Hi All,
This is a bug summary for Xen 4.5-rc1 on Intel Server platforms.
Test environment:
Xen: Xen 4.5-rc1
Dom0: Linux kernel 3.17.0
Hardware: Intel IVT-EX, Haswell-EP, BDW Client, HSW-EX, IVT-EX, HSW-UP
New bugs(9):
1. with "xen_platform_pci=0" option, the guest with VT-d device fails to boot
flight 31491 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31491/
Failures :-/ but no regressions.
Regressions which are regarded as allowable (not blocking):
test-amd64-amd64-rumpuserxen-amd64 8 guest-start fail baseline untested
test-amd64-amd64-xl 9
Best Regards,
Robert Ho
-Original Message-
From: bugzilla-dae...@bugzilla.xen.org
[mailto:bugzilla-dae...@bugzilla.xen.org]
Sent: Wednesday, November 12, 2014 9:24 AM
To: Hu, Robert
Subject: [ÐÑг 1893] Ðов: with "xen_platform_pci=0" option, the guest with
VT-d device fails to bo
flight 31481 seabios real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31481/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 17 guest-migrate/src_host/dst_host fail REGR. vs. 30767
Regressions which are reg
flight 31484 linux-linus real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31484/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-rumpuserxen-amd64 8 guest-start fail REGR. vs. 31241
test-amd64-i386-rumpu
On 2014/11/11 17:42, Chen, Tiejun wrote:
On 2014/11/11 17:06, Jan Beulich wrote:
On 11.11.14 at 10:03, wrote:
On 11.11.14 at 08:49, wrote:
Unless we move all check inside each callback functions.
That's what you should do imo, albeit I realize that the comparing
Yes, I can do this in all
On Tue, Nov 11, 2014 at 08:28:38PM +, M A Young wrote:
> The build of xen-4.5.0-rc2 fails if XSM_ENABLE=y due to an inconsistency in
> commit fda1614 "xen/arm: Add support for GICv3 for domU" which uses
> XEN_DOMCTL_configure_domain in xen/xsm/flask/hooks.c and
> xen/xsm/flask/policy/access_vec
When an interrupt for an PCI (or PCIe) passthrough device
is to be sent to a guest, we find the appropiate
'hvm_dirq_dpci' structure for the interrupt (PIRQ), set
a bit (masked), and schedule an tasklet.
Then the 'hvm_dirq_assist' tasklet gets called with the 'struct
domain' from where it iterates
Changelog:
since v9 [http://lists.xen.org/archives/html/xen-devel/2014-11/msg00224.html]
- Fixed up comments,
- Added Reviewed-by
since v8 (http://lists.xen.org/archives/html/xen-devel/2014-10/msg02564.html)
- Went back-n-forth on remote softirq, fixed styleguide violations.
- Moved call to pt
The existing tasklet mechanism has a single global
spinlock that is taken every-time the global list
is touched. And we use this lock quite a lot - when
we call do_tasklet_work which is called via an softirq
and from the idle loop. We take the lock on any
operation on the tasklet_list.
The problem
On Mon, Nov 10, 2014 at 04:32:48PM -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Nov 10, 2014 at 01:07:20PM -0500, Konrad Rzeszutek Wilk wrote:
> > On Mon, Nov 10, 2014 at 05:42:32PM +, David Vrabel wrote:
> > > On 10/11/14 17:32, Konrad Rzeszutek Wilk wrote:
> > > > Hey,
> > > >
> > > > With
On 2014/11/11 18:07, Jan Beulich wrote:
On 11.11.14 at 10:42, wrote:
On 2014/11/11 17:06, Jan Beulich wrote:
Part of which would involve re-considering whether device
assignment shouldn't be done before memory population in the
tool stack.
Yes, after we introduce this new domctl, we just ma
flight 31485 libvirt real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31485/
Failures :-/ but no regressions.
Tests which did not succeed, but are not blocking:
test-amd64-i386-libvirt 9 guest-start fail never pass
test-amd64-amd64-libvirt 9 guest-start
flight 31482 linux-3.10 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31482/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-amd64-xl-qemut-winxpsp3 7 windows-install fail REGR. vs. 26303
Regressions which are
On Tue, Nov 11, 2014 at 01:24:30PM -0700, Bjorn Helgaas wrote:
> On Tue, Nov 11, 2014 at 10:45:38AM -0500, Konrad Rzeszutek Wilk wrote:
> > On Mon, Nov 10, 2014 at 05:04:56PM -0700, Bjorn Helgaas wrote:
> > > On Mon, Oct 27, 2014 at 10:44:36AM +0800, Yijing Wang wrote:
> > > > Commit 0e4ccb1505a9 (
flight 31479 linux-3.14 real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31479/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-armhf-armhf-xl 9 guest-start fail REGR. vs. 30755
Regressions which are
[+cc Sebastian, linux-s390, David, Konrad, xen-devel]
On Mon, Oct 27, 2014 at 10:44:35AM +0800, Yijing Wang wrote:
>
> Yijing Wang (3):
> x86/xen: Introduce a global flag to fix the MSI mask bug
> x86/xen: Revert "PCI: Add x86_msi.msi_mask_irq() and msix_mask_irq()"
> s390/MSI: Use __msi_ma
The build of xen-4.5.0-rc2 fails if XSM_ENABLE=y due to an inconsistency
in commit fda1614 "xen/arm: Add support for GICv3 for domU" which uses
XEN_DOMCTL_configure_domain in xen/xsm/flask/hooks.c and
xen/xsm/flask/policy/access_vectors but XEN_DOMCTL_arm_configure_domain
elsewhere.
M
On Tue, Nov 11, 2014 at 10:45:38AM -0500, Konrad Rzeszutek Wilk wrote:
> On Mon, Nov 10, 2014 at 05:04:56PM -0700, Bjorn Helgaas wrote:
> > On Mon, Oct 27, 2014 at 10:44:36AM +0800, Yijing Wang wrote:
> > > Commit 0e4ccb1505a9 ("PCI: Add x86_msi.msi_mask_irq() and
> > > msix_mask_irq()")
> > > fix
Signed-off-by: Ian Jackson
---
Osstest/Executive.pm |3 ++-
1 file changed, 2 insertions(+), 1 deletion(-)
diff --git a/Osstest/Executive.pm b/Osstest/Executive.pm
index 2a3cc7c..3dc37d1 100644
--- a/Osstest/Executive.pm
+++ b/Osstest/Executive.pm
@@ -733,7 +733,8 @@ END
my ($du
Look to see whether the last run on any hosts which are equivalent to
the ones we're looking at, failed. This means that when host X is
failing and we are considering host Y which is equivalent to X, we
give Y a selection bonus.
This means that osstest will be less obsessive about sticking to the
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive | 20 +---
1 file changed, 13 insertions(+), 7 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
index 0e9c193..73c1a45 100755
--- a/ts-hosts-allocate-Executive
+++ b/ts-hosts-allocate-
Use a logarithmic scale. Cap the bonus at 12h rather than 5d/30 = 4h.
When we have previously failed, make sure we apply a reverse bonus,
rather than a penalty.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive | 12 +---
1 file changed, 9 insertions(+), 3 deletions(-)
diff
Here, I'm trying to fix the way that osstest gets far too obsessed
about particular failing hosts.
1/9 cs-adjust-flight: Fix doc about / to match
2/9 ts-hosts-allocate-Executive: allow uncompressed
3/9 Osstest/Executive.pm: Debug log same-host status
4/9 ts-hosts-allocate-Executive: Move $vari
Signed-off-by: Ian Jackson
---
cs-adjust-flight |2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/cs-adjust-flight b/cs-adjust-flight
index 663ca6f..7ec17e3 100755
--- a/cs-adjust-flight
+++ b/cs-adjust-flight
@@ -18,7 +18,7 @@
#
# . means all jobs
#
No functional change.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive |3 +--
1 file changed, 1 insertion(+), 2 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
index fc54cda..9562a0a 100755
--- a/ts-hosts-allocate-Executive
+++ b/ts-hosts-alloc
Make osstest less obsessive about sticking to failing hosts if they
are persistently unavailable.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive |8 ++--
1 file changed, 6 insertions(+), 2 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
in
Introduce $duration_for_cost and set it to the previous formula for
build jobs, or 0 for test jobs.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive |5 +++--
1 file changed, 3 insertions(+), 2 deletions(-)
diff --git a/ts-hosts-allocate-Executive b/ts-hosts-allocate-Executive
ind
We are going to want to put more stuff in here which depends on
$duration_rightaway_adjust.
No functional change in this commit.
Signed-off-by: Ian Jackson
---
ts-hosts-allocate-Executive | 12 ++--
1 file changed, 6 insertions(+), 6 deletions(-)
diff --git a/ts-hosts-allocate-Execut
On 11/11/14 17:36, Wei Liu wrote:
> # What's already implemented?
>
> PV vNUMA support in libxl/xl and Linux kernel.
Linux doesn't have vnuma yet, although the last set of patches I saw
looked fine and were waiting for acks from x86 maintainers I think.
> # NUMA-aware ballooning
>
> It's agreed
On 11/11/14 05:43, Juergen Gross wrote:
> At start of the day the Xen hypervisor presents a contiguous mfn list
> to a pv-domain. In order to support sparse memory this mfn list is
> accessed via a three level p2m tree built early in the boot process.
> Whenever the system needs the mfn associated
On 11/11/14 05:43, Juergen Gross wrote:
> Instead of checking at each call of set_phys_to_machine() whether a
> new p2m page has to be allocated due to writing an entry in a large
> invalid or identity area, just map those areas read only and react
> to a page fault on write by allocating the new p
On 11/11/14 05:43, Juergen Gross wrote:
> Today get_phys_to_machine() is always called when the mfn for a pfn
> is to be obtained. Add a wrapper __pfn_to_mfn() as inline function
> to be able to avoid calling get_phys_to_machine() when possible as
> soon as the switch to a linear mapped p2m list ha
# What's already implemented?
PV vNUMA support in libxl/xl and Linux kernel.
# What's planned but yet implemented?
NUMA-aware ballooning, HVM vNUMA
# How is vNUMA used in toolstack and Xen?
On libxl level, user (xl and other higher level toolstack) can specify
number of vnodes, size of a vnode
flight 31476 xen-4.2-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31476/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
test-amd64-i386-pair 18 guest-migrate/dst_host/src_host fail in 31451 REGR.
vs. 30594
Tests whi
On Tue, Nov 11, 2014 at 05:41:50PM +0100, Julien Grall wrote:
> Hi Stefano,
>
> On 10/11/2014 12:38, Stefano Stabellini wrote:
> >On Mon, 10 Nov 2014, Ian Campbell wrote:
> >>On Sat, 2014-11-08 at 15:26 -0500, Konrad Rzeszutek Wilk wrote:
> >>>That is to guard against somebody building against lib
Hi,
Somehow I missed this email.
On 30/10/2014 13:33, Ian Campbell wrote:
create !
title it arm: domain 0 disables clocks which are in fact being used
thanks
On Wed, 2014-10-29 at 16:39 +, Ian Jackson wrote:
Ian Campbell writes ("[PATCH OSSTEST v2 18/20] Osstest/Debian: Add
"clk_ignore_u
Folks,
This Thursday, November 13, is our second Test Day for the 4.5 release
cycle. Release Candidate 2 is now available for assessment. Now is
the time to see if the upcoming release of the Xen Project Hypervisor
will work in your environment.
Information about testing this release can be foun
On Tue, 11 Nov 2014, Julien Grall wrote:
> Hi Stefano,
>
> On 10/11/2014 12:38, Stefano Stabellini wrote:
> > On Mon, 10 Nov 2014, Ian Campbell wrote:
> > > On Sat, 2014-11-08 at 15:26 -0500, Konrad Rzeszutek Wilk wrote:
> > > > That is to guard against somebody building against libxc or libxl and
Hi Stefano,
On 10/11/2014 12:38, Stefano Stabellini wrote:
On Mon, 10 Nov 2014, Ian Campbell wrote:
On Sat, 2014-11-08 at 15:26 -0500, Konrad Rzeszutek Wilk wrote:
That is to guard against somebody building against libxc or libxl and
then becoming dependent on this and then complaining that it
On 11/11/2014 10:20 AM, Wei Liu wrote:
> On Tue, Nov 11, 2014 at 09:41:32AM -0500, Zhigang Wang wrote:
>> On 11/11/2014 06:01 AM, Wei Liu wrote:
>>> On Mon, Nov 10, 2014 at 12:54:18PM -0500, Zhigang Wang wrote:
>>> [...]
Could you please explain what does "no configuration" means?
Do
Feature patchsets that did not make it in by today have been put
on the deferred list. If you think your feature should make it by Xen 4.5-RC3
please make your case.
Xen 4.5-rc2 is out today (one day early!). There is one known issue
(see 'Known Issues' below) which are to be fixed by RC3 - if:
-
On Mon, Nov 10, 2014 at 10:21:06AM -0500, Konrad Rzeszutek Wilk wrote:
> Hey,
>
> The 'staging' has four extra patches:
>
> e6fa63d pvgrub: ignore NUL
> fda1614 xen/arm: Add support for GICv3 for domU
> 5a430ec tools: libxl: do not overrun input buffer in libxl__parse_mac
> 379b351 tools: libxl:
Processing commands for x...@bugs.xenproject.org:
> close 6
Closing bug #6
>
Modified/created Bugs:
- 6: http://bugs.xenproject.org/xen/bug/6
---
Xen Hypervisor Bug Tracker
See http://wiki.xen.org/wiki/Reporting_Bugs_against_Xen for information on
reporting bugs
Contact xen-bugs-ow...@bugs.xe
On Tue, Nov 11, 2014 at 03:30:54AM +, Zhang, Yang Z wrote:
> Konrad Rzeszutek Wilk wrote on 2014-11-10:
> > On Mon, Nov 10, 2014 at 05:08:09AM +, Zhang, Yang Z wrote:
> >> Konrad Rzeszutek Wilk wrote on 2014-01-16:
> >>> On Mon, Jan 13, 2014 at 11:51:28AM +, Jan Beulich wrote:
> >>>
On Mon, Nov 10, 2014 at 05:04:56PM -0700, Bjorn Helgaas wrote:
> On Mon, Oct 27, 2014 at 10:44:36AM +0800, Yijing Wang wrote:
> > Commit 0e4ccb1505a9 ("PCI: Add x86_msi.msi_mask_irq() and msix_mask_irq()")
> > fixed MSI mask bug which may cause kernel crash. But the commit
> > made MSI code complex
On Tue, Nov 11, 2014 at 09:41:32AM -0500, Zhigang Wang wrote:
> On 11/11/2014 06:01 AM, Wei Liu wrote:
> > On Mon, Nov 10, 2014 at 12:54:18PM -0500, Zhigang Wang wrote:
> > [...]
