The max number of slots used in xennet_get_responses() is set to
MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD).
In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This
difference is resulting in frequent messages "too many slots" and a
reduced network throughput for some workload
This run is configured for baseline tests only.
flight 74855 ovmf real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74855/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a05a8a5aa17da4bc7144706a9931d68beec1a61f
baseline v
On 11/06/18 20:59, Boris Ostrovsky wrote:
> On 06/11/2018 03:57 AM, Juergen Gross wrote:
>> The max number of slots used in xennet_get_responses() is set to
>> MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD).
>>
>> In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This
>> differenc
flight 74842 distros-debian-sid real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74842/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-amd64-sid-netboot-pvgrub 11 guest-start fail blocked in 74777
test-amd64-i386-i386-sid-net
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, June 9, 2018 2:49 AM
>
> Intel hardware only uses 4 bits in MSR_EFER. Changes to LME and LMA are
> handled automatically via the VMENTRY_CTLS.IA32E_MODE bit.
>
> SCE is handled by ad-hoc logic in context_switch(),
> vmx_r
This run is configured for baseline tests only.
flight 74841 xen-4.9-testing real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74841/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-debianhvm-amd64 15
When xenbus_printf fails, the lack of error-handling code may
cause unexpected results.
This patch adds error-handling code after calling xenbus_printf.
Signed-off-by: Zhouyang Jia
---
drivers/scsi/xen-scsifront.c | 31 ---
1 file changed, 24 insertions(+), 7 deletio
When xenbus_printf fails, the lack of error-handling code may
cause unexpected results.
This patch adds error-handling code after calling xenbus_printf.
Signed-off-by: Zhouyang Jia
---
drivers/xen/xen-scsiback.c | 15 +--
1 file changed, 9 insertions(+), 6 deletions(-)
diff --git a
When xenbus_printf fails, the lack of error-handling code may
cause unexpected results.
This patch adds error-handling code after calling xenbus_printf.
Signed-off-by: Zhouyang Jia
---
drivers/xen/manage.c | 17 ++---
1 file changed, 14 insertions(+), 3 deletions(-)
diff --git a/dr
flight 124068 qemu-mainline real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124068/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 16 guest-localmigrate/x10 fail
REGR. vs. 123987
T
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, June 9, 2018 2:49 AM
>
> Up until this point, the MSR load/save lists have only ever accumulated
> content. Introduce vmx_del_msr() as a companion to vmx_add_msr().
>
> Signed-off-by: Andrew Cooper
Reviewd-by: Kevin Tia
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, June 9, 2018 2:49 AM
>
> Currently, the VMX_MSR_GUEST type maintains completely symmetric
> guest load
> and save lists, by pointing VM_EXIT_MSR_STORE_ADDR and
> VM_ENTRY_MSR_LOAD_ADDR
> at the same page, and setting VM_EXI
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, June 9, 2018 2:49 AM
>
> The main purpose of this change is to allow us to set a specific MSR value,
> without needing to know whether there is already a load/save list slot for it.
>
> Previously, callers wanting this pro
flight 124066 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124066/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-examine 8 reboot fail REGR. vs. 123554
test-armhf-armhf-xl
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, June 9, 2018 2:49 AM
>
> The main purpose of this patch is to only ever insert the LBR MSRs into the
> guest load/save list once, as a future patch wants to change the behaviour
> of
> vmx_add_guest_msr().
>
> The repeated
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Saturday, June 9, 2018 2:49 AM
>
> At the moment, all modifications of the MSR lists are in current context.
> However, future changes may need to put MSR_EFER into the lists from
> domctl
> hypercall context.
>
> Plumb a struct vcp
flight 124074 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124074/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-libvirt6 libvirt-buildfail REGR. vs. 124058
version targeted for testi
branch xen-unstable
xenbranch xen-unstable
job test-armhf-armhf-examine
testid reboot
Tree: linux git://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux-2.6.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemuu git://xenbits.xen.org/qemu-xen.git
Tree: xen git:/
On Tue, 5 Jun 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 04/06/18 18:24, Stefano Stabellini wrote:
> > Add a tiny kconfig configuration. Enabled NULL and Credit schedulers.
> > Support only 8 cpus. It only carries non-default options (use make
>
> I don't see where 8 CPUs would only be suppor
On Tue, 5 Jun 2018, Julien Grall wrote:
> Hi Stefano,
>
> On 04/06/18 18:24, Stefano Stabellini wrote:
> > Add a "Platform Support" choice with four kconfig options: QEMU, RCAR3,
> > MPSOC and ALL. They enable the required options for their hardware
> > platform. ALL enables all available platform
On Tue, 5 Jun 2018, Julien Grall wrote:
> Hi,
>
> On 04/06/18 18:24, Stefano Stabellini wrote:
> > Select MEM_ACCESS_ALWAYS_ON on x86 to mark that MEM_ACCESS is not
> > configurable on x86. Avoid selecting it on ARM.
> > Rename HAS_MEM_ACCESS to MEM_ACCESS everywhere. Add a prompt and a
> > descri
On Wed, 6 Jun 2018, Jan Beulich wrote:
> >>> On 05.06.18 at 19:52, wrote:
>
> >
> > On 04/06/18 18:23, Stefano Stabellini wrote:
> >> Hi all,
> >>
> >> This patch series is the first step toward building a small certifiable
> >> Xen hypervisor for ARM boards.
> >>
> >> First, the series makes
On Tue, 5 Jun 2018, Julien Grall wrote:
> During the MMU setup process, Xen will set SCTLR_EL2.WNX
> (Write-Non-eXecutable) bit. Because of that, the alternative code need
> to re-mapped the region in a difference place in order to modify the
> text section.
>
> At the moment, the function patchin
flight 124064 linux-next real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124064/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 123871
test-amd64-amd64-xl-
On Tue, 5 Jun 2018, Julien Grall wrote:
> The function ARM_SMCCC_ARCH_WORKAROUND_2 will be called by the guest for
> enabling/disabling the ssbd mitigation. So we want the handling to
> be as fast as possible.
>
> The new sequence will forward guest's ARCH_WORKAROUND_2 call to EL3 and
> also track
On Tue, 5 Jun 2018, Julien Grall wrote:
> In order to offer ARCH_WORKAROUND_2 support to guests, we need to track the
> state of the workaround per-vCPU. The field 'pad' in cpu_info is now
> repurposed to store flags easily accessible in assembly.
>
> As the hypervisor will always run with the wor
On Tue, 5 Jun 2018, Julien Grall wrote:
> As for Spectre variant-2, we rely on SMCCC 1.1 to provide the discovery
> mechanism for detecting the SSBD mitigation.
>
> A new capability is also allocated for that purpose, and a config
> option.
>
> This is part of XSA-263.
>
> Signed-off-by: Julien
On Tue, 5 Jun 2018, Julien Grall wrote:
> On a system where the firmware implements ARCH_WORKAROUND_2, it may be
> useful to either permanently enable or disable the workaround for cases
> where the user decides that they'd rather not get a trap overhead, and
> keep the mitigation permanently on or
On Tue, 5 Jun 2018, Julien Grall wrote:
> A stack is allocated per vCPU to be used by Xen. The allocation is done
> with alloc_xenheap_pages that does not zero the memory returned. However
> the top of the stack is containing information that will be used to
> store the initial state of the vCPU (s
flight 124057 xen-unstable real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124057/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-amd64-xl-qemut-win7-amd64 17 guest-stopfail like 124038
test-armhf-armhf-libvirt-xsm 14 save
On 06/11/2018 03:57 AM, Juergen Gross wrote:
> The max number of slots used in xennet_get_responses() is set to
> MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD).
>
> In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This
> difference is resulting in frequent messages "too many slo
flight 124055 linux-4.9 real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124055/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemuu-debianhvm-amd64 7 xen-bootfail REGR. vs. 122969
test-amd64-amd64-xl-s
Hi,
On 06/11/2018 06:49 PM, Oleksandr Andrushchenko wrote:
On 06/11/2018 08:46 PM, Julien Grall wrote:
Hi,
On 06/11/2018 06:16 PM, Oleksandr Andrushchenko wrote:
On 06/11/2018 07:51 PM, Stefano Stabellini wrote:
On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote:
On 06/08/2018 10:21 PM, Bor
On 06/11/2018 08:46 PM, Julien Grall wrote:
Hi,
On 06/11/2018 06:16 PM, Oleksandr Andrushchenko wrote:
On 06/11/2018 07:51 PM, Stefano Stabellini wrote:
On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote:
On 06/08/2018 10:21 PM, Boris Ostrovsky wrote:
On 06/08/2018 01:59 PM, Stefano Stabelli
Hi,
On 06/11/2018 06:16 PM, Oleksandr Andrushchenko wrote:
On 06/11/2018 07:51 PM, Stefano Stabellini wrote:
On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote:
On 06/08/2018 10:21 PM, Boris Ostrovsky wrote:
On 06/08/2018 01:59 PM, Stefano Stabellini wrote:
@@ -325,6 +401,14 @@ static
Hi Stefano,
On 06/11/2018 05:51 PM, Stefano Stabellini wrote:
On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote:
On 06/08/2018 10:21 PM, Boris Ostrovsky wrote:
On 06/08/2018 01:59 PM, Stefano Stabellini wrote:
@@ -325,6 +401,14 @@ static int map_grant_pages(struct
grant_map
*map)
This run is configured for baseline tests only.
