre-allocated for this file.
Remind me again: These extents never change, not even across
reboot? I think this would be good to be written down here explicitly.
Hadn't there been talk of using labels to be able to allow a guest to
own the exact same physical range again after reboot or guest or
host?
> 3) When hvmloader loads a type 0 entry, it extracts the signature
> from the data blob and search for it in builtin_table_sigs[]. If
> found anyone, hvmloader will report an error and stop. Otherwise,
> it will append it to the end of loaded guest ACPI.
Duplicate table names aren't generally collisions: There can, for
example, be many tables named "SSDT".
> 4) When hvmloader loads a type 1 entry, it extracts the device name
> from the data blob and search for it in builtin_nd_names[]. If
> found anyone, hvmloader will report and error and stop. Otherwise,
> it will wrap the AML code snippet by "Device (name[4]) {...}" and
> include it in a new SSDT which is then appended to the end of
> loaded guest ACPI.
But all of these could go into a single SSDT, instead of (as it sounds)
each into its own one?
Jan
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
https://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |