[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[PATCH 0/6] gnttab: add per-domain controls


  • To: <xen-devel@xxxxxxxxxxxxxxxxxxxx>
  • From: Roger Pau Monne <roger.pau@xxxxxxxxxx>
  • Date: Fri, 17 Sep 2021 17:46:19 +0200
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=p1G4HGjwj7EyEDiHSa/jjXUT15nvGsX+uxA+Os5xktY=; b=eVUQoFpgBFqoKUbKanmiyiTyMnUSYbsVjrE3Q8jg3Pu1Wefmmp6a28PG4ygNNvl0AnuZ5EQLYcNZ3e3r6mN1vLmVcXtllNCgHNQPRB8vomUBioyR9Bq1OdtRk07IYdE534PG+5HvlIq9ncQXIbkvzkRCZfXxzhfKwYlxiFN9vNlPV1AEOuqxB9nxe0K9ZYN8OI7FRLkUC1v3/5jvTxljVAHTAJwGsJMg6ce+CTyBu3YsQrnIw2PQs/Z+iZaT+Octyidv9ZxjKmhrhZr0lX2OHLsB69wginlQcsd4HnpLbjn8v2XvY9KDocqjdtSXCeuUwCUkp4J0MrtlRjDKWmEqbw==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ZUh5kXr6VKYOU4qhsdIlySm8bKO0XklUPBM5WEcxzSKa1mjeHCgA9DSMvBBipNfr0lfkHX5CDqd9BblbVSGKsI2IC6n/zTEjbLPxpNkxI562cGLOoZf9IYTfoaH1/l/COuQYGG9lpel/xxNZwxrl2fOILyh61Vrj+elqJfUD8US6IGUT/P/bhJgS49HUE2/2HWg8XrXqbjrcRwZL0Ma8jA8NxqBZ+OI0XxIsZ3PVVAvpbaCGWuZTnOP7FHoG320VO3R+fWDo0cP6dpZgilKFTCpjA6tV0SxvFv0NpMLWHB4wdfLJwuTo41cezKD0rUxjt1+vZyMFDq5vHbJj2qVvlg==
  • Authentication-results: esa6.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Ian Jackson <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, Christian Lindig <christian.lindig@xxxxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Fri, 17 Sep 2021 15:46:59 +0000
  • Ironport-data: A9a23:QJyoN60IRbn+jHXE5vbD5X92kn2cJEfYwER7XKvMYLTBsI5bpzQGx mZMWzuPM6zcN2T3e41zYIu18k0Pu8DSxtJgHVNspC1hF35El5HIVI+TRqvS04J+DSFhoGZPt Zh2hgzodZhsJpPkS5PE3oHJ9RGQ74nRLlbHILOCan0ZqTNMEn970EoywrFh2OaEvPDia++zk YKqyyHgEAfNNw5cagr4PIra9XuDFNyr0N8plgRWicJj5TcypFFMZH4rHomjLmOQf2VhNrXSq 9Avbl2O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/TrS+NbPqsTbZIhhUlrZzqhkOJ/5 pZglZKJFA42GIjimesMAisIHHQrVUFG0OevzXmXtMWSywvNcmf2wuUoB0YzVWEa0r8pWycUr 6VecW1TKEDY7w616OvTpu1EnMMsIdOtJIoCknph0SvYHbAtRpWrr6DiuIUJjW5q3Jgm8fD2O tESMApqQT/8SjJKYXQ6DowBmv6aryyqG9FfgA3M/vdmi4TJ9yRz36LqK8H9YcGRSINemUPwj nnd423zDxUeNdqe4TmI6HShgqnIhyyTcLwVELq05/t7mmq5z2YYCAAVfVajqPz/gUm7M/pTI lIZ0jAjpq8z8AqsVNaVdx+lpH+JuDYMVtwWFPc1gCmM1aj88wufHnIDTDNKdJohrsBebSwn0 BqFks3kARRrsaaJUjSN+7GMtzSwNCMJa2gYakcsTwEI/t3iq4EblQ/UQ5BoF6vdpsLxMSH9x XaNtidWulkIpZdVjePhpwmB2m/y4MiSJuIo2unJdm2X4C06Sa6rXtGh9n7+w/dPPderHlbU6 RDohPOiAPAy4YClzXLWGbVWTeDxvZ5pIxWH3gU+RMBJGyCFvif5JNEOumkWyFJBb55cEQIFd nM/ru+4CHV7B3KscaY/SIa4Ec1CIUPIRIm9C6y8gjajZPFMmO67EMNGPhX4M4PFyhFEfUQD1 XCzK53EMJriIf47pAdavs9EuVPR+szb+Y80bcugpylLLJLEPCLFIVv7GALWM4jVE59oUC2Kq o0CZqNmOj10UfHkYzm/zGLgBQlRdhAG6WTNg5UPLIare1M+cEl4UqO56e5xKuRNwvUO/s+Vr y7VZ6Ot4Aem7ZExAV7RMS4LhXKGdcsXkE/XygR2bA70hCB8MdjwhErdHrNuFYQaGCVY5accZ 9EOetmaA+QJTTLC+j8HaoL6opAkfxOu7T9i9QL8CNTmV5I/FQHP5PH+eQ7jqHsHAiat7JNsq Ly8zALLB5EEQl06XsrRbfuuyXK3vGQcx70uDxeZfIELdRW+6pVuJgzwkuQzf5MGJyLcy2bIz A2RGxoZ+7XA+tdn7NnTiKmYhI61CO8iTFFCFmzW4O/uZynX92au26FaV+OMcWyPXW/44vz6N +5U0+v9ILsMm1MT69hwFLNizKQf4drzpuAFklQ4TSuTN1nyU+FuOHiL28VLp5Zh/L4BtFvkQ F+L9/lbJa6NZJHvHmkOKVd3de+Ez/wVxGXftKxnPEXg6SZr17ObSkEObQKUgSlQIbYpYoMox eAt5Jwf5wCl00d4N9+HimZf9niWL2xGWKIi78lIDIjugwst61dDfZ2DVXOmvMDRM41BYhswP zuZpKvenLANlEPNfk06GWXJwecA148FvwpHzQNaKlmE8jYfaiTbAPGFHewLczlo
  • Ironport-hdrordr: A9a23:ds0jWaOKZt6OiMBcTyT155DYdb4zR+YMi2TDiHofdfUFSKClfp 6V8cjztSWUtN4QMEtQ/exoX5PwO080lKQFmrX5WI3NYOCIghrPEGgP1/qB/9SCIVyAygc+79 YYT0EWMrSZZjIb/KWKnjVQe+xQvOVvm5rY4ts2oU0dKD2DPMpbnnpE40ugYwZLbTgDIaB8OI uX58JBqTblUXMLbv6jDn1Ae+TYvdXEmL/vfBZDXnccmUSzpALtzIS/PwmT3x8YXT8K6bA+8V Ldmwi8wqm4qfm0xjLVymeWxZVLn9nKzMdFGaW3+4IoAwSprjztSJVqWrWEsjxwiOaz6GwymN 2JmBskN9Qb0QKmQkiF5T/WnyXw2jcn7HHvjXWCh2H4nMD/TDUmT+JcmINwaHLimgQdleA59J gO83OStpJRAx+Ftj/6/cL0WxZjkVfxiWY+kNQUk2dUXeIlGfBsRLQkjQNo+ao7bWHHANhNKp gtMCic3ocbTbqiVQGZgoE1q+bcG0jaHX+9Mz8/U4KuonxrdN0Q9Tpr+CUlpAZxyHsKcegx2w 31CNUYqFhwdL5kUUsEPpZ4fSKWMB2FffueChPbHbzYfJt3Tk4l7aSHp4kI2A==
  • Ironport-sdr: yR0fiyfSD5z6IqPd7DEjuanhF4Md+MKP4hQkHjTfPSCkf6ARIx70CN6o3YtDMdJzznqPAw2/cU b/qEMdZZXwUckdWLKL4dttPSZfTFlRRyo0lpUqsaxCTRApJCfxewlvoPaKxHf4WW9lmB3hGluP 96AM9Vwb2YqHX6W6FE/wAfjTbm1dxR+Do9wTBMPlvUcM34/mu2safN6eJdpeqyWVrSrf7HXG0M JRJyY+baKy56ZvDFQe3/VxrG1tF0Rke8Dpdl0yfbrGPzjAp/vKbhFh4zpQpai3v90KvI+e/d0E JixZff17f/7FX7YBO3GQeeNw
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>

