|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [RFC][v2][PATCH 01/14] tools: introduce some new parameters to set rdm policy
+=item B<rdm= "RDM_RESERVE_STRING" >Stray space after before and after "RDM_RESERVE_STRING". Sure, =item B<rdm="RDM_RESERVE_STRING"> + +(HVM/x86 only) Specifies the information about Reserved Device Memory (RDM), +which is necessary to enable robust device passthrough usage. One example ofDelete "usage". Okay. +RDM is reported through ACPI Reserved Memory Region Reporting (RMRR) +structure on x86 platform. + +B<RDM_RESERVE_STRING> has the form C<[KEY=VALUE,KEY=VALUE,...> where: + +=over 4 + +=item B<KEY=VALUE> + +Possible B<KEY>s are: + +=over 4 + +=item B<type="STRING"> + +Currently we just have two types: + +"host" means all reserved device memory on this platform should be reserved +in this VM's pfn space. This global RDM parameter allows user to specifyPFN is Xen internal terminology. Do you mean "guest address space"? Note that the reader is system administrators who might not know / want to know Xen internals. Sure. +reserved regions explicitly. And using "host" to include all reserved regions +reported on this platform which is good to handle hotplug scenario. In the +future this parameter may be further extended to allow specifying random +regions, e.g. even those belonging to another platform as a preparationExtending how? What's your envisaged syntax for those random regions? We didn't go into details while discussing that design. Maybe we can do something like this, rdm="type=host,reserve=strict,rdm_add=size[KMG][@offset[KMG]],size[KMG][@offset[KMG]],..." Should you want to reserve more, an array is more useful. Could you Yeah. provide some examples? But we may have alternative approach to this when I noticed some guys are trying to delivery some patches about setting rmrr region by xen commandline. So I also would like to check this likelihood when we can step forward. +for live migration with passthrough devices. + +"none" means we have nothing to do all reserved regions and ignore all policies, +so guest work as before. + +=over 4 + +=item B<reserve="STRING"> + +Conflict may be detected when reserving reserved device memory in gfn space.GFN is a Xen internal terminology. Maybe you should use "guest address space"? Nonetheless the terminology throughout this document should be consistent. Sure, so I will do this, s/pfn/guest address space/g s/gfn/guest address space/g +"strict" means an unsolved conflict leads to immediate VM crash, while +"relaxed" allows VM moving forward with a warning message thrown out. "relaxed" +is default. + +Note this may be overrided by another sub item, rdm_reserve, in pci device. +"overridden by rdm_reserve option in PCI device configuration". Okay. =item B<pci=[ "PCI_SPEC_STRING", "PCI_SPEC_STRING", ... ]> Specifies the host PCI devices to passthrough to this guest. Each B<PCI_SPEC_STRING> @@ -707,6 +750,20 @@ dom0 without confirmation. Please use with care. D0-D3hot power management states for the PCI device. False (0) by default. +=item B<rdm_reserv="STRING"> + +(HVM/x86 only) Specifies the information about Reserved Device Memory (RDM), +which is necessary to enable robust device passthrough usage. One example ofDelete "usage".+RDM is reported through ACPI Reserved Memory Region Reporting (RMRR) +structure on x86 platform. + +Conflict may be detected when reserving reserved device memory in gfn space. +"strict" means an unsolved conflict leads to immediate VM crash, while +"relaxed" allows VM moving forward with a warning message thrown out. "strict" +is default. +Actually these two paragraphs are the same as before. You can just point readers to previous sections instead of copying them here. So instead, (HVM/x86 only) This is same as reserve option above but just specific to a given device, and "strict" is default here.
Based on our previous discussion, I will initial this firstly,
+libxl_rdm_reserve_type = Enumeration("rdm_reserve_type", [
+ (0, "none"),
+ (1, "host"),
+ ], init_val = "LIBXL_RDM_RESERVE_TYPE_NONE")
+
and then, I would remove this line since right now we just own two
options, "none" or "host". And both they're fine.
+ b_info->rdm.reserve = LIBXL_RDM_RESERVE_FLAG_RELAXED;
But indeed, here we should set rdm.reserve as you said,
+void libxl__rdm_setdefault(libxl__gc *gc, libxl_domain_build_info *b_info)
+{
+ if (b_info->rdm.reserve == LIBXL_RDM_RESERVE_FLAG_INVALID)
+ b_info->rdm.reserve = LIBXL_RDM_RESERVE_FLAG_RELAXED;
+}
+
Right. Thanks Tiejun Wei. _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |