|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [v11][PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy
On Wed, Jul 22, 2015 at 02:06:46PM +0100, Ian Jackson wrote:
> Tiejun Chen writes ("[v11][PATCH 09/16] tools: extend xc_assign_device() to
> support rdm reservation policy"):
> > This patch passes rdm reservation policy to xc_assign_device() so the policy
> > is checked when assigning devices to a VM.
>
> Wei, as you know, I am double-checking the acks on this series.
>
> You acked v4. But v11 is slightly different. Your ack was retained
> and my subject line search did not turn up any authority for that.
>
> The v* message by the submitter says:
>
> > v5:
> >
> > * Fix the flag field as "0" to DT device
>
> Below is the diff between
> * staging (bc299d01) + Jan's v12 + v11 02.. + the relevant patch from v4
> * staging (bc299d01) + Jan's v12 + v11 02.. + the relevant patch from v8
>
> Please ack/nack.
>
> Thanks,
> Ian.
>
The changes below are due to change in prerequisite patch
xen/passthrough: extend hypercall to support rdm reservation policy
deleted some two #defines.
Jan was happy with that change so I'm happy with this change.
In any case, this is a domctl. We have the liberty of fixing it up
whenever we like. So
Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>
> diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c
> index 1dfadb0..69e6d8f 100644
> --- a/tools/libxc/xc_domain.c
> +++ b/tools/libxc/xc_domain.c
> @@ -1794,8 +1794,11 @@ int xc_assign_dt_device(
>
> domctl.u.assign_device.dev = XEN_DOMCTL_DEV_DT;
> domctl.u.assign_device.u.dt.size = size;
> - /* DT doesn't own any RDM. */
> - domctl.u.assign_device.flag = XEN_DOMCTL_DEV_NO_RDM;
> + /*
> + * DT doesn't own any RDM so actually DT has nothing to do
> + * for any flag and here just fix that as 0.
> + */
> + domctl.u.assign_device.flag = 0;
> set_xen_guest_handle(domctl.u.assign_device.u.dt.path, path);
>
> rc = do_domctl(xch, &domctl);
> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c
> b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index 317bf75..b7de615 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -1173,9 +1173,7 @@ CAMLprim value stub_xc_domain_test_assign_device(value
> xch, value domid, value d
> }
>
> static int domain_assign_device_rdm_flag_table[] = {
> - XEN_DOMCTL_DEV_NO_RDM,
> XEN_DOMCTL_DEV_RDM_RELAXED,
> - XEN_DOMCTL_DEV_RDM_STRICT,
> };
>
> CAMLprim value stub_xc_domain_assign_device(value xch, value domid, value
> desc,
> diff --git a/tools/python/xen/lowlevel/xc/xc.c
> b/tools/python/xen/lowlevel/xc/xc.c
> index ff4adb3..c8380d1 100644
> --- a/tools/python/xen/lowlevel/xc/xc.c
> +++ b/tools/python/xen/lowlevel/xc/xc.c
> @@ -615,7 +615,8 @@ static int next_bdf(char **str, int *seg, int *bus, int
> *dev, int *func,
> }
> else
> {
> - *flag = XEN_DOMCTL_DEV_RDM_STRICT;
> + /* O means we take "strict" as our default policy. */
> + *flag = 0;
> *str = NULL;
> }
>
>
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |