[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [v11][PATCH 09/16] tools: extend xc_assign_device() to support rdm reservation policy



On Wed, Jul 22, 2015 at 02:06:46PM +0100, Ian Jackson wrote:
> Tiejun Chen writes ("[v11][PATCH 09/16] tools: extend xc_assign_device() to 
> support rdm reservation policy"):
> > This patch passes rdm reservation policy to xc_assign_device() so the policy
> > is checked when assigning devices to a VM.
> 
> Wei, as you know, I am double-checking the acks on this series.
> 
> You acked v4.  But v11 is slightly different.  Your ack was retained
> and my subject line search did not turn up any authority for that.
> 
> The v* message by the submitter says:
> 
> > v5:
> > 
> > * Fix the flag field as "0" to DT device
> 
> Below is the diff between
>   * staging (bc299d01) + Jan's v12 + v11 02.. + the relevant patch from v4
>   * staging (bc299d01) + Jan's v12 + v11 02.. + the relevant patch from v8
> 
> Please ack/nack.
> 
> Thanks,
> Ian.
> 

The changes below are due to change in prerequisite patch
  xen/passthrough: extend hypercall to support rdm reservation policy
deleted some two #defines.

Jan was happy with that change so I'm happy with this change.

In any case, this is a domctl. We have the liberty of fixing it up
whenever we like. So

Acked-by: Wei Liu <wei.liu2@xxxxxxxxxx>


> diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c
> index 1dfadb0..69e6d8f 100644
> --- a/tools/libxc/xc_domain.c
> +++ b/tools/libxc/xc_domain.c
> @@ -1794,8 +1794,11 @@ int xc_assign_dt_device(
>  
>      domctl.u.assign_device.dev = XEN_DOMCTL_DEV_DT;
>      domctl.u.assign_device.u.dt.size = size;
> -    /* DT doesn't own any RDM. */
> -    domctl.u.assign_device.flag = XEN_DOMCTL_DEV_NO_RDM;
> +    /*
> +     * DT doesn't own any RDM so actually DT has nothing to do
> +     * for any flag and here just fix that as 0.
> +     */
> +    domctl.u.assign_device.flag = 0;
>      set_xen_guest_handle(domctl.u.assign_device.u.dt.path, path);
>  
>      rc = do_domctl(xch, &domctl);
> diff --git a/tools/ocaml/libs/xc/xenctrl_stubs.c 
> b/tools/ocaml/libs/xc/xenctrl_stubs.c
> index 317bf75..b7de615 100644
> --- a/tools/ocaml/libs/xc/xenctrl_stubs.c
> +++ b/tools/ocaml/libs/xc/xenctrl_stubs.c
> @@ -1173,9 +1173,7 @@ CAMLprim value stub_xc_domain_test_assign_device(value 
> xch, value domid, value d
>  }
>  
>  static int domain_assign_device_rdm_flag_table[] = {
> -    XEN_DOMCTL_DEV_NO_RDM,
>      XEN_DOMCTL_DEV_RDM_RELAXED,
> -    XEN_DOMCTL_DEV_RDM_STRICT,
>  };
>  
>  CAMLprim value stub_xc_domain_assign_device(value xch, value domid, value 
> desc,
> diff --git a/tools/python/xen/lowlevel/xc/xc.c 
> b/tools/python/xen/lowlevel/xc/xc.c
> index ff4adb3..c8380d1 100644
> --- a/tools/python/xen/lowlevel/xc/xc.c
> +++ b/tools/python/xen/lowlevel/xc/xc.c
> @@ -615,7 +615,8 @@ static int next_bdf(char **str, int *seg, int *bus, int 
> *dev, int *func,
>      }
>      else
>      {
> -        *flag = XEN_DOMCTL_DEV_RDM_STRICT;
> +        /* O means we take "strict" as our default policy. */
> +        *flag = 0;
>          *str = NULL;
>      }
>  
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxx
> http://lists.xen.org/xen-devel

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.