|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH 5/6] libxl: allow a generation ID to be specified at domain creation
On 03/06/14 14:15, David Vrabel wrote:
> Toolstacks may specify a VM generation ID using the
> u.hvm.generation_id field into libxl_domain_build_info structure, when
> creating a domain.
>
> The toolstack is responsible for providing the correct generation ID
> according to the Microsoft specification (e.g., generating new random
> ones as appropriate when restoring).
>
> Although the specification requires that a ACPI Notify event is raised
> if the generation ID is changed, the generation ID is never changed
> when the domain is in a state to receive such an event (it's either
> newly created or suspended).
>
> Signed-off-by: David Vrabel <david.vrabel@xxxxxxxxxx>
> ---
> tools/libxl/Makefile | 1 +
> tools/libxl/libxl.h | 5 +++
> tools/libxl/libxl_dom.c | 10 +++++
> tools/libxl/libxl_internal.h | 4 ++
> tools/libxl/libxl_types.idl | 1 +
> tools/libxl/libxl_vm_genid.c | 89
> ++++++++++++++++++++++++++++++++++++++++++
> 6 files changed, 110 insertions(+)
> create mode 100644 tools/libxl/libxl_vm_genid.c
>
> diff --git a/tools/libxl/Makefile b/tools/libxl/Makefile
> index 4cfa275..5d0e2ec 100644
> --- a/tools/libxl/Makefile
> +++ b/tools/libxl/Makefile
> @@ -77,6 +77,7 @@ LIBXL_OBJS = flexarray.o libxl.o libxl_create.o libxl_dm.o
> libxl_pci.o \
> libxl_json.o libxl_aoutils.o libxl_numa.o \
> libxl_save_callout.o _libxl_save_msgs_callout.o \
> libxl_qmp.o libxl_event.o libxl_fork.o $(LIBXL_OBJS-y)
> +LIBXL_OBJS += libxl_vm_genid.o
> LIBXL_OBJS += _libxl_types.o libxl_flask.o _libxl_types_internal.o
>
> LIBXL_TESTS += timedereg
> diff --git a/tools/libxl/libxl.h b/tools/libxl/libxl.h
> index 80947c3..9dd57fd 100644
> --- a/tools/libxl/libxl.h
> +++ b/tools/libxl/libxl.h
> @@ -95,6 +95,11 @@
> #define LIBXL_HAVE_BUILDINFO_EVENT_CHANNELS 1
>
> /*
> + * libxl_domain_build_info has the u.hvm.generation_id field.
> + */
> +#define LIBXL_HAVE_BUILDINFO_HVM_GENERATION_ID 1
> +
> +/*
> * LIBXL_HAVE_DEVICE_DISK_DIRECT_IO_SAFE indicates that a
> * 'direct_io_safe' field (of boolean type) is present in
> * libxl_device_disk.
> diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c
> index 4804fdf..80bc9ff 100644
> --- a/tools/libxl/libxl_dom.c
> +++ b/tools/libxl/libxl_dom.c
> @@ -314,6 +314,16 @@ int libxl__build_post(libxl__gc *gc, uint32_t domid,
> if (info->cpuid != NULL)
> libxl_cpuid_set(ctx, domid, info->cpuid);
>
> + if (info->type == LIBXL_DOMAIN_TYPE_HVM
> + && !libxl_uuid_is_nil(&info->u.hvm.generation_id)) {
> + rc = libxl__vm_generation_id_set(CTX, domid,
> + &info->u.hvm.generation_id);
> + if (rc) {
> + LOG(ERROR, "Failed to set VM Generation ID");
> + return rc;
> + }
> + }
> +
> ents = libxl__calloc(gc, 12 + (info->max_vcpus * 2) + 2, sizeof(char *));
> ents[0] = "memory/static-max";
> ents[1] = GCSPRINTF("%"PRId64, info->max_memkb);
> diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h
> index 457424f..d938b90 100644
> --- a/tools/libxl/libxl_internal.h
> +++ b/tools/libxl/libxl_internal.h
> @@ -3052,6 +3052,10 @@ void libxl__numa_candidate_put_nodemap(libxl__gc *gc,
> libxl_bitmap_copy(CTX, &cndt->nodemap, nodemap);
> }
>
> +_hidden int libxl__vm_generation_id_set(libxl_ctx *ctx, uint32_t domid,
> + const libxl_uuid *uuid);
> +
> +
> /* Som handy macros for defbool type. */
> #define LIBXL__DEFBOOL_DEFAULT (0)
> #define LIBXL__DEFBOOL_FALSE (-1)
> diff --git a/tools/libxl/libxl_types.idl b/tools/libxl/libxl_types.idl
> index 52f1aa9..7800509 100644
> --- a/tools/libxl/libxl_types.idl
> +++ b/tools/libxl/libxl_types.idl
> @@ -373,6 +373,7 @@ libxl_domain_build_info = Struct("domain_build_info",[
> ("xen_platform_pci", libxl_defbool),
> ("usbdevice_list",
> libxl_string_list),
> ("vendor_device",
> libxl_vendor_device),
> + ("generation_id", libxl_uuid),
> ])),
> ("pv", Struct(None, [("kernel", string),
> ("slack_memkb", MemKB),
> diff --git a/tools/libxl/libxl_vm_genid.c b/tools/libxl/libxl_vm_genid.c
> new file mode 100644
> index 0000000..378dcf2
> --- /dev/null
> +++ b/tools/libxl/libxl_vm_genid.c
> @@ -0,0 +1,89 @@
> +/*
> + * Copyright (C) 2014 Citrix Systems R&D Ltd.
> + *
> + * This program is free software; you can redistribute it and/or modify
> + * it under the terms of the GNU Lesser General Public License as published
> + * by the Free Software Foundation; version 2.1 only. with the special
> + * exception on linking described in file LICENSE.
> + *
> + * This program is distributed in the hope that it will be useful,
> + * but WITHOUT ANY WARRANTY; without even the implied warranty of
> + * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
> + * GNU Lesser General Public License for more details.
> + */
> +
> +#include "libxl_osdeps.h" /* must come before any other headers */
> +
> +#include "libxl_internal.h"
> +
> +#include <xenctrl.h>
> +#include <xen/hvm/params.h>
> +
> +/*
> + * Set a HVM domain's VM Generation ID.
> + *
> + * For further details, refer to the "Virtual Machine Generation ID"
> + * document from Microsoft.
> + *
> + * http://www.microsoft.com/en-us/download/details.aspx?id=30707
> + */
> +int libxl__vm_generation_id_set(libxl_ctx *ctx, uint32_t domid,
> + const libxl_uuid *uuid)
> +{
> + GC_INIT(ctx);
> + char *dom_path;
> + char *key;
> + uint64_t genid[2];
> + uint64_t paddr = 0;
> + int rc;
> +
> + memcpy(genid, libxl_uuid_bytearray((libxl_uuid *)uuid), 16);
> +
> + /*
> + * Set the "platform/generation-id" XenStore key to pass the ID to
> + * hvmloader.
> + */
> + dom_path = libxl__xs_get_dompath(gc, domid);
> + if (!dom_path) {
> + rc = ERROR_FAIL;
> + goto out;
> + }
> + key = libxl__sprintf(gc, "%s/platform/generation-id", dom_path);
> + rc = libxl__xs_write(gc, XBT_NULL, key, "%"PRIu64 ":%" PRIu64,
> + genid[0], genid[1]);
> + if (rc < 0)
> + goto out;
> +
> + /*
> + * Update the ID in guest memory (if available).
> + */
> + xc_get_hvm_param(ctx->xch, domid, HVM_PARAM_VM_GENERATION_ID_ADDR,
> &paddr);
This will break 32bit toolstack builds, because xc_get_hvm_param() takes
a pointer to an unsigned long pointer rather than a uint64_t pointer.
It appears that it will also silently truncate the 64bit hvm param to
32bits for a 32bit toolstack...
~Andrew
> + if (paddr) {
> + void *vaddr;
> +
> + vaddr = xc_map_foreign_range(ctx->xch, domid, XC_PAGE_SIZE,
> + PROT_READ | PROT_WRITE,
> + paddr >> XC_PAGE_SHIFT);
> + if (vaddr == NULL) {
> + rc = ERROR_FAIL;
> + goto out;
> + }
> + memcpy(vaddr + (paddr & ~XC_PAGE_MASK), genid, 2 * sizeof(*genid));
> + munmap(vaddr, XC_PAGE_SIZE);
> +
> + /*
> + * The spec requries an ACPI Notify event is injected into the
> + * guest when the generation ID is changed.
> + *
> + * This is only called for domains that are suspended or newly
> + * created and they won't be in a state to receive such an
> + * event.
> + */
> + }
> +
> + rc = 0;
> +
> + out:
> + GC_FREE;
> + return rc;
> +}
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |