hadow vnmi flexpriority ept vpid fsgsbase tsc_adjust bmi1 hle
avx2 smep bmi2 erms invpcid rtm mpx rdseed adx smap clflushopt
xsaveopt xsavec xgetbv1 xsaves dtherm ida arat pln pts hwp hwp_notify
hwp_act_window hwp_epp
Cheers.
Zhongze Liu.
___
Xen-devel ma
for that.
I would finish the proposal ASAP and start discussing the
implementation details with
you and Julien.
Thanks again.
Cheers.
Zhongze Liu
2017-03-29 8:15 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Tue, 28 Mar 2017, Stefano Stabellini wrote:
>> Hello Zhongze,
>&
Hi Stefano,
What do you say if we extend this project into "sharing multiple
ranges of memory area among VMs from the config file".
Cheers.
Zhongze Liu
2017-03-30 9:07 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> Hi Stefano,
>
> Thanks for reminding me of the
lso: https://xenproject.atlassian.net/browse/XEN-41)
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
CC: Andrew Cooper <andrew.coop...@citrix.com>
CC: George Dunlap <george.dun...@eu.citrix.com>
CC: Ian Jackson <ian.jack...@eu.citrix.com>
CC: Jan Beulich <jbeul..
2017-03-21 16:59 GMT+08:00 Dario Faggioli <dario.faggi...@citrix.com>:
> On Tue, 2017-03-21 at 16:43 +0800, Zhongze Liu wrote:
>> This allows downstreams to set their defaults without modifying the
>> source code
>> all over the place. Also probably useful for the e
der command line will be ignored, which will be useful to work around
>> broken bootloaders. A wrapper to the original
>> common/kernel.c:cmdline_parse()
>> was introduced to complete this task.
>>
>> This allows downstreams to set their defaults without modifying the source
>> cod
otloaders. A wrapper to the original common/kernel.c:cmdline_parse()
was introduced to complete this task.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Reviewed-by: Jan Beulich <jbeul...@suse.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
Cc: Andrew Cooper
2017-03-21 17:30 GMT+08:00 Dario Faggioli <dario.faggi...@citrix.com>:
> On Tue, 2017-03-21 at 17:17 +0800, Zhongze Liu wrote:
> :
>> > On Tue, 2017-03-21 at 16:43 +0800, Zhongze Liu wrote:
>> > >
>> Added 2 new config entries in common/Kconfig:
nd now I'm trying to develop a good taste of
commit messages.
I'm still learning things, so please do continue to point out my
problems if you find any. I
sincerely appreciate all the things I've learned here so far. Thanks.
Cheers.
Zhongze Liu.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
bootloaders. A wrapper to the original common/kernel.c:cmdline_parse()
was introduced to complete this task.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Reviewed-by: Jan Beulich <jbeul...@suse.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
Cc: Andrew Cooper <andrew.c
place. Also probably useful for the embedded space.
(See Also: https://xenproject.atlassian.net/browse/XEN-41)
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Ian Jackson <ian.jack
2017年3月22日星期三,Stefano Stabellini <sstabell...@kernel.org> 写道:
> On Tue, 21 Mar 2017, Wei Liu wrote:
> > On Wed, Mar 22, 2017 at 12:41:01AM +0800, Zhongze Liu wrote:
> > > This allows downstreams to set their defaults without modifying the
> source code
> > &g
's anymore.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Changed since v3:
* Remove the CMDLINE_BOOL option.
* Make the option CMDLINE_OVERRIDE depend on EXPERT = "y".
* Move the CMDLINE-related code from various /xen/$(ARCH)/setup.c's to
common/kernel.c:cm
>2017-03-13 19:52 GMT+08:00 Jan Beulich :
@@ -1566,14 +1557,14 @@ void __init noreturn __start_xen(unsigned long
mbi_p)
/* Grab the DOM0 command line. */
cmdline = (char *)(mod[0].string ? __va(mod[0].string) : NULL);
-if ( (cmdline
2017-03-10 23:03 GMT+08:00 Jan Beulich :
On 09.03.17 at 04:13, wrote:
>> If CMDLINE is set, the cmdline_parse() routine will append the bootloader
>> command line to this string, forming the complete command line
>> before parsing.
