Displaying 17 results from an estimated 17 matches for "getdomaininfo".
2005 May 08
2
semantics of GETDOMAININFO
One of the things that I''ve always thought was weird, but didn''t pay
too close attention to is the fact that GETDOMAININFO will return a
valid result even if we give it a domid that is no longer valid.
Looking at the code we get back the first valid domain after the domid
we pass in.
What is the reason for this design choice? When I request the
attributes of a process I don''t get the attributes for the next p...
2012 Nov 28
0
[PATCH v8 2/2] tools: XENMEM_claim_pages (subop of existing) hypercall
...| 1 +
2 files changed, 2 insertions(+)
diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c
index d98e68b..6d06f7c 100644
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -234,6 +234,7 @@ int xc_domain_getinfo(xc_interface *xch,
info->ssidref = domctl.u.getdomaininfo.ssidref;
info->nr_pages = domctl.u.getdomaininfo.tot_pages;
+ info->nr_unclaimed_pages = domctl.u.getdomaininfo.unclaimed_pages;
info->nr_shared_pages = domctl.u.getdomaininfo.shr_pages;
info->nr_paged_pages = domctl.u.getdomaininfo.paged_pages;...
2012 Sep 04
2
[PATCH] valgrind: Support for ioctls used by Xen toolstack processes.
..._sysctl, \
+ (Addr)&sysctl->u._union._field, \
+ sizeof(sysctl->u._union._field))
+#define PRE_XEN_SYSCTL_READ(_sysctl, _field) \
+ __PRE_XEN_SYSCTL_READ(_sysctl, _sysctl, _field)
+
+ switch (sysctl->cmd) {
+ case XEN_SYSCTL_getdomaininfolist:
+ PRE_XEN_SYSCTL_READ(getdomaininfolist, first_domain);
+ PRE_XEN_SYSCTL_READ(getdomaininfolist, max_domains);
+ PRE_XEN_SYSCTL_READ(getdomaininfolist, buffer);
+ break;
+
+ case XEN_SYSCTL_cpupool_op:
+ PRE_XEN_SYSCTL_READ(cpupool_op, op);
+
+ switch(sysctl->...
2012 Nov 15
1
[RFC/PATCH v4] XENMEM_claim_pages (subop of existing) hypercall
...s changed, 205 insertions(+), 8 deletions(-)
diff --git a/tools/libxc/xc_domain.c b/tools/libxc/xc_domain.c
index d98e68b..6d06f7c 100644
--- a/tools/libxc/xc_domain.c
+++ b/tools/libxc/xc_domain.c
@@ -234,6 +234,7 @@ int xc_domain_getinfo(xc_interface *xch,
info->ssidref = domctl.u.getdomaininfo.ssidref;
info->nr_pages = domctl.u.getdomaininfo.tot_pages;
+ info->nr_unclaimed_pages = domctl.u.getdomaininfo.unclaimed_pages;
info->nr_shared_pages = domctl.u.getdomaininfo.shr_pages;
info->nr_paged_pages = domctl.u.getdomaininfo.paged_pages;...
2005 Aug 08
1
[PATCH] Fix domain CPU time calculation to count all VCPU times correctly
Currently, the getdomaininfo function (used to fill in a
dom0_getdomaininfo_t for a domain) calculates a domain''s total CPU time
from its VCPU times using the code:
if ( v->cpu_time > cpu_time )
cpu_time += v->cpu_time;
This causes a VCPU''s time to only be counted if it is greater...
2005 Aug 30
10
[RFC] Switching store to use domain id''s for keys
...in ids instead
of UUIDs for the paths? In a cluster we could just use
<nodeid>/domain/<domid> for unique identification.
Or, if we really want to use UUIDs in the node path, perhaps we can add
UUIDs to the domain structure in the hypervisor so that we can actually
query it through getdomaininfo?
Regards,
Anthony Liguori
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xensource.com
http://lists.xensource.com/xen-devel
2005 May 31
0
[PATCH] Store page and evtchn in start_info_t
...unsigned int store_evtchn,
+ unsigned long *store_mfn)
{
dom0_op_t launch_op, op;
int initrd_fd = -1;
@@ -381,7 +392,8 @@
&vstartinfo_start, &vkern_entry,
ctxt, cmdline,
op.u.getdomaininfo.shared_info_frame,
- control_evtchn, flags, vcpus) < 0 )
+ control_evtchn, flags, vcpus,
+ store_evtchn, store_mfn) < 0 )
{
ERROR("Error constructing guest OS");
goto error_out;
@@ -412,7 +424,7...
2013 Feb 13
4
[PATCH 0/3] FLASK policy build rework
These patches update the example FLASK policy shipped with Xen and
enable its build if the required tools are present. The third patch
requires rerunning autoconf to update tools/configure.
[PATCH 1/3] flask/policy: sort dom0 accesses
[PATCH 2/3] flask/policy: rework policy build system
[PATCH 3/3] tools/flask: add FLASK policy to build
2007 Jan 11
0
[PATCH 6/8] HVM save restore: guest memory handling
...;
+ return 1;
+ }
+
+
+ p2m = malloc(max_pfn * sizeof(xen_pfn_t));
+
+ if (p2m == NULL) {
+ ERROR("memory alloc failed");
+ errno = ENOMEM;
+ goto out;
+ }
+
+ /* Get the domain''s shared-info frame. */
+ domctl.cmd = XEN_DOMCTL_getdomaininfo;
+ domctl.domain = (domid_t)dom;
+ if (xc_domctl(xc_handle, &domctl) < 0) {
+ ERROR("Could not get information on new domain");
+ goto out;
+ }
+ shared_info_frame = domctl.u.getdomaininfo.shared_info_frame;
+
+ if(xc_domain_setmaxmem(xc_handle, dom, PF...