flight 74840 xen-unstable real [real]
http://osstest.xs.citrite.net/~osstest/testlogs/logs/74840/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-xl-qemuu-win7-amd64 17 guest-stopfail blo
On Mon, Jun 11, 2018 at 03:13:23PM +0100, Ian Jackson wrote:
> osstest is going to want to call it, and should not be expected to
> fish it out of the build tree.
>
> Signed-off-by: Ian Jackson
Reviewed-by: Roger Pau Monné
Thanks
___
Xen-devel maili
On Mon, Jun 11, 2018 at 03:13:22PM +0100, Ian Jackson wrote:
> Signed-off-by: Ian Jackson
Reviewed-by: Roger Pau Monné
Thanks
___
Xen-devel mailing list
Xen-devel@lists.xenproject.org
https://lists.xenproject.org/mailman/listinfo/xen-devel
On 06/11/2018 07:51 PM, Stefano Stabellini wrote:
On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote:
On 06/08/2018 10:21 PM, Boris Ostrovsky wrote:
On 06/08/2018 01:59 PM, Stefano Stabellini wrote:
@@ -325,6 +401,14 @@ static int map_grant_pages(struct
grant_map
*map)
map-
Roger Pau Monné writes ("Re: [PATCH v2 3/8] tools: xencall, xengnttab,
xengntshr: Provide access to internal fds"):
> On Mon, Jun 11, 2018 at 03:13:19PM +0100, Ian Jackson wrote:
> > I want this to support my qemu depriv descriptor audit tool.
> >
> > Signed-off-by: Ian Jackson
> > CC: Andrew Co
On Mon, Jun 11, 2018 at 03:13:18PM +0100, Ian Jackson wrote:
> In order to support auditing of qemu depriv, my audit tool wants to
> know the fd of a privcmd handle on which it can easily make
> hypercalls. xencall provides such a handle, but has no cooked
> facilities for making hypercalls. So I
On Mon, Jun 11, 2018 at 03:13:19PM +0100, Ian Jackson wrote:
> I want this to support my qemu depriv descriptor audit tool.
>
> Signed-off-by: Ian Jackson
> CC: Andrew Cooper
Reviewed-by: Roger Pau Monné
> diff --git a/tools/libs/call/libxencall.map b/tools/libs/call/libxencall.map
> index 2f
On Mon, 11 Jun 2018, Oleksandr Andrushchenko wrote:
> On 06/08/2018 10:21 PM, Boris Ostrovsky wrote:
> > On 06/08/2018 01:59 PM, Stefano Stabellini wrote:
> > > > > > > > > > @@ -325,6 +401,14 @@ static int map_grant_pages(struct
> > > > > > > > > > grant_map
> > > > > > > > > > *map)
> > > >
flight 124058 ovmf real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124058/
Perfect :-)
All tests in this flight passed as required
version targeted for testing:
ovmf a05a8a5aa17da4bc7144706a9931d68beec1a61f
baseline version:
ovmf eb5943134630292db2c14
For the hostp2m, access_required starts off as 0, then it can be
set with xc_domain_set_access_required(). However, all the altp2ms
set it to 1 on init, and ignore both the hostp2m and the hypercall.
This patch sets access_required to the value from the hostp2m
on altp2m init, and propagates the va
flight 124052 xen-4.8-testing real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124052/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-i386-pvops 6 kernel-build fail in 123844 REGR. vs. 123091
build-armhf
These functions are no longer defined or used anywhere. The
declarations should have been deleted when the definitions were.
Signed-off-by: Ian Jackson
Acked-by: Wei Liu
Reviewed-by: Roger Pau Monné
---
tools/libxc/xc_private.h | 3 ---
1 file changed, 3 deletions(-)
diff --git a/tools/libxc
From: Ian Jackson
This series provides the support in xen.git for auditing whether qemu
file descriptors are deprivileged, as expected with libxl
dm_restrict=1.