>
> I disagree to
2017-03-06 19:42 GMT+08:00 Jan Beulich <jbeul...@suse.com>:
>>>> On 06.03.17 at 12:38, <julien.gr...@arm.com> wrote:
>
>>
>> On 06/03/17 11:32, Jan Beulich wrote:
>>>>>> On 06.03.17 at 12:15, <julien.gr...@arm.com> wrote:
>>>
efaults
>> without modifying the source code all over the place.
>> Also probably useful for the embedded space.
>>
>> See Also:
>> https://xenproject.atlassian.net/projects/XEN/issues/XEN-41?filter=allopenissues
>
> If you are going to include this URL, please drop th
for the embedded space.
See Also:
https://xenproject.atlassian.net/projects/XEN/issues/XEN-41?filter=allopenissues
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Changed since v1:
* Added the missing CMDLINE_OVERRIDE config entry.
* Combined built-in and boot loader command lines in
will be useful to work around broken bootloaders.
This allows downstreams to set their defaults
without modifying the source code all over the place.
Also probably useful for the embedded space.
See Also: https://xenproject.atlassian.net/browse/XEN-41
Signed-off-by: Zhongze Liu <blacksk...@gmail.
Thanks for your time reviewing my code.
2017-03-07 17:36 GMT+08:00 Jan Beulich :
On 07.03.17 at 09:34, wrote:
>
> As an initial remark: Am I right in guessing that you manually prefix
> [Xen-devel] to your message subject? Please don't do so -
So, taking all of the conversations above into consideration, the
following changes
should be done to this patch:
1. According to Andrew and Jan's suggestions, I'll remove the
CMDLINE_BOOL option,
and deal with CMDLINE without the #ifdef-ary's.
2. Make the option CMDLINE_OVERRIDE depends on
bootloaders. A wrapper to the original common/kernel.c:cmdline_parse()
was introduced to complete this task.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Reviewed-by: Jan Beulich <jbeul...@suse.com>
Reviewed-by: Stefano Stabellini <sstabell...@kernel.org>
Cc: Andrew Cooper <andrew.c
se being unconditional.
>
After doing a full clean and making it again. I got the same error message.
This seems to be a huge mistake. I've now changed the "depends on" into a
conditional prompt, and have done both EXPERT and non-EXPERT build
again (with a full clean every time before building). So this time it shouldn't
report this error again. But anyway, please do test it out again.
Cheers.
Zhongze Liu.
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
2017-03-21 22:27 GMT+08:00 Jan Beulich :
On 21.03.17 at 12:18, wrote:
>> --- a/xen/common/Kconfig
>> +++ b/xen/common/Kconfig
>> @@ -237,4 +237,26 @@ config FAST_SYMBOL_LOOKUP
>> The only user of this is Live patching.
>>
>> If unsure,
her friends when data is
available in the shared memory or when the data in the shared memory is
consumed. The channel could be built upon PPI or SGI.
[See also:
https://wiki.xenproject.org/wiki/Outreach_Program_Projects#Share_a_page_in_memory_from_the_VM_config_file]
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi,
I should have mentioned that this RFC only adds support to the x86 side.
Sorry for that.
Cheers,
Zhongze Liu
2017-08-04 10:20 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> This series implements the new xl config entry proposed in [1]. Users can use
> the new config entry t
Add a new structure to the IDL famliy to represent static shared memory regions,
as proposed in the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Z
areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Jan Beulich <jbeul...@suse.com>
Cc
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc:
roject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Jan Beulich <jbeul..
VMs from xl config
files:
https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Cheers,
Zhongze Liu (4):
libxl: introduce a new structure to represent static shared memory
regions
libxl:xl: add parsing code to parse "libxl_static_sshm" from xl config
by multiplying them
with @granularity. For example, if begin=0x100 and granularity=4k then the
shared space will begin at the address 0x10.
Cheers,
Zhongze Liu
2017-07-18 20:10 GMT+08:00 Julien Grall <julien.gr...@arm.com>:
> Hi,
>
>
> On 20/06/17 18:18,
Hi Stefano,
I missed some of your comments in the last reply. adding responses to them.
2017-07-20 2:47 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>>
>> 1. Motiv
Implement the prot, x86_* and arm_* memory attribute options.
Set up a notification channel between domains who are communicating through
shared memory regions, this allows one vm to signal her friends when data is
available in the shared memory or w
Forget to restrict the possible values of begin/end.
2017-07-19 2:30 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
>
> 1. Motivation and Description
>
> Virtual machin
to allow setting up shared memory areas between VMs from
xl config file,
https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg01741.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Cc: Wei Liu <wei.l...@citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.c
2017-07-20 9:43 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> Hi Stefano,
>
> 2017-07-20 3:24 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
>> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>>> Add a new struct libxl_static_shm in the libxl IDL for
2017-07-20 2:47 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>>
>> 1. Motivation and Description
>>
>>
Hi Stefano,
2017-07-20 3:24 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 19 Jul 2017, Zhongze Liu wrote:
>> Add a new struct libxl_static_shm in the libxl IDL for the proposed new xl
>> config entry 'static_shm' (see [1]), which allow the user to set up s
DOMCTL_memattrs_op : a new DOMCTL to play with stage-2 page attributes
Zhongze Liu <blacksk...@gmail.
Hi Stefano,
Added Julien and removed those who are mistakenly Cc'ed:-)
will never try to draft emails half asleep again.
2017-07-01 5:48 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Sat, 1 Jul 2017, Zhongze
It seems that I fed the wrong patch to scripts/get_maintainers.pl.
Sorry for mistakenly Cc'ing George, Konrad, and Tim. Apologies for this sudden
mail in your inbox.
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https
2017-07-01 17:16 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> Hi Stefano,
>
> Added Julien and removed those who are mistakenly Cc'ed:-)
> will never try to draft emails half asleep again.
>
> 2017-07-01 5:48 GMT+08:00 Stefano Stabellini <sstabell...@kernel.
Hi Julien,
2017-07-03 19:16 GMT+08:00 Julien Grall <julien.gr...@arm.com>:
> Hi,
>
> On 01/07/17 10:16, Zhongze Liu wrote:
>>>
>>> On the ARM side, we are missing BUFFERABLE and WRITEALLOC. I don't know
>>> how they map to these tags, which comes from t
on the usage of this
interface, so I turned to the implementation in
xen/common/mem_access.c, where I see this
interface invoking p2m_set_mem_acess, which further invokes
set_mem_acess and finally
p2m->set_entry(), so I guess this might be the right interface to use.
To confirm the guess, I
Hi Wei,
Thank you for reviewing my patch.
2017-08-04 23:20 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> I skim through this patch and have some questions.
>
> On Fri, Aug 04, 2017 at 10:20:25AM +0800, Zhongze Liu wrote:
>> +
>> +static int libxl__sshm_add_master(li
missing @prot flags and @cache_policy options.
Set up a notification channel between domains who are communicating through
shared memory regions, this allows one vm to signal her friends when data is
available in the shared memory or when the data in the shared memory is
consumed. The channel could
2017-08-08 18:49 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Sat, Aug 05, 2017 at 01:26:37AM +0800, Zhongze Liu wrote:
>> Hi Wei,
>>
>> Thank you for reviewing my patch.
>>
>> 2017-08-04 23:20 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
>>
2017-08-08 18:56 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Tue, Aug 08, 2017 at 11:49:35AM +0100, Wei Liu wrote:
>> On Sat, Aug 05, 2017 at 01:26:37AM +0800, Zhongze Liu wrote:
>> > Hi Wei,
>> >
>> > Thank you for reviewing my patch.
>>
2017 at 09:03:15PM +0800, Zhongze Liu wrote:
>> > >
>> > > 1. Motivation and Description
>> >
>> > Hi,
>> >
>> > I think this looks qui
been done, so I'm separating this patch
out to serve
as a place to discuss this problem.
For this GSoC project, I would also ask if there is any temporary workaround.
While waiting for any further suggestions and answers, I'll continue
to work on the ARM side.
