[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [Minios-devel] [PATCH v4 0/<VARIOUS>] Begin to disentangle libxenctrl and provide some stable libraries



(Trimming CCs a bit)

On Wed, 2015-10-21 at 16:22 +0100, Ian Campbell wrote:
> 
[...]
> Still to come would be libraries for specific out of tree purposes
> (device model, kexec), which would be adding new library at the same
> level as libxc I think, rather than underneath, i.e. also using the
> libraries split out here, but hopefully not libxenctrl itself.

Next steps for qemu-xen, with reference to:

http://xenbits.xen.org/people/ianc/libxenctrl-split/v4.html#by-functional-area

First the two simple cases:

The PV backend support now only (I think) uses got from these new libraries.

The PV domain builder is now configured off by default, I don't intend to
make this
use a stable API so when enabling this qemu will then be linked against the
unstable
libxen{guest,ctrl} libraries.

Now the more complex cases.

The actual DM functionality looks in reasonably good shape, from the
pandoc
source to the above (the "S" columns represent whether the column to the
left is a stable interface or not):

Interface                          S Underlying Interface           S Other 
users
---------------------------------- - ------------------------------ - 
---------------
`xenevtchn_bind_interdomain`       Y
`xenevtchn_close`                  Y
`xenevtchn_fd`                     Y
`xenevtchn_notify`                 Y
`xenevtchn_open`                   Y
`xenevtchn_pending`                Y
`xenevtchn_unmask`                 Y
`xenforeignmemory_map`             Y
`xenforeignmemory_open`            Y
`xenforeignmemory_unmap`           Y
`xc_domain_add_to_physmap`         N `XENMEM_add_to_physmap`        Y libxc 
(dombuilder)
`xc_domain_populate_physmap_exact` N `XENMEM_populate_physmap`      Y libxc 
(several)
`xc_domain_pin_memory_cacheattr`   N `XEN_DOMCTL_pin_mem_cacheattr` N None
`xc_domain_shutdown`               N `SCHEDOP_remote_shutdown`      Y libxl
`xc_set_hvm_param`                 N `HVM_PARAM_ACPI_S_STATE`       Y None
`xc_hvm_inject_msi`                N `HVMOP_inject_msi`             Y None
`xc_hvm_modified_memory`           N `HVMOP_modified_memory`        Y None
`xc_hvm_set_isa_irq_level`         N `HVMOP_set_isa_irq_level`      Y None
`xc_hvm_set_mem_type`              N `HVMOP_set_mem_type`           Y None
`xc_hvm_set_pci_intx_level`        N `HVMOP_set_pci_intx_level`     Y None
`xc_hvm_set_pci_link_route`        N `HVMOP_set_pci_link_route`     Y None
`xc_hvm_track_dirty_vram`          N `HVMOP_track_dirty_vram`       Y None
`xc_hvm_unmap_io_range_from_ir...` N `HVMOP_IO_RANGE_(PORT|MEM...)` Y None
`xc_hvm_unmap_pcidev_from_iore...` N `HVMOP_unmap_io_range_from...` Y None

I think it would be reasonable to add a new library (say, libxendevicemodel, 
for arguments sake) with a stable ABI and to move all of the xc_hvm_* above 
into it. They are not used for anything else and are based on HVMOP which is a 
stable interface (AFAIK).

Within qemu xc_domain_add_to_physmap and xc_domain_pin_memory_cacheattr are
used in tandem solely to populate VRAM with WB memory and to remove again.

xc_domain_populate_physmap_exact is used only to populate RAM and
xc_domain_shutdown is used on shutdown.

I think having three or four functions in libxendevicemodel which offer
these exact facilities while retaining the underlying (possibly more
flexible) functionality in libxenctrl for other users (dombuilder, other in
tree tools) would be tolerable.

Three or four functions depends on whether the uses of
xc_domain_add_to_physmap+xc_domain_pin_memory_cacheattr and
xc_domain_populate_physmap_exact can be satisfied with a single API or not.
I don't know that yet.

The main question would then be whether libxendevicemodel should wrap
libxenctrl in a stable layer or whether it should actually duplicate the
functionality in the thin wrappers.

Wrapping libxenctrl would mean that libxendevicemodel would need to be
built by all releases with a fixed ABI such that the corresponding one
(linking against the correct libxenctrl) can be flipped into place on boot.
I think that is going to be too tricky for distros and users a like and
that the small amount of duplication is therefore more tolerable.

The only blocker for that is that xc_domain_pin_memory_cacheattr is
XEN_DOMCTL_pin_mem_cacheattr (i.e. not stable), but this route would either
require it to move to a stable hypercall interface or for the library to
DTRT for all versions. I think moving to a stable h/call interface is more
feasible.

In terms of deprivileging QEMU (one of the end goals of this work) I think
all the xen* libraries could very easily gain a xen???_set_target_domain
which would make an appropriate ioctl to lock the underlying fd into
operating only on that domain (another argument in finding a way to do
pin_mem_cacheattr as a stable API). This would require support from all the
underlying drivers, but could be added right away with errno=ENOTTY +
return -1 and then plumbed in later. Obviously qemu would need to check the
return values.

The PCI passthrough case is less clear:

Interface                          S Underlying Interface           S Other 
users
---------------------------------- - ------------------------------ - 
---------------
`xc_domain_bind_pt_pci_irq`        N `XEN_DOMCTL_bind_pt_irq`       N None
`xc_domain_ioport_mapping`         N `XEN_DOMCTL_ioport_mapping`    N None
`xc_domain_memory_mapping`         N `XEN_DOMCTL_memory_mapping`    N libxl
`xc_domain_unbind_msi_irq`         N `XEN_DOMCTL_unbind_pt_irq`     N None
`xc_domain_unbind_pt_irq`          N `XEN_DOMCTL_unbind_pt_irq`     N None
`xc_domain_update_msi_irq`         N `XEN_DOMCTL_bind_pt_irq`       N None
`xc_physdev_map_pirq`              N `PHYSDEVOP_map_pirq`           Y libxl
`xc_physdev_map_pirq_msi`          N `PHYSDEVOP_map_pirq`           Y None
`xc_physdev_unmap_pirq`            N `PHYSDEVOP_unmap_pirq`         Y libxl

NB: More might be used by libxl in the future e.g. for ARM or PVH
passthrough?

It seems like much of this would be candidates for adding to
libxendevicemodel, but the underlying unstable interfaces pose a problem
there. I'm going to leave this for another day.

Ian.


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.