The approach I have chosen is to fish the descriptors out of qemu (by
using debugging facilities), and try to make hypercalls etc. usin
Add mention of LIBXL_QEMU_USER_RANGE_BASE, in case that is what the
user was intending.
Cc: Anthony Perard
Signed-off-by: Ian Jackson
Acked-by: Wei Liu
Reviewed-by: Roger Pau Monné
---
tools/libxl/libxl_dm.c | 5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/tools/libxl/
Signed-off-by: Ian Jackson
---
v2: New patch
---
tools/tests/Makefile | 7 ++-
tools/tests/depriv/Makefile | 2 ++
tools/tests/mce-test/Makefile| 2 ++
tools/tests/mem-sharing/Makefile | 2 ++
tools/tests/xen-access/Makefile | 2 ++
tools/tests/xenstore/Makefile| 2 +
Signed-off-by: Ian Jackson
---
v2: New patch
---
tools/tests/depriv/depriv-fd-checker.c | 36 +-
1 file changed, 35 insertions(+), 1 deletion(-)
diff --git a/tools/tests/depriv/depriv-fd-checker.c
b/tools/tests/depriv/depriv-fd-checker.c
index 67a3674..e57390f 10
In order to support auditing of qemu depriv, my audit tool wants to
know the fd of a privcmd handle on which it can easily make
hypercalls. xencall provides such a handle, but has no cooked
facilities for making hypercalls. So I open a libxc handle. That
means I need to get the privcmd fd out of
osstest is going to want to call it, and should not be expected to
fish it out of the build tree.
Signed-off-by: Ian Jackson
---
v2: New patch
---
tools/tests/depriv/Makefile | 13 ++---
1 file changed, 10 insertions(+), 3 deletions(-)
diff --git a/tools/tests/depriv/Makefile b/tools/te
I have chosen to licence this utility as LGPL-v2.1-only, similar to
other LGPL elements of the Xen tools, because it may want to be moved
into or combined with osstest or some other project at some point in
the future, so it wants a licence compatible with osstest's AGPLv3+.
Signed-off-by: Ian Jac
I want this to support my qemu depriv descriptor audit tool.
Signed-off-by: Ian Jackson
CC: Andrew Cooper
---
v2: Fix ABI breakage.
---
tools/libs/call/core.c| 5 +
tools/libs/call/include/xencall.h | 8
tools/libs/call/libxencall.map| 6 ++
tools
Roger Pau Monné writes ("Re: [PATCH 2/4] libxc: Provide access to internal
handles"):
> On Mon, May 14, 2018 at 06:08:57PM +0100, Ian Jackson wrote:
> > +struct xencall_handle *xc_interface_xcall_handle(xc_interface *xch);
> > +struct xenforeignmemory_handle *xc_interface_fmem_handle(xc_interface
On 06/08/2018 10:21 PM, Boris Ostrovsky wrote:
On 06/08/2018 01:59 PM, Stefano Stabellini wrote:
@@ -325,6 +401,14 @@ static int map_grant_pages(struct
grant_map
*map)
map->unmap_ops[i].handle = map->map_ops[i].handle;
if (use_ptemod)
map->kunmap_o
On Mon, Jun 11, 2018 at 01:49:02PM +0200, Roger Pau Monne wrote:
> Add a note to spell out that if the address tag is not present the
> file should be loaded using the elf header.
>
> Signed-off-by: Roger Pau Monné
Reviewed-by: Daniel Kiper
If there are no objections I will apply this in a week
>>> On 11.06.18 at 12:31, wrote:
>> From: Roger Pau Monne
>> Sent: 11 June 2018 11:26
>> On Fri, Jun 08, 2018 at 04:30:30PM +0100, Paul Durrant wrote:
>> > --- a/xen/drivers/passthrough/iommu.c
>> > +++ b/xen/drivers/passthrough/iommu.c
>> > @@ -52,7 +52,7 @@ custom_param("iommu", parse_iommu_para
flight 124060 libvirt real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124060/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-amd64-libvirt 6 libvirt-buildfail REGR. vs. 123814
build-i386-libvirt
Add a note to spell out that if the address tag is not present the
file should be loaded using the elf header.
Signed-off-by: Roger Pau Monné
---
Cc: Daniel Kiper
Cc: xen-devel@lists.xenproject.org
---
Changes since v2:
- Clarify that the address tag must be used if present.