2006 Jun 24
4
AMD64 AM2 supports Windows XP?
Hi,
i consider to buy a new PC for my Desktop. Now i need Windows for do
some work with Photoshop. I would like to buy a AMD X2 4200 with Socket
AM2 and the new Pacifica.
Supports XEN this CPU together with windows nativly? How fast Windows
will works with SDL? Could i use 32bit color deep with SDL? I use fast
SATA-Raid with a lot of RAM 4GB ontop of Gentoo Linux
Hope someone could answer
2007 Aug 28
6
[PATCH] Make XEN_DOMCTL_destroydomain hypercall continuable.
...al_virq(dom0, VIRQ_DOM_EXC);
+ case DOMDYING_dead:
+ break;
+ }
+
+ return rc;
}
diff -r 58d131f1fb35 -r 2c9db26f1d0e xen/common/domctl.c
--- a/xen/common/domctl.c Fri Aug 24 16:32:56 2007 +0100
+++ b/xen/common/domctl.c Tue Aug 28 13:06:41 2007 +0900
@@ -114,10 +114,10 @@ void getdomaininfo(struct domain *d, str
info->cpu_time = cpu_time;
info->flags = flags |
- (d->is_dying ? XEN_DOMINF_dying : 0) |
- (d->is_shut_down ? XEN_DOMINF_shutdown : 0) |
- (d->is_paused_by_controller ? XEN_DOMINF_paused : 0) |
-...
2005 Sep 30
14
pdb missing files?
Hello,
I''m trying to get PDB working in accordance with the instructions at
http://www.cl.cam.ac.uk/~sos22/replay.bk/docs/misc/XenDebugger-HOWTO and
a message from this list:
http://lists.xensource.com/archives/html/xen-devel/2004-08/msg00017.html
When I try to build pdb I first get errors because the Makefile is
configured to treat warnings as errors, and there are some warnings.
2006 Dec 01
0
[PATCH 3/10] Add support for netfront/netback acceleration drivers
..._guest)
+ uint32_t flags;
+};
+typedef struct xen_domctl_createdomain xen_domctl_createdomain_t;
+DEFINE_XEN_GUEST_HANDLE(xen_domctl_createdomain_t);
+
+#define XEN_DOMCTL_destroydomain 2
+#define XEN_DOMCTL_pausedomain 3
+#define XEN_DOMCTL_unpausedomain 4
+
+#define XEN_DOMCTL_getdomaininfo 5
+struct xen_domctl_getdomaininfo {
+ /* OUT variables. */
+ domid_t domain; /* Also echoed in domctl.domain */
+ /* Domain is scheduled to die. */
+#define _XEN_DOMINF_dying 0
+#define XEN_DOMINF_dying (1U<<_XEN_DOMINF_dying)
+ /* Domain is an HVM guest (as...
2005 Aug 30
4
Re: [Xen-changelog] New console transport and update xenconsoled.
...tore_mfn,
>+ unsigned int console_evtchn,
>+ unsigned long *console_mfn)
> {
> dom0_op_t launch_op, op;
> int initrd_fd = -1;
>@@ -707,7 +720,8 @@
> &vstack_start, ctxt, cmdline,
> op.u.getdomaininfo.shared_info_frame,
> control_evtchn, flags, vcpus,
>- store_evtchn, store_mfn) < 0 )
>+ store_evtchn, store_mfn,
>+ console_evtchn, console_mfn) < 0 )
> {
> ERROR("Error constructing guest OS...
2012 Jan 25
26
[PATCH v4 00/23] Xenstore stub domain
...- migration support when using split xenstored (untested, should work)
- slightly less intrusive NO_SOCKETS xenstored patch
(still has many ifdefs to avoid pulling in socket headers or symbols)
- virq handlers removed from dying domain when clearing event channels
- dummy XSM module restricts getdomaininfo similar to no-XSM case
- formatting/type fixups
- partial ioctl compatibility with legacy IOCTL_XENBUS_ALLOC
To start xenstored, run:
tools/xenstore/init-xenstore-domain stubdom/mini-os-x86_64-xenstore/mini-os 20 system_u:system_r:domU_t
This will populate the xenstore domid key /tool/xenstore...
2012 Jan 31
26
[PATCH 00/10] FLASK updates: MSI interrupts, cleanups
This patch set adds XSM security labels to useful debugging output
locations, and fixes some assumptions that all interrupts behaved like
GSI interrupts (which had useful non-dynamic IDs). It also cleans up the
policy build process and adds an example of how to use the user field in
the security context.
Debug output:
[PATCH 01/10] xsm: Add security labels to event-channel dump
[PATCH 02/10] xsm:
2013 Sep 23
57
[PATCH RFC v13 00/20] Introduce PVH domU support
This patch series is a reworking of a series developed by Mukesh
Rathor at Oracle. The entirety of the design and development was done
by him; I have only reworked, reorganized, and simplified things in a
way that I think makes more sense. The vast majority of the credit
for this effort therefore goes to him. This version is labelled v13
because it is based on his most recent series, v11.