[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH v7 05/18] tools/libxc: support to resume uncooperative HVM guests
On 02/04/2016 03:40 AM, Wei Liu wrote: > On Fri, Jan 29, 2016 at 01:27:21PM +0800, Wen Congyang wrote: >> Before this patch: >> 1. suspend >> a. PVHVM and PV: we use the same way to suspend the guest (send the suspend >> request to the guest). If the guest doesn't support evtchn, the xenstore >> variant will be used, suspending the guest via XenBus control node. >> b. pure HVM: we call xc_domain_shutdown(..., SHUTDOWN_suspend) to suspend >> the guest >> >> 2. Resume: >> a. fast path(fast=1) >> Do not change the guest state. We call libxl__domain_resume(.., 1) which >> calls xc_domain_resume(..., 1 /* fast=1*/) to resume the guest. >> PV: modify the return code to 1, and than call the domctl: >> XEN_DOMCTL_resumedomain >> PVHVM: same with PV >> pure HVM: do nothing in modify_returncode, and than call the domctl: > > "then" > >> XEN_DOMCTL_resumedomain >> b. slow >> Used when the guest's state have been changed. Will call >> libxl__domain_resume(..., 0) to resume the guest. >> PV: update start info, and reset all secondary CPU states. Than call >> the domctl: XEN_DOMCTL_resumedomain >> PVHVM: can not be resumed. You will get the following error message: >> "Cannot resume uncooperative HVM guests" >> purt HVM: same with PVHVM > > "pure" > >> >> After this patch: >> 1. suspend >> unchanged >> >> 2. Resume >> a. fast path: >> unchanged >> b. slow >> PV: unchanged >> PVHVM: call XEN_DOMCTL_resumedomain to resume the guest. Because we >> don't modify the return code, the PV driver will disconnect >> and reconnect. >> The guest ends up doing the XENMAPSPACE_shared_info >> XENMEM_add_to_physmap hypercall and resetting all of its CPU >> states to point to the shared_info(well except the ones past >> 32). >> That is the Linux kernel does that - regardless whether the >> SCHEDOP_shutdown:SHUTDOWN_suspend returns 1 or not. >> Pure HVM: call XEN_DOMCTL_resumedomain to resume the guest. > > In summary, this patch only changes slow path resume. Further more, it > only affects PVHVM and pure HVM variants. > > With you patch, pure HVM is able to resume with effectively the same > path via XEN_DOMCTL_resumedomain, albeit it is done in two functions > (_cooperative and _any). > > And according to the recently change in documentation, slow path is > always safe. > > I think the commit message can be simplified a bit. This is assuming > using XEN_DOMCTL_resumedomain to resume (PV)HVM in slow path is safe. > > === > > Use XEN_DOMCTL_resumedomain to resume (PV)HVM guest in slow path > > Previously it was not possible to resume PVHVM or pure HVM guest in slow > path because libxc didn't support that. > > Using XEN_DOMCTL_resumedomain without modifying guest state to resume a > guest is considered to be always safe. Introduce a function to do that > for (PV)HVM guests in slow path resume. > > This patch fixes a bug that denies (PV)HVM slow path resume. This will > enable COLO to work properly: COLO requires HVM guest to start in the > new context that has been set up by COLO, hence slow path resume is > required. > > === > > Does this sound right? Especially the wording about safety. It sounds right. Thanks Wen Congyang > > Ian and Ian, you seemed to have suggested Congyang to write the above > commit message. What do you think about my updated one? > >> >> Under COLO, we will update the guest's state(modify memory, cpu's registers, >> device status...). In this case, we cannot use the fast path to resume it. >> Keep the return code 0, and use a slow path to resume the guest. While >> resuming HVM using slow path is not supported currently, this patch is to >> make the resume call to not fail. >> >> Signed-off-by: Wen Congyang <wency@xxxxxxxxxxxxxx> >> Signed-off-by: Yang Hongyang <hongyang.yang@xxxxxxxxxxxx> >> --- >> tools/libxc/xc_resume.c | 25 +++++++++++++++++++++---- >> 1 file changed, 21 insertions(+), 4 deletions(-) >> >> diff --git a/tools/libxc/xc_resume.c b/tools/libxc/xc_resume.c >> index 87d4324..4a9b035 100644 >> --- a/tools/libxc/xc_resume.c >> +++ b/tools/libxc/xc_resume.c >> @@ -108,6 +108,26 @@ static int xc_domain_resume_cooperative(xc_interface >> *xch, uint32_t domid) >> return do_domctl(xch, &domctl); >> } >> >> +static int xc_domain_resume_hvm(xc_interface *xch, uint32_t domid) >> +{ >> + DECLARE_DOMCTL; >> + >> + /* >> + * The domctl XEN_DOMCTL_resumedomain unpause each vcpu. After >> + * the domctl, the guest will run. >> + * >> + * If it is PVHVM, the guest called the hypercall >> + * SCHEDOP_shutdown:SHUTDOWN_suspend >> + * to suspend itself. We don't modify the return code, so the PV driver >> + * will disconnect and reconnect. >> + * >> + * If it is a HVM, the guest will continue running. >> + */ >> + domctl.cmd = XEN_DOMCTL_resumedomain; >> + domctl.domain = domid; >> + return do_domctl(xch, &domctl); >> +} >> + >> static int xc_domain_resume_any(xc_interface *xch, uint32_t domid) >> { >> DECLARE_DOMCTL; >> @@ -137,10 +157,7 @@ static int xc_domain_resume_any(xc_interface *xch, >> uint32_t domid) >> */ >> #if defined(__i386__) || defined(__x86_64__) >> if ( info.hvm ) >> - { >> - ERROR("Cannot resume uncooperative HVM guests"); >> - return rc; >> - } >> + return xc_domain_resume_hvm(xch, domid); >> >> if ( xc_domain_get_guest_width(xch, domid, &dinfo->guest_width) != 0 ) >> { >> -- >> 2.5.0 >> >> >> >> >> _______________________________________________ >> Xen-devel mailing list >> Xen-devel@xxxxxxxxxxxxx >> http://lists.xen.org/xen-devel > > > . > _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
Lists.xenproject.org is hosted with RackSpace, monitoring our |