WARNING - OLD ARCHIVES

This is an archived copy of the Xen.org mailing list, which we have preserved to ensure that existing links to archives are not broken. The live archive, which contains the latest emails, can be found at http://lists.xen.org/
   
 
 
Xen 
 
Home Products Support Community News
 
   
 

xen-devel

Re: [Xen-devel] netif & grant tables

To: Matt Chapman <matthewc@xxxxxx>
Subject: Re: [Xen-devel] netif & grant tables
From: Stefan Berger <stefanb@xxxxxxxxxx>
Date: Fri, 1 Jul 2005 16:29:20 -0400
Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
Delivery-date: Fri, 01 Jul 2005 20:28:15 +0000
Envelope-to: www-data@xxxxxxxxxxxxxxxxxxx
In-reply-to: <20050701022854.GA32494@xxxxxxxxxxxxxxx>
List-help: <mailto:xen-devel-request@lists.xensource.com?subject=help>
List-id: Xen developer discussion <xen-devel.lists.xensource.com>
List-post: <mailto:xen-devel@lists.xensource.com>
List-subscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=subscribe>
List-unsubscribe: <http://lists.xensource.com/cgi-bin/mailman/listinfo/xen-devel>, <mailto:xen-devel-request@lists.xensource.com?subject=unsubscribe>
Sender: xen-devel-bounces@xxxxxxxxxxxxxxxxxxx
xen-devel-bounces@xxxxxxxxxxxxxxxxxxx wrote on 06/30/2005 10:28:54 PM:

> Hi,
> 
> I'm currently looking at getting domU networking working
> on IA64, and to do this I need to make netback/netfront
> use grant tables.

You *probably* won't get this to work right out of the box. On i386 it 
fails due to dom Us not becoming privileged and so a check like IS_PRIV() 
fails in xen/common/grant_table.c line 692 and probably somewhere else 
also. The question is how this should be fixed. Should the HV call to 
create a domain receive an additional parameter including flags that 
should be set in a domain, such as for example the _DOMF_privileged? 
Currently this flag only seems to be set in one place for dom 0.

The quick fix is:
add 
        set_bit(_DOMF_privileged, &d->domain_flags) 

before the 'return d' in do_createdomain() in xen/common/domain.c -> it 
will make all domains privileged 

To compile the backends into a domU I had to activate 
CONFIG_XEN_PRIVILGED_GUEST and CONFIG_XEN_PHYSDEV_ACCESS in the .config 
file of the dom U kernel for having alloc_empty_lowmem_region() compiled 
into th kernel (arch/xen/i386/mm/hypervisor.c). Is this call to 
alloc_empty_lowmem_region() necessary or would another memory allocation 
routine work as well. All the backends seem to use it, though.

   Stefan
 
> 
> I'm told that there's already a patch floating around,
> can someone tell me where to find it?
> 
> Matt
> 
> _______________________________________________
> Xen-devel mailing list
> Xen-devel@xxxxxxxxxxxxxxxxxxx
> http://lists.xensource.com/xen-devel


_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xen-devel