[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH 0/6] gnttab: add per-domain controls


  • To: Roger Pau Monne <roger.pau@xxxxxxxxxx>, Edwin Torok <edvin.torok@xxxxxxxxxx>
  • From: Christian Lindig <christian.lindig@xxxxxxxxxx>
  • Date: Fri, 17 Sep 2021 16:06:42 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=citrix.com; dmarc=pass action=none header.from=citrix.com; dkim=pass header.d=citrix.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=v3F8QEn72i58rKNTvmlNs6XOnoIn95bdmjUqwCN7gms=; b=a4jo42jBxy9YTwEYtPowyv2zUmNDW0/zOIBVV50a+Bi0uvyqqlmNuSswkozkfAkb2KnbIKulr1YzA4wHuTZb+4H0JJPdPRatn0OO4vQN+48w5hEoQZz+P8f5iGSslxAOU3S46vdsdJGK+veqwQBB3qmUBHmL/VMO9zB5HSTE6P8AlH1FtLTJCN4n3oE16+U28smxo9l3Qrz4VOpVqGAWUd6r0edjJHoIcYchPI3B5hSvIBQ764N/29rkmwFOSY4aSHVCj22TeUNRbR5DFEKoBY/jCpj3oNQpi/Ki2Ju5pDlrAwRiOJwcxcGEpi2hZH5K65xXqQA/QAL/ZQX7ADQQ5A==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=W54Oar4enRhG4uHsMecR6bTiz8BZFTfMt1BXeecozNQHQZrBFPZ/9mcmLpr0vAb+6vdDj2Y3pYSnoXZTjG+hvmhHW+E4FB42yogE+4X0jeSBoDBk11KhaEXPGvOK/7zASUk1+8Cm0jHW4L0Qk0bXYWTL8MdJ8dqUfSnnNk9ERp7q7jMdH3WfvYjGgBsP4NgBxr75r3jZPHOfP3p83CU70usOl4LSaVSSviTxLmtu59smaWH4eJctz8yk8FL38yWyNgx9c48oXQ1bapsC52R3u6g3n19ykn+7viOC06Bx8TsKZVjKjb8ruPwdHfe8B5pSk5VT1JUAREgu0xQl43lrtg==
  • Authentication-results: esa1.hc3370-68.iphmx.com; dkim=pass (signature verified) header.i=@citrix.onmicrosoft.com
  • Cc: "xen-devel@xxxxxxxxxxxxxxxxxxxx" <xen-devel@xxxxxxxxxxxxxxxxxxxx>, "Ian Jackson" <iwj@xxxxxxxxxxxxxx>, Wei Liu <wl@xxxxxxx>, Andrew Cooper <Andrew.Cooper3@xxxxxxxxxx>, George Dunlap <George.Dunlap@xxxxxxxxxx>, "Jan Beulich" <jbeulich@xxxxxxxx>, Julien Grall <julien@xxxxxxx>, "Stefano Stabellini" <sstabellini@xxxxxxxxxx>, Anthony Perard <anthony.perard@xxxxxxxxxx>, Juergen Gross <jgross@xxxxxxxx>, David Scott <dave@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>
  • Delivery-date: Fri, 17 Sep 2021 16:06:55 +0000
  • Ironport-data: A9a23:PihOh6/IKyyJ+fBuEQMvDrUDNXmTJUtcMsCJ2f8bNWPcYEJGY0x3n 2ofXmiDPfyPNjH3Kdojb9u/8kMH6sXQnNUxQVM5rik8E34SpcT7XtnIdU2Y0wF+jyHgoOCLy +1EN7Es+ehtFie0Si9AttENlFEkvU2ybuOU5NXsZ2YhGGeIdA970Ug6w79g3dYy6TSEK1jlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJMt3yZWKB2n5WuFp8tuSH I4v+l0bElTxpH/BAvv9+lryn9ZjrrT6ZWBigVIOM0Sub4QrSoXfHc/XOdJFAXq7hQllkPhVl +x1kK2ZTTwFYIHFtu8XeEF5GjlhaPguFL/veRBTsOSWxkzCNXDt3+9vHAc9OohwFuRfWD8Us 6ZCcXZUM07F17neLLGTE4GAguwoLNPqJ58es3cmyTDfAfcpaZvCX7/L9ZlT2zJYasVmQK2CP pBGN2IHgBLocg9DOHgrI6gHpsSP3VLyQhxEh26unP9ii4TU5FMoi+W8WDbPQfSISt9ShV2wv