Cheers,
Zhongze Liu
2017-08-04 21:27
This is for the proposal "Allow setting up shared memory areas between VMs
from xl config file". See:
https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Then plan is to use XENMEM_add_to_physmap_batch to map the shared pages from
one domU to another and use
er and use XENMEM_remove_from_physmap to cancel the sharing.
A wrapper to XENMEM_add_to_physmap_batch was added in the following commit:
commit 20e725e9364cff4a29945f66986ecd88cca8743d
Now add the wrapper to XENMEM_remove_from_physmap.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Ian J
Hi Stefano,
2017-08-23 5:42 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> Add libxl__sshm_add to map shared pages from one DomU to another, The mapping
>> process involves the follwing steps:
>>
>> * Set defa
Hi Stefano,
2017-08-23 4:05 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> Add a new structure to the IDL famliy to represent static shared memory
>> regions,
> ^ family
>
>
Hi Stefano,
2017-08-23 3:58 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> The original xsm_map_gmfn_foregin policy checks if source domain has the
>> proper
>> privileges over the target domain. Under th
Hi Stefano,
2017-08-23 5:31 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Wed, 23 Aug 2017, Zhongze Liu wrote:
>> Add libxl__sshm_del to Unmap static shared memory areas mapped by
>> libxl__sshm_add during domain creation. The unmapping process is:
>&g
.
This is for the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: J
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc:
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Wei Liu <wei.l...@citrix.com>
Cc: Stefano Stabellini <sstabell..
Add a new structure to the IDL famliy to represent static shared memory regions,
as proposed in the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Z
/p2m.c:p2m_add_foregin for more details).
This is for the proposal "Allow setting up shared memory areas between VMs
from xl config file" (see [1]).
[1] https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Andrew Coo
VMs from xl config
file:
https://lists.xenproject.org/archives/html/xen-devel/2017-07/msg03047.html
Cheers,
Zhongze Liu (6):
libxc: add xc_domain_remove_from_physmap to wrap
XENMEM_remove_from_physmap
libxl: introduce a new structure to represent static shared memory
regions
er and use XENMEM_remove_from_physmap to cancel the sharing.
A wrapper to XENMEM_add_to_physmap_batch was added in the following commit:
commit 20e725e9364cff4a29945f66986ecd88cca8743d
Now add the wrapper to XENMEM_remove_from_physmap.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Reviewed-by: St
ding through my proposal.
>
> On Sat, May 13, 2017 at 01:01:39AM +0800, Zhongze Liu wrote:
>> Hi, Xen developers,
>>
>> I'm Zhongze Liu, a GSoC student of this year. Glad to meet you in the
>> Xen Project. As an initial step to implementing my GSoC proposal, which
>&
Hi, Xen developers,
I'm Zhongze Liu, a GSoC student of this year. Glad to meet you in the
Xen Project. As an initial step to implementing my GSoC proposal, which
is still a draft, I'm posting it here. And hope to hear from you your
suggestions
GCC 7.1.1 complains that several buffers passed to snprintf() in xenpmd
and tools/ocmal/xc are too small to hold the largest possible resulting string.
enlarge the size of these buffers to fix the warnings.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
CC: David Scott <d...@r
Hi Ian,
Thanks for pointing out the problems. I've consulted several
maintainers about this
and have drafted a new patch for it (in a new [patch v2] thread).
Please have a look
at it. Thanks.
Cheers,
Zhongze Liu.
2017-06-12 20:31 GMT+08:00 Ian Jackson <ian.jack...@eu.citrix.com>:
> Zh
Hi Wei,
Thank you for your valuable comments.
2017-06-21 23:09 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Wed, Jun 21, 2017 at 01:18:38AM +0800, Zhongze Liu wrote:
>>
>> 1. Motiv
is to use XENMEM_add_to_physmap_batch in xl to map foregin pages from
one DomU to another so that the page could be shared. But currently there is no
wrapper for XENMEM_add_to_physmap_batch in libxc, so we just add a wrapper for
it.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Changed Since v2:
*
caching attributes,
with the rest left to
the to-be-done list.
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Wei,
2017-06-21 23:44 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Wed, Jun 21, 2017 at 01:29:26AM +0800, Zhongze Liu wrote:
>> This is a preparation for the proposal "allow setting up shared memory areas
>> between VMs from xl config file". See:
>> V2: ht
Hi Julien,
2017-06-21 1:29 GMT+08:00 Julien Grall <julien.gr...@arm.com>:
> Hi,
>
> Thank you for the new proposal.
>
> On 06/20/2017 06:18 PM, Zhongze Liu wrote:
>>
>> In the example above. A memory area ID1 will be shared between vm1 and
>> vm2.
>>
is to use XENMEM_add_to_physmap_batch in xl to map foregin pages from
one DomU to another so that the page could be shared. But currently there is no
wrapper for XENMEM_add_to_physmap_batch in libxc, so we just add a wrapper for
it.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Changed Since v1:
n memory attributes like cacheability
and shareability.
Indications of where in the host physical memory should we get the backing
memory from.
Set up a notification channel between domains who are communicating through
shared memory regions, this allows one vm to signal her friends when data is
a
grants api as the final implementation choice.
This list might be incomplete. Please tell me if I missed or misunderstand any
important information.
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
the work is technically common
>> > though, I don't see any downsides on enabling it on x86 on the off
>> > chance that somebody will find it useful. However, if you prefer to
>> > keep it ARM only, that's fine by me too.
>>
>> I don't have a preference either way, but if you do it in an arch-neutral
>> way, then the manifestation of the frame numbers also needs to be
>> arch-neutral, in which case DT is not a suitable vehicle.
>
> Makes sense.
>
I agree with this, I'll take this into consideration in the next version of
this proposal.
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
in the frontend / backend model. The
> frontend needs to trust backend to a certain degree. A user knows what
> to expect or do if one side misbehaves.
>
> But the way this proposal is phrased is that this is to construct a
> communication channel, i.e. it reads to me from a us
Hi Wei Liu,
Thanks for your review and approval.
Then I'll revise my proposal according to these conclusions.
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
an XENMEMSPACE_gmfn_range-
call. Is it a mistake or is it intentionally done so?
Cheers,
Zhongze Liu
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
Hi Wei,
2017-06-14 22:42 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Wed, Jun 14, 2017 at 09:19:23PM +0800, Zhongze Liu wrote:
>> Hi Xen developers,
>>
>> In tools/libxc/xc_domain.c:xc_domain_add_to_physmap() the .size field
>> of the xen_add_to_phys
I didn't saw your mail. Sorry.
2017-06-14 23:13 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> 2017-06-14 22:42 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
>> On Wed, Jun 14, 2017 at 09:19:23PM +0800, Zhongze Liu wrote:
>>> Hi Xen deve
2017-06-14 22:42 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Wed, Jun 14, 2017 at 09:19:23PM +0800, Zhongze Liu wrote:
>> Hi Xen developers,
>>
>> In tools/libxc/xc_domain.c:xc_domain_add_to_physmap() the .size field
>> of the xen_add_to_physmap
>> s
;%d: %s: %s", error->code,
^~
xenctrl_stubs.c:64:4: note: ‘snprintf’ output 5 or more bytes (assuming 1028)
into a destination of size 256
Enlarge the size of these buffers as suggested by the complier
(and slightly rounded) to fix the warnings.
No functional changes.
Signed-off-by: Zhongze Liu <
both @space and @size are
uint16_t, so I think
I should have made @space uint16_t, too. I'll fix this. Or do you have
any good reasons to
make both of them unsigned int?
>
>> + xen_ulong_t *idxs,
>> +
2017-06-16 17:36 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> Hi Jan,
>
>
> 2017-06-16 16:45 GMT+08:00 Jan Beulich <jbeul...@suse.com>:
>>>>> On 16.06.17 at 06:55, <blacksk...@gmail.com> wrote:
>>> currently there is no wrapper for XENMEM_
Hi Ian,
2017-06-16 17:36 GMT+08:00 Ian Jackson <ian.jack...@eu.citrix.com>:
> Zhongze Liu writes ("Re: questions on mem_sharing_op*'s and
> tools/tests/mem-sharing/memshrtool"):
>> 2017-06-16 11:50 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
>> &
Hi Ian,
2017-06-16 17:36 GMT+08:00 Ian Jackson <ian.jack...@eu.citrix.com>:
> Zhongze Liu writes ("Re: questions on mem_sharing_op*'s and
> tools/tests/mem-sharing/memshrtool"):
>> 2017-06-16 11:50 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
>> &
c_dom "
"./memshrtool enable dst_dom"
"./memshrtool nominate src_dom 0"
And it failed with an "error executing xc_memshr_nominate_gfn(xch,
domid, gfn, ): Argument list too long "
But when I changed the gfn from 0 to 1000, it succeeds. Is there any
restrition on the gf
2017-06-16 11:50 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> Hi there,
>
> I was experimenting with the mem_sharing_op and I found a handy tool:
> tools/tests/mem-sharing/memshrtool
> I set up two bare metal x86_64 VMS running some simple code in 16-bit
> real m
currently there is no wrapper for XENMEM_add_to_physmap_batch in libxc.
