summaryrefslogtreecommitdiff
path: root/libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch
diff options
context:
space:
mode:
authorCoprDistGit <infra@openeuler.org>2023-09-12 01:06:10 +0000
committerCoprDistGit <infra@openeuler.org>2023-09-12 01:06:10 +0000
commitd6d9b3795aceb43d6aa1fcab85193e88049ce309 (patch)
tree6fc7120d35bbdccab9830f6b46100bbed6501bf6 /libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch
parent0081bffd55f7e9dc8df063521321178b95758d24 (diff)
automatic import of libvirtopeneuler22.03_LTS
Diffstat (limited to 'libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch')
-rw-r--r--libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch81
1 files changed, 81 insertions, 0 deletions
diff --git a/libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch b/libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch
new file mode 100644
index 0000000..86277d9
--- /dev/null
+++ b/libvirt-RHEL-qemu-Add-ability-to-set-sgio-values-for-hostdev.patch
@@ -0,0 +1,81 @@
+From b36365dfbadc27ec0198db969701d05669392138 Mon Sep 17 00:00:00 2001
+Message-Id: <b36365dfbadc27ec0198db969701d05669392138@dist-git>
+From: John Ferlan <jferlan@redhat.com>
+Date: Mon, 17 Dec 2018 20:42:30 -0500
+Subject: [PATCH] RHEL: qemu: Add ability to set sgio values for hostdev
+MIME-Version: 1.0
+Content-Type: text/plain; charset=UTF-8
+Content-Transfer-Encoding: 8bit
+
+https://bugzilla.redhat.com/show_bug.cgi?id=1582424
+
+RHEL-only
+
+Add necessary checks in order to allow setting sgio values for a scsi
+host device
+
+Signed-off-by: John Ferlan <jferlan@redhat.com>
+Signed-off-by: Ján Tomko <jtomko@redhat.com>
+Signed-off-by: Jiri Denemark <jdenemar@redhat.com>
+---
+ src/qemu/qemu_conf.c | 25 ++++++++++++++++---------
+ 1 file changed, 16 insertions(+), 9 deletions(-)
+
+diff --git a/src/qemu/qemu_conf.c b/src/qemu/qemu_conf.c
+index 0451bc70ac..3fee5fe687 100644
+--- a/src/qemu/qemu_conf.c
++++ b/src/qemu/qemu_conf.c
+@@ -1836,8 +1836,9 @@ qemuSetUnprivSGIO(virDomainDeviceDef *dev)
+ virDomainDiskDef *disk = NULL;
+ virDomainHostdevDef *hostdev = NULL;
+ g_autofree char *sysfs_path = NULL;
++ g_autofree char *hostdev_path = NULL;
+ const char *path = NULL;
+- int val = -1;
++ int val = 0;
+
+ /* "sgio" is only valid for block disk; cdrom
+ * and floopy disk can have empty source.
+@@ -1853,17 +1854,14 @@ qemuSetUnprivSGIO(virDomainDeviceDef *dev)
+ } else if (dev->type == VIR_DOMAIN_DEVICE_HOSTDEV) {
+ hostdev = dev->data.hostdev;
+
+- if (!qemuIsSharedHostdev(hostdev))
++ if (hostdev->source.subsys.u.scsi.protocol ==
++ VIR_DOMAIN_HOSTDEV_SCSI_PROTOCOL_TYPE_ISCSI)
+ return 0;
+
+- if (hostdev->source.subsys.u.scsi.sgio) {
+- virReportError(VIR_ERR_INTERNAL_ERROR, "%s",
+- _("'sgio' is not supported for SCSI "
+- "generic device yet "));
++ if (!(hostdev_path = qemuGetHostdevPath(hostdev)))
+ return -1;
+- }
+
+- return 0;
++ path = hostdev_path;
+ } else {
+ return 0;
+ }
+@@ -1872,7 +1870,16 @@ qemuSetUnprivSGIO(virDomainDeviceDef *dev)
+ return -1;
+
+ /* By default, filter the SG_IO commands, i.e. set unpriv_sgio to 0. */
+- val = (disk->sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED);
++ if (dev->type == VIR_DOMAIN_DEVICE_DISK) {
++ if (disk->sgio == VIR_DOMAIN_DEVICE_SGIO_UNFILTERED)
++ val = 1;
++ } else {
++ /* Only settable if <shareable/> was present for hostdev */
++ if (qemuIsSharedHostdev(hostdev) &&
++ hostdev->source.subsys.u.scsi.sgio ==
++ VIR_DOMAIN_DEVICE_SGIO_UNFILTERED)
++ val = 1;
++ }
+
+ /* Do not do anything if unpriv_sgio is not supported by the kernel and the
+ * whitelist is enabled. But if requesting unfiltered access, always call
+--
+2.33.1
+