X/d8iLyBRRyHMeE1TOP/3aoh+nOtSD2QoQfEPu/7PECqGOUwmsfGRgHT2yRqPOyilO9c99HI klS8S0rxYA+/VKmZsPwVBq5pDiDpBF0c9hNF+w37imdx6yS5ByWbkAFUTxpeNEgrNUxRzEhy hmOhdyBLSxitviZRGyQ8p+QrCiuIm4FIGkafygGQAAZpd75r+kbjBjCU9JiG66dlcDuFHf7x DXihDc6r6Uei4gMzarTwLzcq2vy/N6TFFdzv1iJGDL+hu9kWGK7T6j30GD+3N9EF6rHYlCvt 3Ivw+mX9P9bWPlhixexrPUx8KCBvqjeaW2H0A83RfHN5Bz2pCXyJtk4DCVWYR4za5daI2eBj Fr75FsJjKK/KkdGekOej2iZMM0s0aGoPtDsTPm8gjFmM8UpKVPvEM2DYyetM4HRfKoEyvpX1 XSzK5/E4ZMm5UNPlmHeegvl+eV3rh3SPEuKLXwB8/hC7VZ5TCXOIYrpzXPUNrxphE96iFyNr r6zyPdmOz0ACbajM0E7AKY4LEwQLGhTOHwFg5UMLYa+zv5dMDh5UZf5mOp5E6Q8xvg9vrqYr xmVBx4DoHKi1CKvFOl/Qi06AF8Zdc0k9ixT0O1FFQvA5kXPlq71vf9DKMNoLed4nAGhpNYtJ 8Q4lwy7Kq0nYhzM+igHbIm7q4pndR+xghmJMTbjaz86F6OMjSSQkjM9VgewpiQIEAStss4y/ ++p2g/BGMJRTAV+FsfGLvmoygrp73QanetzWWrOI8VSJxqwoNQ7dXSpg69lOdwIJDXC2iCei 1ScDyAHqLSfuIQy6tTI2/yJ9t/7D+tkE0NGNGDH9rLqZzLC92+uzNYYAuaFdDzQTk3u/6Cma bkHxv3wKqRfzl1Lr5B9A/Bgyqdnv4njoLpTzwJFGnTXbgv0VuM8cyfehcQW7/9D3L5UvweyS 3mjwNgCNOXbIt7hHX4QOBEhMraJ28YLl2SA9v8yOkj7unN6peLVTUVIMhCQoyVBN78pYpg9y OIstcNKuQyyjh0mboSPgixOrjneK3UBV+Mst40AAZ+tgQ0ukwkQbZvZAy7wwZeOd9QTbRV6f m7K3PLP1+ZG207PU3svDnycj+NSiKMHtA1O0FJfdU+CncDIh6Nv0RBcmdjtot+5EvmTPzpPB 1VW
  • Ironport-hdrordr: A9a23:m8rsgK39kY/JK9d69SGBwgqjBehxeYIsimQD101hICG9Lfb2qy n+ppgmPEHP5Qr5AEtQ5OxpOMG7MBbhHQYc2/hRAV7QZnibhILOFvAj0WKC+UyvJ8SazIBgPM hbAtFD4bHLfDtHZIPBkXOF+rUbsZq6GcKT9J/jJh5WJGkAAcAB0+46MHfhLqQffngaOXNTLu v52iMznUvHRZ1hVLXdOpBqZZmgm/T70LbdJTIWDR8u7weDyRmy7qThLhSe1hACFxtS3LYL6w H+4k7Ez5Tml8v+5g7X1mfV4ZgTssDm0MF/CMuFjdVQAinwizyveJ9qV9S5zXUISaCUmRIXee v30lEd1vdImirsl6aO0EPQMjzboXETArnZuASlaDXY0JbErXkBerV8bMpiA2XkAgwbzY1BOe twrhKknosSAhXakCvn4d/UExlsi0qvuHIn1fUelnpFTOIlGfJsRRx2xjIlLH4sJlOw1GkcKp glMCgc3ocgTXqKK3TC+mV/yt2lWXo+Wh+AX0gZo8SQlzxbhmpwwUcUzNEW2i5ozuNzd7BUo+ Dfdqh4nrBHScEbKap7GecaWMOyTmjAWwjFPm6eKUnuUKsHJ3XOoZjq56hd3pDnRLUYiJ8p3J jRWlJRsmA/P0roFM2VxZVOtgvARW2sNA6dgv22J6IJ84EUYYCbRRFrZGpe4fdIks9vdPEzAc zDS66+K8WTWFfTJQ==
  • Ironport-sdr: 8Aru0YOHM1sgvWspVA6KcXb8k4nxprKy+bLVQqNHZ7OhVXkV4n1akSSGM5IeMAfoquJzJCPdJi OeWPJKIO4AJ8xafI6oENVKuFZMTQlpMSOFxCMgPNddrU0ujWenv/N/S57rH+8TCFuT7UrS3Cav S8yGXtp0D32CpjtfWGrRWxWuvzAb4tcdYureaEdLirW2vlLtQHNctxSslaoV1cP5cdAb6JZvZV kQObcr/cMOqQp5d8Ls32dz3kR7HO/Xqx81lx0xOc4HzgAe7LM2ptEsf3OsFOEqznglwusoJhMW L76A/XLWFYr0kkV9Fo+FnT3Y
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Thread-index: AQHXq9s0IM3OAQqHo06+ALWIm01YaauoZEqA
  • Thread-topic: [PATCH 0/6] gnttab: add per-domain controls


