[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] Oldest supported Xen version in upstream QEMU (Was: Re: [Minios-devel] [PATCH v2 0/15+5+5] Begin to disentangle libxenctrl and provide some stable libraries)



Il 24/09/2015 09:15, Ian Campbell ha scritto:
On Wed, 2015-09-23 at 18:36 +0100, Stefano Stabellini wrote:
On Wed, 23 Sep 2015, Ian Campbell wrote:
On Tue, 2015-09-22 at 22:31 +0100, Stefano Stabellini wrote:
The oldest Xen version I build-test for every pull request is Xen 4.0.0,
I setup a build trees for 4.0 thru 4.6 yesterday to test this, what a
pain 4.1 and 4.0 are to build with a modern gcc! (Mostly newer compiler
warnings and mostly, but not all, fixes which I could just backport
from newer Xen, the exceptions were a couple of things which were
removed before they needed to be fixed)

I think it is very reasonable to remove anything older than that.
I am OK with removing Xen 4.0.0 too, but I would like a warning to be
sent ahead of time to qemu-devel to see if anybody complains.
There is not much point in removing <=3.4 support and keeping 4.0, since
4.0.0 was the last one which used a plain int as a handle, anything older
than 4.0.0 is trivial if 4.0.0 is supported.

One approach I am considering in order to keep 4.0.0 support and earlier
was to turn the "int fd" for <=4.0 into a pointer by having the open
wrapper do malloc(sizeof int) and the using wrappers do xc_foo(*handle).

This way all the different variants take pointers and we have less hoops to
jump through to typedef everything in the correct way for each variant.

If you would rather avoid doing that then I think dropping 4.0.0 support
would be the way to go and I'll send a mail to qemu-devel.
I would rather drop 4.0 support.
Supporting 4.0 didn't turn out quite as ugly as I had feared.

Even if seems that major of distro use newer qemu version instead older with xen seems that keep updated also xen to latest stable version (or at least previous) and the cases where can uses next qemu version with very old xen I think is at least very rare. Another thing is that upstream qemu on older xen not had good support (at least for hvm domUs) and when I started to use it some years ago seems that was with too very few users.
There are also some problem, for example this:
http://xenbits.xen.org/gitweb/?p=xen.git;a=commitdiff;h=2e814a017155b885e4d4b5a88dc05e7367a9722a
without hvm domUs with emulated vga don't start with qemu>=1.4, applied to xen 4.3 and backported only in stable-4.2 Therefore excluded recent unexpected that I not know for a working support of hvm domUsat least xen 4.2 is needed. In my cases I had saw good hvm domUs support with upstream qemu for production use only starting from xen 4.3. I think is good know if older xen is really used with newer (more exactly next for these changes) qemu instead wasting time supporting and testing also many older xen versions.
In any cases thanks to all for any xen and qemu improvements.

Sorry for my bad english.


So before I send an email to qemu-devel to propose dropping 4.0 what do
you think of the following which handles the evtchn case, there is a
similar patch for gnttab and a (yet to be written) patch for the
foreign memory mapping case.

The relevant bit for this discussion is the 4.0.0 definition of
xenevtchn_open in xen_common.h, the rest is just adjusting it to use
the API of the new library (for reasons explained in the commit
message).

commit d97f6bb5045685d766d85b8cd004ce007fe29120
Author: Ian Campbell <ian.campbell@xxxxxxxxxx>
Date:   Wed Sep 23 17:30:15 2015 +0100

     xen: Switch to libxenevtchn interface for compat shims.
In Xen 4.7 we are refactoring parts libxenctrl into a number of
     separate libraries which will provide backward and forward API and ABI
     compatiblity.
One such library will be libxenevtchn which provides access to event
     channels.
In preparation for this switch the compatibility layer in xen_common.h
     (which support building with older versions of Xen) to use what will
     be the new library API. This means that the evtchn shim will disappear
     for versions of Xen which include libxenevtchn.
To simplify things for the <= 4.0.0 support we wrap the int fd in a
     malloc(sizeof int) such that the handle is always a pointer. This
     leads to less typedef headaches and the need for
     XC_HANDLER_INITIAL_VALUE etc for these interfaces.
Build tested with 4.1 and 4.5. Note that this patch does not add any support for actually using
     libxenevtchn, it just adjusts the existing shims.
Note that xc_evtchn_alloc_unbound functionality remains in libxenctrl,
     since that functionality is not exposed by /dev/xen/evtchn.
Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>