Hello,

The first two patches of this series allows setting the preisoutly host
wide command line `gnttab` option on a per domain basis. That means
selecting the max allowed grant table version and whether transitive
grants are allowed.

The last 4 patches attempt to implement support for creating guests
without grant table support at all. This requires some changes to
xenstore in order to map shared ring using foreign memory instead of
grant table.

Note that patch 5 will break the save format for xenstore records, and
should not be applied.

Thanks, Roger.

Roger Pau Monne (6):
  gnttab: allow setting max version per-domain
  grant: allow per-domain control over transitive grants
  tools/console: use xenforeigmemory to map console ring
  tools/xenstored: use atexit to close interfaces
  tools/xenstored: restore support for mapping ring as foreign memory
  gnttab: allow disabling grant table per-domain

 docs/man/xl.cfg.5.pod.in                |  12 +++
 docs/man/xl.conf.5.pod.in               |  14 +++
 tools/console/Makefile                  |   4 +-
 tools/console/daemon/io.c               |  25 ++++-
 tools/helpers/init-xenstore-domain.c    |   1 +
 tools/include/libxl.h                   |  14 +++
 tools/libs/light/libxl_create.c         |   4 +
 tools/libs/light/libxl_dm.c             |   2 +
 tools/libs/light/libxl_dom.c            |   2 +-
 tools/libs/light/libxl_types.idl        |   2 +
 tools/ocaml/libs/xc/xenctrl.ml          |   5 +
 tools/ocaml/libs/xc/xenctrl.mli         |   5 +
 tools/ocaml/libs/xc/xenctrl_stubs.c     |  12 ++-
 tools/xenstore/Makefile                 |   4 +-
 tools/xenstore/include/xenstore_state.h |   1 +
 tools/xenstore/xenstored_core.h         |   2 +-
 tools/xenstore/xenstored_domain.c       | 120 +++++++++++++++---------
 tools/xl/xl.c                           |  15 +++
 tools/xl/xl.h                           |   2 +
 tools/xl/xl_parse.c                     |  13 +++
 xen/arch/arm/domain_build.c             |   4 +
 xen/arch/x86/setup.c                    |   2 +
 xen/common/domain.c                     |   4 +-
 xen/common/grant_table.c                | 119 ++++++++++++++++++++++-
 xen/include/public/domctl.h             |  13 ++-
 xen/include/xen/grant_table.h           |   7 +-
 26 files changed, 341 insertions(+), 67 deletions(-)

-- 
2.33.0




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.