[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools


  • To: Julien Grall <julien@xxxxxxx>
  • From: Luca Fancellu <Luca.Fancellu@xxxxxxx>
  • Date: Tue, 22 Mar 2022 17:19:23 +0000
  • Accept-language: en-GB, en-US
  • Arc-authentication-results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=arm.com; dmarc=pass action=none header.from=arm.com; dkim=pass header.d=arm.com; arc=none
  • Arc-message-signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=dAJkZwTjj9YY4vcqO0WasdWajY3sxqk6ZpbYBwQutb8=; b=kJim9hzJQV3jOohglcFE98UtjsS4bcDrhnsdnl4JsSakvpw940o4GU42J7IKmYz798OT275Ataj4DQdEJn0XflUIFUC2GxJorbk9keLheL8rkQs9Uq8ULjT5rc+0No1CqtCawLyWp5wVrhjHbTHm8jDZIXd0fW5gthUx4Bt+CmlGyWV0sFPFSqshhXwdL/eI2mZLjM9AQMjxnApkngAtXBU4c9JmPMgbJOikPZSIqDu5vqaBPltOYIo7UVmXzT+EoQNJunoeuP8p1UijTfa2CutwcD7sz7b+IYhGe2VjbAUzWVDqacGnv0bBfz54uaxpEopg5OhiuAR7Bei1HsKblQ==
  • Arc-seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=nnSCuSaFccvcBeTYO/GotWyDvx755OkiokaN0qWCXKEub4f76sZBYqv5P85EL9HXEMX0h5s5vz3KBV6Ox8vP5AWbjbDl2Q20yFpUZWGMqrwR5pScW6hTSi3e55etfWkqSBgpja4+Ls5lxLb86gE0leFh7Ds8h2/S2FQKRQuGExNk3S1An3s3K1OMglwnoRJKGLl9gUHg0toqpA1ayfoZK4Rvj4Zns4xlATpuXaLkLhlGO6g1IY7MYupYudSWqIaAxgzSbkzLxrWH41JBFQn6itFmLxReUCJbJQ7gs9bkwByDONHpJi1x+0VMmcgxI+odybR6IKlwz9rCMZLWoGRQPw==
  • Authentication-results-original: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Cc: Xen-devel <xen-devel@xxxxxxxxxxxxxxxxxxxx>, Bertrand Marquis <Bertrand.Marquis@xxxxxxx>, Wei Chen <Wei.Chen@xxxxxxx>, Stefano Stabellini <sstabellini@xxxxxxxxxx>, Volodymyr Babchuk <Volodymyr_Babchuk@xxxxxxxx>, Andrew Cooper <andrew.cooper3@xxxxxxxxxx>, George Dunlap <george.dunlap@xxxxxxxxxx>, Jan Beulich <jbeulich@xxxxxxxx>, Wei Liu <wl@xxxxxxx>, "rosbrookn@xxxxxxxxx" <rosbrookn@xxxxxxxxx>, Anthony PERARD <anthony.perard@xxxxxxxxxx>, "christian.lindig@xxxxxxxxxx" <christian.lindig@xxxxxxxxxx>, Marek Marczykowski-Górecki <marmarek@xxxxxxxxxxxxxxxxxxxxxx>
  • Delivery-date: Tue, 22 Mar 2022 17:21:23 +0000
  • List-id: Xen developer discussion <xen-devel.lists.xenproject.org>
  • Nodisclaimer: true
  • Original-authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=arm.com;
  • Thread-index: AQHYOtyJQj5Quyvq80eQ8wyveo4cTKzFUeSAgAZaVAA=
  • Thread-topic: [PATCH v3 5/6] arm/dom0less: assign dom0less guests to cpupools

+ maintainer golang, libs, ocaml, python bindings

> On 18 Mar 2022, at 16:18, Julien Grall <julien@xxxxxxx> wrote:
> 
> Hi,
> 
> On 18/03/2022 15:25, Luca Fancellu wrote:
>> Introduce domain-cpupool property of a xen,domain device tree node,
>> that specifies the cpupool device tree handle of a xen,cpupool node
>> that identifies a cpupool created at boot time where the guest will
>> be assigned on creation.
>> Add member to the xen_domctl_createdomain public interface so the
>> XEN_DOMCTL_INTERFACE_VERSION version is bumped.
>> Add public function to retrieve a pool id from the device tree
>> cpupool node.
>> Update documentation about the property.
>> Signed-off-by: Luca Fancellu <luca.fancellu@xxxxxxx>
>> ---
>> Changes in v3:
>> - Use explicitely sized integer for struct xen_domctl_createdomain
>>   cpupool_id member. (Stefano)
>> - Changed code due to previous commit code changes
>> Changes in v2:
>> - Moved cpupool_id from arch specific to common part (Juergen)
>> - Implemented functions to retrieve the cpupool id from the
>>   cpupool dtb node.
>> ---
>>  docs/misc/arm/device-tree/booting.txt |  5 +++++
>>  xen/arch/arm/domain_build.c           | 14 +++++++++++++-
>>  xen/common/boot_cpupools.c            | 24 ++++++++++++++++++++++++
>>  xen/common/domain.c                   |  2 +-
>>  xen/include/public/domctl.h           |  4 +++-
>>  xen/include/xen/sched.h               |  9 +++++++++
> 
> This patch doesn't seem to contain any change in tools. So...
> 
>>          if ( (err = late_hwdom_init(d)) != 0 )
>> diff --git a/xen/include/public/domctl.h b/xen/include/public/domctl.h
>> index b85e6170b0aa..2f4cf56f438d 100644
>> --- a/xen/include/public/domctl.h
>> +++ b/xen/include/public/domctl.h
>> @@ -38,7 +38,7 @@
>>  #include "hvm/save.h"
>>  #include "memory.h"
>>  -#define XEN_DOMCTL_INTERFACE_VERSION 0x00000014
>> +#define XEN_DOMCTL_INTERFACE_VERSION 0x00000015
>>    /*
>>   * NB. xen_domctl.domain is an IN/OUT parameter for this operation.
>> @@ -106,6 +106,8 @@ struct xen_domctl_createdomain {
>>      /* Per-vCPU buffer size in bytes.  0 to disable. */
>>      uint32_t vmtrace_size;
>>  +    uint32_t cpupool_id;
> 
> ... will the tools (e.g. golang bindings, libxl,..) always zero 
> xen_domctl_createdomain?
> 
> I also think we may need to regenerate the golang bindings.

I’ve checked the occurrences of struct xen_domctl_createdomain in tools/ and I 
see it is
always initialised using designated initializers so (correct me if I’m wrong) 
any non specified
field should be zero.

I tried to check if I need and how to regenerate the golang bindings, I didn’t 
find documentation
to do that, I’ve added some maintainer to this reply that hopefully can help me 
to understand
If I’ve missed something in this patch modifying struct xen_domctl_createdomain.

Cheers,
Luca

> 
> Cheers,
> 
> -- 
> Julien Grall


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.