diff --git a/hw/xen/xen_backend.c b/hw/xen/xen_backend.c
index b2cb22b..1fd8e01 100644
--- a/hw/xen/xen_backend.c
+++ b/hw/xen/xen_backend.c
@@ -243,19 +243,19 @@ static struct XenDevice *xen_be_get_xendev(const char 
*type, int dom, int dev,
      xendev->debug      = debug;
      xendev->local_port = -1;
- xendev->evtchndev = xen_xc_evtchn_open(NULL, 0);
-    if (xendev->evtchndev == XC_HANDLER_INITIAL_VALUE) {
+    xendev->evtchndev = xenevtchn_open(NULL, 0);
+    if (xendev->evtchndev == NULL) {
          xen_be_printf(NULL, 0, "can't open evtchn device\n");
          g_free(xendev);
          return NULL;
      }
-    fcntl(xc_evtchn_fd(xendev->evtchndev), F_SETFD, FD_CLOEXEC);
+    fcntl(xenevtchn_fd(xendev->evtchndev), F_SETFD, FD_CLOEXEC);
if (ops->flags & DEVOPS_FLAG_NEED_GNTDEV) {
          xendev->gnttabdev = xen_xc_gnttab_open(NULL, 0);
          if (xendev->gnttabdev == XC_HANDLER_INITIAL_VALUE) {
              xen_be_printf(NULL, 0, "can't open gnttab device\n");
-            xc_evtchn_close(xendev->evtchndev);
+            xenevtchn_close(xendev->evtchndev);
              g_free(xendev);
              return NULL;
          }
@@ -306,8 +306,8 @@ static struct XenDevice *xen_be_del_xendev(int dom, int dev)
              g_free(xendev->fe);
          }
- if (xendev->evtchndev != XC_HANDLER_INITIAL_VALUE) {
-            xc_evtchn_close(xendev->evtchndev);
+        if (xendev->evtchndev != NULL) {
+            xenevtchn_close(xendev->evtchndev);
          }
          if (xendev->gnttabdev != XC_HANDLER_INITIAL_VALUE) {
              xc_gnttab_close(xendev->gnttabdev);
@@ -691,13 +691,13 @@ static void xen_be_evtchn_event(void *opaque)
      struct XenDevice *xendev = opaque;
      evtchn_port_t port;
- port = xc_evtchn_pending(xendev->evtchndev);
+    port = xenevtchn_pending(xendev->evtchndev);
      if (port != xendev->local_port) {
-        xen_be_printf(xendev, 0, "xc_evtchn_pending returned %d (expected 
%d)\n",
+        xen_be_printf(xendev, 0, "xenevtchn_pending returned %d (expected 
%d)\n",
                        port, xendev->local_port);
          return;
      }
-    xc_evtchn_unmask(xendev->evtchndev, port);
+    xenevtchn_unmask(xendev->evtchndev, port);
if (xendev->ops->event) {
          xendev->ops->event(xendev);
@@ -742,14 +742,14 @@ int xen_be_bind_evtchn(struct XenDevice *xendev)
      if (xendev->local_port != -1) {
          return 0;
      }
-    xendev->local_port = xc_evtchn_bind_interdomain
+    xendev->local_port = xenevtchn_bind_interdomain
          (xendev->evtchndev, xendev->dom, xendev->remote_port);
      if (xendev->local_port == -1) {
-        xen_be_printf(xendev, 0, "xc_evtchn_bind_interdomain failed\n");
+        xen_be_printf(xendev, 0, "xenevtchn_bind_interdomain failed\n");
          return -1;
      }
      xen_be_printf(xendev, 2, "bind evtchn port %d\n", xendev->local_port);
-    qemu_set_fd_handler(xc_evtchn_fd(xendev->evtchndev),
+    qemu_set_fd_handler(xenevtchn_fd(xendev->evtchndev),
                          xen_be_evtchn_event, NULL, xendev);
      return 0;
  }
@@ -759,15 +759,15 @@ void xen_be_unbind_evtchn(struct XenDevice *xendev)
      if (xendev->local_port == -1) {
          return;
      }
-    qemu_set_fd_handler(xc_evtchn_fd(xendev->evtchndev), NULL, NULL, NULL);
-    xc_evtchn_unbind(xendev->evtchndev, xendev->local_port);
+    qemu_set_fd_handler(xenevtchn_fd(xendev->evtchndev), NULL, NULL, NULL);
+    xenevtchn_unbind(xendev->evtchndev, xendev->local_port);
