From mboxrd@z Thu Jan 1 00:00:00 1970 From: Wei Liu Subject: [PATCH v4 16/21] libxl: build, check and pass vNUMA info to Xen for HVM guest Date: Fri, 23 Jan 2015 11:13:47 +0000 Message-ID: <1422011632-22018-17-git-send-email-wei.liu2@citrix.com> References: <1422011632-22018-1-git-send-email-wei.liu2@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: <1422011632-22018-1-git-send-email-wei.liu2@citrix.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: xen-devel@lists.xen.org Cc: Wei Liu , ian.campbell@citrix.com, andrew.cooper3@citrix.com, dario.faggioli@citrix.com, ian.jackson@eu.citrix.com, JBeulich@suse.com, ufimtseva@gmail.com List-Id: xen-devel@lists.xenproject.org Transform user supplied vNUMA configuration into libxl internal representations then libxc representations. Check validity along the line. Libxc has more involvement in building vmemranges in HVM case compared to PV case. The building of vmemranges is placed after xc_hvm_build returns, because it relies on memory hole information provided by xc_hvm_build. Signed-off-by: Wei Liu Cc: Ian Campbell Cc: Ian Jackson Cc: Dario Faggioli Cc: Elena Ufimtseva --- Changes in v4: 1. Adapt to new interface. 2. Rename some variables. 3. Use GCREALLOC_ARRAY. Changes in v3: 1. Rewrite commit log. --- tools/libxl/libxl_create.c | 9 +++++++ tools/libxl/libxl_dom.c | 27 ++++++++++++++++++++ tools/libxl/libxl_internal.h | 5 ++++ tools/libxl/libxl_vnuma.c | 56 ++++++++++++++++++++++++++++++++++++++++++ 4 files changed, 97 insertions(+) diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c index 98687bd..af04248 100644 --- a/tools/libxl/libxl_create.c +++ b/tools/libxl/libxl_create.c @@ -853,6 +853,15 @@ static void initiate_domain_create(libxl__egc *egc, goto error_out; } + /* Disallow PoD and vNUMA to be enabled at the same time because PoD + * pool is not vNUMA-aware yet. + */ + if (pod_enabled && d_config->b_info.num_vnuma_nodes) { + ret = ERROR_INVAL; + LOG(ERROR, "Cannot enable PoD and vNUMA at the same time"); + goto error_out; + } + ret = libxl__domain_create_info_setdefault(gc, &d_config->c_info); if (ret) goto error_out; diff --git a/tools/libxl/libxl_dom.c b/tools/libxl/libxl_dom.c index b06fd65..d229870 100644 --- a/tools/libxl/libxl_dom.c +++ b/tools/libxl/libxl_dom.c @@ -885,12 +885,39 @@ int libxl__build_hvm(libxl__gc *gc, uint32_t domid, goto out; } + if (info->num_vnuma_nodes != 0) { + int i; + + args.nr_vnuma_info = info->num_vnuma_nodes; + args.vnuma_info = libxl__malloc(gc, sizeof(*args.vnuma_info) * + args.nr_vnuma_info); + for (i = 0; i < args.nr_vnuma_info; i++) { + args.vnuma_info[i].vnode = i; + args.vnuma_info[i].pnode = info->vnuma_nodes[i].pnode; + args.vnuma_info[i].pages = info->vnuma_nodes[i].memkb >> 2; + } + + /* Consider video ram belongs to node 0 */ + args.vnuma_info[0].pages -= (info->video_memkb >> 2); + } + ret = xc_hvm_build(ctx->xch, domid, &args); if (ret) { LOGEV(ERROR, ret, "hvm building failed"); goto out; } + if (info->num_vnuma_nodes != 0) { + ret = libxl__vnuma_build_vmemrange_hvm(gc, domid, info, state, &args); + if (ret) { + LOGEV(ERROR, ret, "hvm build vmemranges failed"); + goto out; + } + ret = libxl__vnuma_config_check(gc, info, state); + if (ret) goto out; + ret = set_vnuma_info(gc, domid, info, state); + if (ret) goto out; + } ret = hvm_build_set_params(ctx->xch, domid, info, state->store_port, &state->store_mfn, state->console_port, &state->console_mfn, state->store_domid, diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h index 73d533a..a5513c9 100644 --- a/tools/libxl/libxl_internal.h +++ b/tools/libxl/libxl_internal.h @@ -3403,6 +3403,11 @@ int libxl__vnuma_build_vmemrange_pv(libxl__gc *gc, uint32_t domid, libxl_domain_build_info *b_info, libxl__domain_build_state *state); +int libxl__vnuma_build_vmemrange_hvm(libxl__gc *gc, + uint32_t domid, + libxl_domain_build_info *b_info, + libxl__domain_build_state *state, + struct xc_hvm_build_args *args); _hidden int libxl__ms_vm_genid_set(libxl__gc *gc, uint32_t domid, const libxl_ms_vm_genid *id); diff --git a/tools/libxl/libxl_vnuma.c b/tools/libxl/libxl_vnuma.c index 0189a4b..62ee6da 100644 --- a/tools/libxl/libxl_vnuma.c +++ b/tools/libxl/libxl_vnuma.c @@ -162,6 +162,62 @@ int libxl__vnuma_build_vmemrange_pv(libxl__gc *gc, return libxl__arch_vnuma_build_vmemrange(gc, domid, b_info, state); } +/* Build vmemranges for HVM guest */ +int libxl__vnuma_build_vmemrange_hvm(libxl__gc *gc, + uint32_t domid, + libxl_domain_build_info *b_info, + libxl__domain_build_state *state, + struct xc_hvm_build_args *args) +{ + uint64_t hole_start, hole_end, next; + int nid, nr_vmemrange; + xen_vmemrange_t *vmemranges; + + /* Derive vmemranges from vnode size and memory hole. + * + * Guest physical address space layout: + * [0, hole_start) [hole_start, hole_end) [hole_end, highmem_end) + */ + hole_start = args->lowmem_end < args->mmio_start ? + args->lowmem_end : args->mmio_start; + hole_end = (args->mmio_start + args->mmio_size) > (1ULL << 32) ? + (args->mmio_start + args->mmio_size) : (1ULL << 32); + + assert(state->vmemranges == NULL); + + next = 0; + nr_vmemrange = 0; + vmemranges = NULL; + for (nid = 0; nid < b_info->num_vnuma_nodes; nid++) { + libxl_vnode_info *p = &b_info->vnuma_nodes[nid]; + uint64_t remaining_bytes = p->memkb << 10; + + while (remaining_bytes > 0) { + uint64_t count = remaining_bytes; + + if (next >= hole_start && next < hole_end) + next = hole_end; + if ((next < hole_start) && (next + remaining_bytes >= hole_start)) + count = hole_start - next; + + GCREALLOC_ARRAY(vmemranges, nr_vmemrange+1); + vmemranges[nr_vmemrange].start = next; + vmemranges[nr_vmemrange].end = next + count; + vmemranges[nr_vmemrange].flags = 0; + vmemranges[nr_vmemrange].nid = nid; + + nr_vmemrange++; + remaining_bytes -= count; + next += count; + } + } + + state->vmemranges = vmemranges; + state->num_vmemranges = nr_vmemrange; + + return 0; +} + /* * Local variables: * mode: C -- 1.7.10.4