add a wrapper to do that.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
Cc: Ian Jackson <ian.jack...@eu.citrix.com>,
Cc: Wei Liu <wei.l...@citrix.com>,
Cc: Stefano Stabellini <sstabell...@kernel.
2017-06-16 17:44 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
> 2017-06-16 17:36 GMT+08:00 Zhongze Liu <blacksk...@gmail.com>:
>> Hi Jan,
>>
>>
>> 2017-06-16 16:45 GMT+08:00 Jan Beulich <jbeul...@suse.com>:
>>>>>> On
Hi Wei Liu,
2017-06-12 19:21 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Mon, Jun 12, 2017 at 12:19:42PM +0100, Wei Liu wrote:
>> On Mon, Jun 12, 2017 at 06:40:33PM +0800, Zhongze Liu wrote:
>> > Hi Xen developers,
>> >
>> > Several -Wimplicit-fallth
replace several snprintf with asprintf in xenpmd and tools/ocmal/xc
to fix the "format-truncation" errors caused by incorrect size of buffers.
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
---
CC: David Scott <d...@recoil.org>
CC: Ian Jackson <ian.jack...@eu.citri
Hi Xen developers,
Several -Wimplicit-fallthrough were found under
tools/firmware/etherboot/ipxe with GCCv7.1.1.
I'm not sure whether this is the right place to report this since it's
not part of the xen source tree,
But I think I'd better let you know.
Cheers,
Zhongze Liu
Hi Wei & Ian,
2017-06-13 18:52 GMT+08:00 Wei Liu <wei.l...@citrix.com>:
> On Tue, Jun 13, 2017 at 11:19:58AM +0100, Ian Jackson wrote:
>> Zhongze Liu writes ("[PATCH v2] tools: fix several "format-truncation"
>> warnings with GCC 7"):
>>
it within
the following one week or so.
Sorry again for failing to schedule my time effectively.
Cheers,
Zhongze Liu.
2017-10-11 7:55 GMT+08:00 Stefano Stabellini <sstabell...@kernel.org>:
> On Sun, 27 Aug 2017, Zhongze Liu wrote:
>> This series implements the new xl config entry
e irc log from a discussion with Julien on
#xendevel, where Julien said:
blackskygg: I think you want to pass the current domain in
parameter, i.e having 3 domains argument.
because your solution only works when XSM is not enabled (this is
the dummy callback)
when XSM is enabled, the policy would be specificed by the administrator
he needs to be able to know which domain was doing the configuration.
Cheers,
Zhongze Liu
>
> Jan
>
___
Xen-devel mailing list
Xen-devel@lists.xen.org
https://lists.xen.org/xen-devel
8/msg03242.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Wei Liu <wei.l...@citrix.com>
Cc: Stefano Stabellini <sstabell...@kernel.org>
Cc: Julien Grall <julien.gr...@arm.com>
Cc: xen-devel@lists.xen.org
---
[1] https://lists.xen.org/archives/html/xen-devel/2017-08/msg03242.html
Signed-off-by: Zhongze Liu <blacksk...@gmail.com>
Cc: Andrew Cooper <andrew.coop...@citrix.com>
Cc: George Dunlap <george.dun...@eu.citrix.com>
Cc: Ian Jackson <ian.jack...@eu.citrix.com>
Cc: Jan Beul
1 - 100 of 128 matches
Mail list logo