      xen_be_printf(xendev, 2, "unbind evtchn port %d\n", xendev->local_port);
      xendev->local_port = -1;
  }
int xen_be_send_notify(struct XenDevice *xendev)
  {
-    return xc_evtchn_notify(xendev->evtchndev, xendev->local_port);
+    return xenevtchn_notify(xendev->evtchndev, xendev->local_port);
  }
/*
diff --git a/include/hw/xen/xen_backend.h b/include/hw/xen/xen_backend.h
index 3b4125e..a90314f 100644
--- a/include/hw/xen/xen_backend.h
+++ b/include/hw/xen/xen_backend.h
@@ -46,7 +46,7 @@ struct XenDevice {
      int                remote_port;
      int                local_port;
- XenEvtchn evtchndev;
+    xenevtchn_handle   *evtchndev;
      XenGnttab          gnttabdev;
struct XenDevOps *ops;
diff --git a/include/hw/xen/xen_common.h b/include/hw/xen/xen_common.h
index 5923290..5700c1b 100644
--- a/include/hw/xen/xen_common.h
+++ b/include/hw/xen/xen_common.h
@@ -39,17 +39,37 @@ static inline void *xc_map_foreign_bulk(int xc_handle, 
uint32_t dom, int prot,
  #if CONFIG_XEN_CTRL_INTERFACE_VERSION < 410
typedef int XenXC;
-typedef int XenEvtchn;
+typedef int xenevtchn_handle;
  typedef int XenGnttab;
# define XC_INTERFACE_FMT "%i"
  #  define XC_HANDLER_INITIAL_VALUE    -1
-static inline XenEvtchn xen_xc_evtchn_open(void *logger,
-                                           unsigned int open_flags)
+static inline xenevtchn_handle *xenevtchn_open(void *logger,
+                                              unsigned int open_flags)
+{
+    int *h = malloc(sizeof h);
+    if (!h)
+       return NULL;
+    *h = xc_evtchn_open();
+    if (*h == -1) {
+        free(h);
+         h = NULL;
+    }
+    return h;
+}
+static inline int xenevtchn_close(xenevtchn_handle *h)
  {
-    return xc_evtchn_open();
+    int rc = xc_evtchn_close(*h);
+    free(h);
+    return rc;
  }
+#define xenevtchn_fd(h) xc_evtchn_fd(*h)
+#define xenevtchn_pending(h) xc_evtchn_pending(*h)
+#define xenevtchn_notify(h,p) xc_evtchn_notify(*h,p)
+#define xenevtchn_bind_interdomain(h,d,p) xc_evtchn_bind_interdomain(*h,d,p)
+#define xenevtchn_unmask(h,p) xc_evtchn_unmask(*h,p)
+#define xenevtchn_unbind(h,p) xc_evtchn_unmask(*h,p)
static inline XenGnttab xen_xc_gnttab_open(void *logger,
                                             unsigned int open_flags)
@@ -108,17 +128,20 @@ static inline void xs_close(struct xs_handle *xsh)
  #else
typedef xc_interface *XenXC;
-typedef xc_evtchn *XenEvtchn;
+typedef xc_evtchn xenevtchn_handle;
  typedef xc_gnttab *XenGnttab;
# define XC_INTERFACE_FMT "%p"
  #  define XC_HANDLER_INITIAL_VALUE    NULL
-static inline XenEvtchn xen_xc_evtchn_open(void *logger,
-                                           unsigned int open_flags)
-{
-    return xc_evtchn_open(logger, open_flags);
-}
+#define xenevtchn_open(l,f) xc_evtchn_open(l,f);
+#define xenevtchn_close(h) xc_evtchn_close(h)
+#define xenevtchn_fd(h) xc_evtchn_fd(h)
+#define xenevtchn_pending(h) xc_evtchn_pending(h)
+#define xenevtchn_notify(h,p) xc_evtchn_notify(h,p)
+#define xenevtchn_bind_interdomain(h,d,p) xc_evtchn_bind_interdomain(h,d,p)
+#define xenevtchn_unmask(h,p) xc_evtchn_unmask(h,p)
+#define xenevtchn_unbind(h,p) xc_evtchn_unbind(h,p)
static inline XenGnttab xen_xc_gnttab_open(void *logger,
                                             unsigned int open_flags)
diff --git a/xen-hvm.c b/xen-hvm.c
index 3a7fd58..54cbd72 100644
--- a/xen-hvm.c
+++ b/xen-hvm.c
@@ -109,7 +109,7 @@ typedef struct XenIOState {
      /* evtchn local port for buffered io */
      evtchn_port_t bufioreq_local_port;
      /* the evtchn fd for polling */
