All of lore.kernel.org
 help / color / mirror / Atom feed
From: Julien Grall <julien@xen.org>
To: "Durrant, Paul" <pdurrant@amazon.co.uk>,
	"jandryuk@gmail.com" <jandryuk@gmail.com>
Cc: Anthony PERARD <anthony.perard@citrix.com>,
	xen-devel <xen-devel@lists.xenproject.org>,
	Ian Jackson <ian.jackson@eu.citrix.com>, Wei Liu <wl@xen.org>
Subject: Re: [Xen-devel] [PATCH v2 4/6] libxl: allow creation of domains with a specified or random domid
Date: Mon, 13 Jan 2020 21:23:45 +0000	[thread overview]
Message-ID: <01d32c81-9977-980a-f6c9-75a8cbbd370c@xen.org> (raw)
In-Reply-To: <6696d0425bbb4b50a064221b37bdcfaf@EX13D32EUC003.ant.amazon.com>

Hi Paul,

On 13/01/2020 16:54, Durrant, Paul wrote:
>> -----Original Message-----
>> From: jandryuk@gmail.com <jandryuk@gmail.com>
>> Sent: 13 January 2020 16:16
>> To: Durrant, Paul <pdurrant@amazon.co.uk>
>> Cc: xen-devel <xen-devel@lists.xenproject.org>; Anthony PERARD
>> <anthony.perard@citrix.com>; Ian Jackson <ian.jackson@eu.citrix.com>; Wei
>> Liu <wl@xen.org>
>> Subject: Re: [Xen-devel] [PATCH v2 4/6] libxl: allow creation of domains
>> with a specified or random domid
>>
>> On Thu, Jan 9, 2020 at 6:50 AM Paul Durrant <pdurrant@amazon.com> wrote:
>>>
>>> This patch adds a 'domid' field to libxl_domain_create_info and then
>>> modifies do_domain_create() to use that value if it is valid. Any valid
>>> domid will be checked against the retired domid list before being passed
>>> to libxl__domain_make().
>>> If the domid value is invalid then Xen will choose the domid, as before,
>>> unless the value is the new special RANDOM_DOMID value added to the API.
>>> This value instructs libxl__domain_make() to select a random domid
>> value,
>>> check it for validity, verify it does not match a retired domain, and
>> then
>>> pass it to Xen's XEN_DOMCTL_createdomain operation. If Xen determines
>> that
>>> it co-incides with an existing domain, a new random value will be
>>> selected and the operation will be re-tried.
>>>
>>> NOTE: libxl__logv() is also modified to only log valid domid values in
>>>        messages rather than any domid, valid or otherwise, that is not
>>>        INVALID_DOMID.
>>>
>>> Signed-off-by: Paul Durrant <pdurrant@amazon.com>
>>> ---
>>> Cc: Ian Jackson <ian.jackson@eu.citrix.com>
>>> Cc: Wei Liu <wl@xen.org>
>>> Cc: Anthony PERARD <anthony.perard@citrix.com>
>>>
>>> v2:
>>>   - Re-worked to use a value from libxl_domain_create_info
>>> ---
>>>   tools/libxl/libxl.h          |  9 +++++++++
>>>   tools/libxl/libxl_create.c   | 32 +++++++++++++++++++++++++++++++-
>>>   tools/libxl/libxl_internal.c |  2 +-
>>>   tools/libxl/libxl_types.idl  |  1 +
>>>   4 files changed, 42 insertions(+), 2 deletions(-)
>>>
>>
>> <snip>
>>
>>> diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c
>>> index 1835a5502c..ee76dee364 100644
>>> --- a/tools/libxl/libxl_create.c
>>> +++ b/tools/libxl/libxl_create.c
>>> @@ -600,9 +600,39 @@ int libxl__domain_make(libxl__gc *gc,
>> libxl_domain_config *d_config,
>>>               goto out;
>>>           }
>>>
>>> -        ret = xc_domain_create(ctx->xch, domid, &create);
>>> +        if (libxl_domid_valid_guest(info->domid)) {
>>> +            *domid = info->domid;
>>> +
>>> +            if (libxl__is_retired_domid(gc, *domid)) {
>>> +                LOGED(ERROR, *domid, "domain id is retired");
>>> +                rc = ERROR_FAIL;
>>> +                goto out;
>>> +            }
>>> +        } else if (info->domid == RANDOM_DOMID) {
>>> +            *domid = 0; /* Zero-out initial value */
>>> +        }
>>> +
>>> +        for (;;) {
>>> +            if (info->domid == RANDOM_DOMID) {
>>> +                /* Randomize lower order bytes */
>>> +                ret = libxl__random_bytes(gc, (void *)domid,
>>> +                                          sizeof(uint16_t));
>>
>> Casting to void * assumes little endian.
> 
> I think that's a fairly safe assumption as far as Xen goes...

Not really, there are technically nothing (other than bug fixes) 
preventing us to use a big endian guest on Xen on Arm.

I actually did play with big endian on Xen in the past and managed to 
get a guest running. The main annoying part is Linux as it is assuming 
to use the same endian as the hypervisor. But other OS may not have this 
issues...

The hypervisor itself is likely going to stay little endian, so does the 
interface. For the tools, we should aim to not introduce more assumption 
that the software will be little endian.

Cheers,

-- 
Julien Grall

_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel

  parent reply	other threads:[~2020-01-13 21:24 UTC|newest]

Thread overview: 13+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2020-01-09 11:48 [Xen-devel] [PATCH v2 0/6] xl/libxl: domid allocation/preservation changes Paul Durrant
2020-01-09 11:48 ` [Xen-devel] [PATCH v2 1/6] libxl: add definition of INVALID_DOMID to the API Paul Durrant
2020-01-09 11:48 ` [Xen-devel] [PATCH v2 2/6] libxl_create: make 'soft reset' explicit Paul Durrant
2020-01-09 11:48 ` [Xen-devel] [PATCH v2 3/6] libxl: add infrastructure to track and query 'retired' domids Paul Durrant
2020-01-09 11:48 ` [Xen-devel] [PATCH v2 4/6] libxl: allow creation of domains with a specified or random domid Paul Durrant
2020-01-13 16:16   ` Jason Andryuk
2020-01-13 16:54     ` Durrant, Paul
2020-01-13 18:34       ` Jason Andryuk
2020-01-14 10:05         ` Durrant, Paul
2020-01-13 21:23       ` Julien Grall [this message]
2020-01-14 10:04         ` Durrant, Paul
2020-01-09 11:48 ` [Xen-devel] [PATCH v2 5/6] xl.conf: introduce 'domid_policy' Paul Durrant
2020-01-09 11:48 ` [Xen-devel] [PATCH v2 6/6] xl: allow domid to be preserved on save/restore or migrate Paul Durrant

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=01d32c81-9977-980a-f6c9-75a8cbbd370c@xen.org \
    --to=julien@xen.org \
    --cc=anthony.perard@citrix.com \
    --cc=ian.jackson@eu.citrix.com \
    --cc=jandryuk@gmail.com \
    --cc=pdurrant@amazon.co.uk \
    --cc=wl@xen.org \
    --cc=xen-devel@lists.xenproject.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.