> On 17 Sep 2021, at 16:46, Roger Pau Monne <roger.pau@xxxxxxxxxx> wrote:
> 
> Hello,
> 
> The first two patches of this series allows setting the preisoutly host
> wide command line `gnttab` option on a per domain basis. That means
> selecting the max allowed grant table version and whether transitive
> grants are allowed.
> 
> The last 4 patches attempt to implement support for creating guests
> without grant table support at all. This requires some changes to
> xenstore in order to map shared ring using foreign memory instead of
> grant table.
> 
> Note that patch 5 will break the save format for xenstore records, and
> should not be applied.

Has this relevance for the format used by oxenstored?

> 
> Thanks, Roger.
> 
> Roger Pau Monne (6):
>  gnttab: allow setting max version per-domain
>  grant: allow per-domain control over transitive grants
>  tools/console: use xenforeigmemory to map console ring
>  tools/xenstored: use atexit to close interfaces
>  tools/xenstored: restore support for mapping ring as foreign memory
>  gnttab: allow disabling grant table per-domain
> 
> docs/man/xl.cfg.5.pod.in                |  12 +++
> docs/man/xl.conf.5.pod.in               |  14 +++
> tools/console/Makefile                  |   4 +-
> tools/console/daemon/io.c               |  25 ++++-
> tools/helpers/init-xenstore-domain.c    |   1 +
> tools/include/libxl.h                   |  14 +++
> tools/libs/light/libxl_create.c         |   4 +
> tools/libs/light/libxl_dm.c             |   2 +
> tools/libs/light/libxl_dom.c            |   2 +-
> tools/libs/light/libxl_types.idl        |   2 +
> tools/ocaml/libs/xc/xenctrl.ml          |   5 +
> tools/ocaml/libs/xc/xenctrl.mli         |   5 +
> tools/ocaml/libs/xc/xenctrl_stubs.c     |  12 ++-
> tools/xenstore/Makefile                 |   4 +-
> tools/xenstore/include/xenstore_state.h |   1 +
> tools/xenstore/xenstored_core.h         |   2 +-
> tools/xenstore/xenstored_domain.c       | 120 +++++++++++++++---------
> tools/xl/xl.c                           |  15 +++
> tools/xl/xl.h                           |   2 +
> tools/xl/xl_parse.c                     |  13 +++
> xen/arch/arm/domain_build.c             |   4 +
> xen/arch/x86/setup.c                    |   2 +
> xen/common/domain.c                     |   4 +-
> xen/common/grant_table.c                | 119 ++++++++++++++++++++++-
> xen/include/public/domctl.h             |  13 ++-
> xen/include/xen/grant_table.h           |   7 +-
> 26 files changed, 341 insertions(+), 67 deletions(-)
> 
> -- 
> 2.33.0
> 




 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.