-    XenEvtchn xce_handle;
+    xenevtchn_handle *xce_handle;
      /* which vcpu we are serving */
      int send_vcpu;
@@ -709,7 +709,7 @@ static ioreq_t *cpu_get_ioreq(XenIOState *state)
      int i;
      evtchn_port_t port;
- port = xc_evtchn_pending(state->xce_handle);
+    port = xenevtchn_pending(state->xce_handle);
      if (port == state->bufioreq_local_port) {
          timer_mod(state->buffered_io_timer,
                  BUFFER_IO_MAX_DELAY + qemu_clock_get_ms(QEMU_CLOCK_REALTIME));
@@ -728,7 +728,7 @@ static ioreq_t *cpu_get_ioreq(XenIOState *state)
          }
/* unmask the wanted port again */
-        xc_evtchn_unmask(state->xce_handle, port);
+        xenevtchn_unmask(state->xce_handle, port);
/* get the io packet from shared memory */
          state->send_vcpu = i;
@@ -1014,7 +1014,7 @@ static void handle_buffered_io(void *opaque)
                  BUFFER_IO_MAX_DELAY + qemu_clock_get_ms(QEMU_CLOCK_REALTIME));
      } else {
          timer_del(state->buffered_io_timer);
-        xc_evtchn_unmask(state->xce_handle, state->bufioreq_local_port);
+        xenevtchn_unmask(state->xce_handle, state->bufioreq_local_port);
      }
  }
@@ -1058,7 +1058,7 @@ static void cpu_handle_ioreq(void *opaque)
          }
req->state = STATE_IORESP_READY;
-        xc_evtchn_notify(state->xce_handle, 
state->ioreq_local_port[state->send_vcpu]);
+        xenevtchn_notify(state->xce_handle, 
state->ioreq_local_port[state->send_vcpu]);
      }
  }
@@ -1066,8 +1066,8 @@ static void xen_main_loop_prepare(XenIOState *state)
  {
      int evtchn_fd = -1;
- if (state->xce_handle != XC_HANDLER_INITIAL_VALUE) {
-        evtchn_fd = xc_evtchn_fd(state->xce_handle);
+    if (state->xce_handle != NULL) {
+        evtchn_fd = xenevtchn_fd(state->xce_handle);
      }
state->buffered_io_timer = timer_new_ms(QEMU_CLOCK_REALTIME, handle_buffered_io,
@@ -1105,7 +1105,7 @@ static void xen_exit_notifier(Notifier *n, void *data)
  {
      XenIOState *state = container_of(n, XenIOState, exit);
- xc_evtchn_close(state->xce_handle);
+    xenevtchn_close(state->xce_handle);
      xs_daemon_close(state->xenstore);
  }
@@ -1174,8 +1174,8 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, ram_addr_t *above_4g_mem_size, state = g_malloc0(sizeof (XenIOState)); - state->xce_handle = xen_xc_evtchn_open(NULL, 0);
-    if (state->xce_handle == XC_HANDLER_INITIAL_VALUE) {
+    state->xce_handle = xenevtchn_open(NULL, 0);
+    if (state->xce_handle == NULL) {
          perror("xen: event channel open");
          return -1;
      }
@@ -1255,7 +1255,7 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, 
ram_addr_t *above_4g_mem_size,
/* FIXME: how about if we overflow the page here? */
      for (i = 0; i < max_cpus; i++) {
-        rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
+        rc = xenevtchn_bind_interdomain(state->xce_handle, xen_domid,
                                          xen_vcpu_eport(state->shared_page, 
i));
          if (rc == -1) {
              fprintf(stderr, "shared evtchn %d bind error %d\n", i, errno);
@@ -1264,7 +1264,7 @@ int xen_hvm_init(ram_addr_t *below_4g_mem_size, 
ram_addr_t *above_4g_mem_size,
          state->ioreq_local_port[i] = rc;
      }
- rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
+    rc = xenevtchn_bind_interdomain(state->xce_handle, xen_domid,
                                      bufioreq_evtchn);
      if (rc == -1) {
          fprintf(stderr, "buffered evtchn bind error %d\n", errno);

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.