Changes since v1:
On 06/08/2018 07:27 AM, Jan Beulich wrote:
On 07.06.18 at 23:21, wrote:
>> On 07/06/2018 14:56, Jan Beulich wrote:
>>> Underscores commonly require two keypresses while hyphen / dash requires
>>> just one, and the visual separation effect of both is basically the same.
>>
>> I don't buy this
On Fri, Jun 8, 2018 at 7:27 AM, Jan Beulich wrote:
On 07.06.18 at 23:21, wrote:
>> On 07/06/2018 14:56, Jan Beulich wrote:
>>> Underscores commonly require two keypresses while hyphen / dash requires
>>> just one, and the visual separation effect of both is basically the same.
>>
>> I don't
While trying to reproduce the problem why EFAULT is sporadically
returned when doing "xl save" of a HVM guest I happened to catch
another bug:
From time to time we have seen failures of
test-amd64-amd64-xl-qemuu-debianhvm-amd64-xsm 16 guest-localmigrate/x10
where there seemed to be problems with
On Mon, Jun 11, 2018 at 11:30:16AM +0200, Roger Pau Monné wrote:
[...]
> I think the following is clear enough:
>
> "Note: This information does not need to be provided if the kernel image is in
> @sc{elf} format, but it must be provided if the image is in a.out format or in
> some other format.
> -Original Message-
> From: Roger Pau Monne
> Sent: 11 June 2018 11:31
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Kevin Tian ;
> Stefano Stabellini ; Wei Liu ;
> George Dunlap ; Andrew Cooper
> ; Ian Jackson ; Tim
> (Xen.org) ; Julien Grall ; Jan Beulich
>
> Subject: Re: [X
> -Original Message-
> From: Roger Pau Monne
> Sent: 11 June 2018 11:26
> To: Paul Durrant
> Cc: xen-devel@lists.xenproject.org; Kevin Tian ;
> Stefano Stabellini ; Wei Liu ;
> George Dunlap ; Andrew Cooper
> ; Ian Jackson ; Tim
> (Xen.org) ; Julien Grall ; Jan Beulich
>
> Subject: Re: [X
On Fri, Jun 08, 2018 at 04:30:29PM +0100, Paul Durrant wrote:
> diff --git a/docs/misc/xen-command-line.markdown
> b/docs/misc/xen-command-line.markdown
> index 8712a833a2..6beb28dada 100644
> --- a/docs/misc/xen-command-line.markdown
> +++ b/docs/misc/xen-command-line.markdown
> @@ -1212,8 +1212,
On Fri, Jun 08, 2018 at 04:30:30PM +0100, Paul Durrant wrote:
> The documentation for the iommu_inclusive_mapping Xen command line option
> states:
>
> "Use this to work around firmware issues providing incorrect RMRR entries"
>
> Unfortunately this workaround does not function correctly if the d
On Mon, Jun 11, 2018 at 03:58:01AM -0600, Jan Beulich wrote:
> >>> On 10.06.18 at 18:32, wrote:
> > On Sun, Jun 10, 2018 at 09:38:17AM -0600, Jan Beulich wrote:
> >> What about L2 tables to be used in slot 3 of an L3 table? Aiui Xen won't
> >> allow
> >> them to be pinned, hence I'd expect there
flight 124047 linux-linus real [real]
http://logs.test-lab.xenproject.org/osstest/logs/124047/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-examine 8 reboot fail REGR. vs. 123554
test-armhf-armhf-xl
>>> On 10.06.18 at 18:32, wrote:
> On Sun, Jun 10, 2018 at 09:38:17AM -0600, Jan Beulich wrote:
>> What about L2 tables to be used in slot 3 of an L3 table? Aiui Xen won't
>> allow
>> them to be pinned, hence I'd expect there to be some special casing in your
>> code. Considering no similar issue
On Fri, Jun 08, 2018 at 12:39:28PM +0200, Daniel Kiper wrote:
> On Fri, Jun 08, 2018 at 12:08:22PM +0200, Roger Pau Monné wrote:
> > On Fri, Jun 08, 2018 at 11:35:52AM +0200, Daniel Kiper wrote:
> > > On Thu, Jun 07, 2018 at 05:59:06PM +0200, Roger Pau Monne wrote:
> > > > Add a note to spell out t
The max number of slots used in xennet_get_responses() is set to
MAX_SKB_FRAGS + (rx->status <= RX_COPY_THRESHOLD).
In old kernel-xen MAX_SKB_FRAGS was 18, while nowadays it is 17. This
difference is resulting in frequent messages "too many slots" and a
reduced network throughput for some workload
75 matches
Mail list logo