From patchwork Thu Mar 10 15:00:49 2016 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: =?utf-8?b?SsO8cmdlbiBHcm/Dnw==?= X-Patchwork-Id: 8557671 Return-Path: X-Original-To: patchwork-xen-devel@patchwork.kernel.org Delivered-To: patchwork-parsemail@patchwork1.web.kernel.org Received: from mail.kernel.org (mail.kernel.org [198.145.29.136]) by patchwork1.web.kernel.org (Postfix) with ESMTP id 61D289F46A for ; Thu, 10 Mar 2016 15:04:07 +0000 (UTC) Received: from mail.kernel.org (localhost [127.0.0.1]) by mail.kernel.org (Postfix) with ESMTP id 4BC2B20379 for ; Thu, 10 Mar 2016 15:04:05 +0000 (UTC) Received: from lists.xenproject.org (lists.xenproject.org [192.237.175.120]) (using TLSv1.2 with cipher AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPS id 5384D20382 for ; Thu, 10 Mar 2016 15:04:04 +0000 (UTC) Received: from localhost ([127.0.0.1] helo=lists.xenproject.org) by lists.xen.org with esmtp (Exim 4.84) (envelope-from ) id 1ae25C-0005tT-Om; Thu, 10 Mar 2016 15:00:58 +0000 Received: from mail6.bemta3.messagelabs.com ([195.245.230.39]) by lists.xen.org with esmtp (Exim 4.84) (envelope-from ) id 1ae25A-0005sz-SW for xen-devel@lists.xen.org; Thu, 10 Mar 2016 15:00:56 +0000 Received: from [85.158.137.68] by server-6.bemta-3.messagelabs.com id 1B/88-23864-82C81E65; Thu, 10 Mar 2016 15:00:56 +0000 X-Env-Sender: jgross@suse.com X-Msg-Ref: server-2.tower-31.messagelabs.com!1457622055!28218255!1 X-Originating-IP: [195.135.220.15] X-SpamReason: No, hits=0.0 required=7.0 tests= X-StarScan-Received: X-StarScan-Version: 8.11; banners=-,-,- X-VirusChecked: Checked Received: (qmail 55268 invoked from network); 10 Mar 2016 15:00:55 -0000 Received: from mx2.suse.de (HELO mx2.suse.de) (195.135.220.15) by server-2.tower-31.messagelabs.com with DHE-RSA-CAMELLIA256-SHA encrypted SMTP; 10 Mar 2016 15:00:55 -0000 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (charybdis-ext.suse.de [195.135.220.254]) by mx2.suse.de (Postfix) with ESMTP id 217F0AC0D; Thu, 10 Mar 2016 15:00:54 +0000 (UTC) From: Juergen Gross To: xen-devel@lists.xen.org Date: Thu, 10 Mar 2016 16:00:49 +0100 Message-Id: <1457622051-30189-2-git-send-email-jgross@suse.com> X-Mailer: git-send-email 2.6.2 In-Reply-To: <1457622051-30189-1-git-send-email-jgross@suse.com> References: <1457622051-30189-1-git-send-email-jgross@suse.com> Cc: Juergen Gross , wei.liu2@citrix.com, ian.jackson@eu.citrix.com, cyliu@suse.com, stefano.stabellini@eu.citrix.com Subject: [Xen-devel] [PATCH 1/3] libxl: make libxl__need_xenpv_qemu() operate on domain config X-BeenThere: xen-devel@lists.xen.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Xen developer discussion List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , MIME-Version: 1.0 Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, UNPARSEABLE_RELAY autolearn=unavailable version=3.3.1 X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on mail.kernel.org X-Virus-Scanned: ClamAV using ClamSMTP libxl__need_xenpv_qemu() is called with configuration data for console, vfbs, disks and channels today in order to evaluate the need for starting a device model for a pv domain. The console data is local to the caller and setup in a way to never require a device model. All other data is taken from the domain config structure. In order to support other device backends via qemu change the interface of libxl__need_xenpv_qemu() to take the domain config structure as input instead of the single device arrays. Signed-off-by: Juergen Gross --- tools/libxl/libxl_create.c | 9 +------ tools/libxl/libxl_dm.c | 59 ++++++++++++-------------------------------- tools/libxl/libxl_internal.h | 5 +--- 3 files changed, 18 insertions(+), 55 deletions(-) diff --git a/tools/libxl/libxl_create.c b/tools/libxl/libxl_create.c index 61b5c01..0e2b0a0 100644 --- a/tools/libxl/libxl_create.c +++ b/tools/libxl/libxl_create.c @@ -1304,7 +1304,6 @@ static void domcreate_launch_dm(libxl__egc *egc, libxl__multidev *multidev, } case LIBXL_DOMAIN_TYPE_PV: { - int need_qemu = 0; libxl__device_console console; libxl__device device; @@ -1314,17 +1313,11 @@ static void domcreate_launch_dm(libxl__egc *egc, libxl__multidev *multidev, } init_console_info(gc, &console, 0); - - need_qemu = libxl__need_xenpv_qemu(gc, 1, &console, - d_config->num_vfbs, d_config->vfbs, - d_config->num_disks, &d_config->disks[0], - d_config->num_channels, &d_config->channels[0]); - console.backend_domid = state->console_domid; libxl__device_console_add(gc, domid, &console, state, &device); libxl__device_console_dispose(&console); - if (need_qemu) { + if (libxl__need_xenpv_qemu(gc, d_config)) { dcs->dmss.dm.guest_domid = domid; libxl__spawn_local_dm(egc, &dcs->dmss.dm); return; diff --git a/tools/libxl/libxl_dm.c b/tools/libxl/libxl_dm.c index 4aca38e..4b840f4 100644 --- a/tools/libxl/libxl_dm.c +++ b/tools/libxl/libxl_dm.c @@ -2107,61 +2107,34 @@ int libxl__destroy_device_model(libxl__gc *gc, uint32_t domid) GCSPRINTF("/local/domain/%d/image/device-model-pid", domid)); } -int libxl__need_xenpv_qemu(libxl__gc *gc, - int nr_consoles, libxl__device_console *consoles, - int nr_vfbs, libxl_device_vfb *vfbs, - int nr_disks, libxl_device_disk *disks, - int nr_channels, libxl_device_channel *channels) +int libxl__need_xenpv_qemu(libxl__gc *gc, libxl_domain_config *d_config) { - int i, ret = 0; + int i, ret; uint32_t domid; - /* - * qemu is required in order to support 2 or more consoles. So switch all - * backends to qemu if this is the case - */ - if (nr_consoles > 1) { - for (i = 0; i < nr_consoles; i++) - consoles[i].consback = LIBXL__CONSOLE_BACKEND_IOEMU; + ret = libxl__get_domid(gc, &domid); + if (ret) goto out; + + if (d_config->num_vfbs > 0) { ret = 1; goto out; } - for (i = 0; i < nr_consoles; i++) { - if (consoles[i].consback == LIBXL__CONSOLE_BACKEND_IOEMU) { + for (i = 0; i < d_config->num_disks; i++) { + if (d_config->disks[i].backend == LIBXL_DISK_BACKEND_QDISK && + d_config->disks[i].backend_domid == domid) { ret = 1; goto out; } } - if (nr_vfbs > 0) { - ret = 1; - goto out; - } - - if (nr_disks > 0) { - ret = libxl__get_domid(gc, &domid); - if (ret) goto out; - for (i = 0; i < nr_disks; i++) { - if (disks[i].backend == LIBXL_DISK_BACKEND_QDISK && - disks[i].backend_domid == domid) { - ret = 1; - goto out; - } - } - } - - if (nr_channels > 0) { - ret = libxl__get_domid(gc, &domid); - if (ret) goto out; - for (i = 0; i < nr_channels; i++) { - if (channels[i].backend_domid == domid) { - /* xenconsoled is limited to the first console only. - Until this restriction is removed we must use qemu for - secondary consoles which includes all channels. */ - ret = 1; - goto out; - } + for (i = 0; i < d_config->num_channels; i++) { + if (d_config->channels[i].backend_domid == domid) { + /* xenconsoled is limited to the first console only. + Until this restriction is removed we must use qemu for + secondary consoles which includes all channels. */ + ret = 1; + goto out; } } diff --git a/tools/libxl/libxl_internal.h b/tools/libxl/libxl_internal.h index 345a764..fc7bdab 100644 --- a/tools/libxl/libxl_internal.h +++ b/tools/libxl/libxl_internal.h @@ -1616,10 +1616,7 @@ _hidden int libxl__domain_build(libxl__gc *gc, _hidden const char *libxl__domain_device_model(libxl__gc *gc, const libxl_domain_build_info *info); _hidden int libxl__need_xenpv_qemu(libxl__gc *gc, - int nr_consoles, libxl__device_console *consoles, - int nr_vfbs, libxl_device_vfb *vfbs, - int nr_disks, libxl_device_disk *disks, - int nr_channels, libxl_device_channel *channels); + libxl_domain_config *d_config); /* * This function will fix reserved device memory conflict