From mboxrd@z Thu Jan 1 00:00:00 1970 From: Konrad Rzeszutek Wilk Subject: Re: [PATCH] libxl: introduce an option for disabling the non-O_DIRECT workaround Date: Tue, 26 Nov 2013 12:46:17 -0500 Message-ID: <20131126174617.GM2959@phenom.dumpdata.com> References: <1385466151-21481-1-git-send-email-ian.jackson@eu.citrix.com> <1385466151-21481-2-git-send-email-ian.jackson@eu.citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: Received: from mail6.bemta14.messagelabs.com ([193.109.254.103]) by lists.xen.org with esmtp (Exim 4.72) (envelope-from ) id 1VlMjQ-0005Hv-1E for xen-devel@lists.xenproject.org; Tue, 26 Nov 2013 17:47:28 +0000 Content-Disposition: inline In-Reply-To: <1385466151-21481-2-git-send-email-ian.jackson@eu.citrix.com> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: Ian Jackson Cc: George Dunlap , xen-devel@lists.xenproject.org, Ian Campbell , Stefano Stabellini List-Id: xen-devel@lists.xenproject.org On Tue, Nov 26, 2013 at 11:42:31AM +0000, Ian Jackson wrote: > From: Stefano Stabellini > > Document and implement a new option that permits disk backends which > would otherwise have to avoid O_DIRECT (because of the network memory > lifetime bug) to use it anyway. This is: I thought this was fixed in the Linux kernel with: commit cd9151e26d31048b2b5e00fd02e110e07d2200c9 Author: Stefano Stabellini Date: Sun Aug 4 15:39:40 2013 +0100 xen/balloon: set a mapping for ballooned out pages Currently ballooned out pages are mapped to 0 and have INVALID_P2M_ENTRY in the p2m. These ballooned out pages are used to map foreign grants by gntdev and blkback (see alloc_xenballooned_pages). Allocate a page per cpu and map all the ballooned out pages to the corresponding mfn. Set the p2m accordingly. This way reading from a ballooned out page won't cause a kernel crash (see http://lists.xen.org/archives/html/xen-devel/2012-12/msg01154.html). ? > direct-io-safe in the xl domain disk config specification > direct_io_safe in the libxl disk API > direct-io-safe in the backend xenstore interface > > Add a reference to xen/include/public/io/blkif.h in > docs/misc/vbd-interface.txt. > > Signed-off-by: Stefano Stabellini > Signed-off-by: Ian Jackson > Acked-by: Ian Campbell > --- > docs/misc/vbd-interface.txt | 6 + > docs/misc/xl-disk-configuration.txt | 38 ++ > tools/libxl/libxl.c | 4 + > tools/libxl/libxl.h | 7 + > tools/libxl/libxl_types.idl | 1 + > tools/libxl/libxlu_disk_l.c | 681 ++++++++++++++++++----------------- > tools/libxl/libxlu_disk_l.h | 2 +- > tools/libxl/libxlu_disk_l.l | 1 + > xen/include/public/io/blkif.h | 22 ++ > 9 files changed, 428 insertions(+), 334 deletions(-) > > diff --git a/docs/misc/vbd-interface.txt b/docs/misc/vbd-interface.txt > index 3952e73..f873db0 100644 > --- a/docs/misc/vbd-interface.txt > +++ b/docs/misc/vbd-interface.txt > @@ -125,3 +125,9 @@ because they directly map the bottom 8 bits of the xenstore integer > directly to the Linux guest's device number and throw away the rest; > they can crash due to minor number clashes. With these guests, the > workaround is not to supply problematic combinations of devices. > + > + > +Other frontend and backend options > +---------------------------------- > + > +See xen/include/public/io/blkif.h for the full list of options. > diff --git a/docs/misc/xl-disk-configuration.txt b/docs/misc/xl-disk-configuration.txt > index 5bd456d..9c2650b 100644 > --- a/docs/misc/xl-disk-configuration.txt > +++ b/docs/misc/xl-disk-configuration.txt > @@ -178,6 +178,44 @@ information to be interpreted by the executable program