Thanks for the series, I'm however wondering whether it's appropriate
to post a v4 as RFC. Ie: at v4 the reviewer expects the submitter to
have a clear picture of what needs to be implemented.

On Thu, Dec 07, 2017 at 06:09:49PM +0800, Haozhong Zhang wrote:
> All patches can also be found at
>   Xen:  https://github.com/hzzhan9/xen.git nvdimm-rfc-v4
>   QEMU: https://github.com/hzzhan9/qemu.git xen-nvdimm-rfc-v4
> 
> RFC v3 can be found at
>   https://lists.xen.org/archives/html/xen-devel/2017-09/msg00964.html
> 
> Changes in v4:
>   * Move the functionality of management util 'xen-ndctl' to Xne
>     management tool 'xl'.
>   * Load QEMU ACPI via QEMU fw_cfg and BIOSLinkerLoader interface.
>   * Other changes are documented in patches separately.
> 
> 
> - Part 0. Bug fix and code cleanup
>   [01/41] x86_64/mm: fix the PDX group check in mem_hotadd_check()
>   [02/41] x86_64/mm: avoid cleaning the unmapped frame table
>   [03/41] hvmloader/util: do not compare characters after '\0' in strncmp
> 
> - Part 1. Detect host PMEM
>   Detect host PMEM via NFIT. No frametable and M2P table for them are
>   created in this part.
> 
>   [04/41] xen/common: add Kconfig item for pmem support
>   [05/41] x86/mm: exclude PMEM regions from initial frametable
>   [06/41] acpi: probe valid PMEM regions via NFIT
>   [07/41] xen/pmem: register valid PMEM regions to Xen hypervisor
>   [08/41] xen/pmem: hide NFIT and deny access to PMEM from Dom0

I'm afraid I might ask stupied questions, since I haven't followed the
design discussion of this series very closely.

So you basically hide the NVDIMM from Dom0, and only allow guests to
use it?

What happens when you boot the same system without Xen? Will the
NVDIMM get corrupted because for example Linux will write something to
it?

>   [09/41] xen/pmem: add framework for hypercall XEN_SYSCTL_nvdimm_op
>   [10/41] xen/pmem: add XEN_SYSCTL_nvdimm_pmem_get_rgions_nr
>   [11/41] xen/pmem: add XEN_SYSCTL_nvdimm_pmem_get_regions
>   [12/41] tools/xl: add xl command 'pmem-list'
> 
> - Part 2. Setup host PMEM for management and guest data usage
>   Allow users or admins in Dom0 to setup host PMEM pages for
>   management and guest data usages.
>    * Management PMEM pages are used to store the frametable and M2P of
>      PMEM pages (including themselves), and never mapped to guest.
>    * Guest data PMEM pages can be mapped to guest and used as the
>      backend storage of virtual NVDIMM devices.

So this is basically tied to a PV Dom0, but I would like to also think
about what would happen with a PVH Dom0. In that case AFAICT Xen could
map the full NVDIMM to the Dom0 p2m as MMIO using 1GB pages, at which
point Dom0 could manage the NVDIMM as desired? Ie: Dom0 could map
parts of the NVDIMM to DomU as it maps other MMIO regions.

I'm not sure Xen needs to know anything else apart from how to map the
full NVDIMM to Dom0 as MMIO, which would greatly simplify this series.

Thanks, Roger.

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

Reply via email to