> >> Could you please explain what does "no configuration" means?
> >>
> >> Do you mean no info for the domain at all? I
> >> We also don't want multi-page allocations in this driver, so the
> >> batch size should be set accordingly.
> >
> > Why not?
>
> Multi-page allocations are more likely to fail because of memory
> fragmentation.
Since we're keeping the alignment restriction, the code stays pretty much the
sa
On 11/11/14 14:42, Thanos Makatos wrote:
>> On 11/11/14 12:27, Thanos Makatos wrote:
The arbitrary limitations in number of ops and page alignment should
be removed. I think both can be removed relatively easily by
consuming page aligned chunks of segments and doign the hypercall
>>
> On 11/11/14 12:27, Thanos Makatos wrote:
> >> The arbitrary limitations in number of ops and page alignment should
> >> be removed. I think both can be removed relatively easily by
> >> consuming page aligned chunks of segments and doign the hypercall
> >> when a batch of ops is filled.
> >
> >
On 11/11/2014 06:01 AM, Wei Liu wrote:
> On Mon, Nov 10, 2014 at 12:54:18PM -0500, Zhigang Wang wrote:
> [...]
>> Could you please explain what does "no configuration" means?
>>
>> Do you mean no info for the domain at all? If this is the case, it seems not
>> consistent with xl list without -l.
>
flight 31478 qemu-mainline real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/31478/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf-pvops 4 host-build-prep fail REGR. vs. 30603
test-amd64-i386-pai
11.11.2014 17:32, Chen Gang wrote:
>> The title of your patch should say 'variable'.
>
> Oh, yes, thanks. If necessary to send patch v2 for it, please let me
> know.
Not only 'varialbe', but also 'redandant'. I fixed both on commit, plus
fixed grammar in commit message.
Thanks,
/mjt
_
11.11.2014 12:23, Chen Gang wrote:
> In xen_hvm_change_state_handler(), can pass 'opaque' with type cast to
> xen_main_loop_prepare() directly, need not use additional variable for
> it.
gcc most likely eliminates it anyway, but heck, why not?
Applied to -trivial, thank you!
/mjt
___
On 11/11/14 22:24, Konrad Rzeszutek Wilk wrote:
> On Tue, Nov 11, 2014 at 10:53:01AM +, Stefano Stabellini wrote:
>> On Tue, 11 Nov 2014, Chen Gang wrote:
>>> In xen_hvm_change_state_handler(), can pass 'opaque' with type cast to
>>> xen_main_loop_prepare() directly, need not use additional va
On Tue, Nov 11, 2014 at 10:53:01AM +, Stefano Stabellini wrote:
> On Tue, 11 Nov 2014, Chen Gang wrote:
> > In xen_hvm_change_state_handler(), can pass 'opaque' with type cast to
> > xen_main_loop_prepare() directly, need not use additional variable for
> > it.
The title of your patch should s
Hi again,
On 11/11/2014 01:18 PM, Dietmar Hahn wrote:
Hi list,
When creating a cpupool, starting and destroying a guest within this pool,
then removing this pool doesn't work because of EBUSY.
It seems the cause of this behavior is the commit
bac6334b51d9bcfe57ecf4a4cb5288348fcf044a.
In domai
Hi Dietmar,
On 11/11/2014 01:18 PM, Dietmar Hahn wrote:
Hi list,
When creating a cpupool, starting and destroying a guest within this pool,
then removing this pool doesn't work because of EBUSY.
It seems the cause of this behavior is the commit
bac6334b51d9bcfe57ecf4a4cb5288348fcf044a.
In dom
Signed-off-by: Wei Liu
Cc: Ian Campbell
Cc: Ian Jackson
Cc: George Dunlap
Cc: Konrad Wilk
---
This is a simple enough bug fix I think it should just go in.
---
tools/libxl/libxl.c |1 +
1 file changed, 1 insertion(+)
diff --git a/tools/libxl/libxl.c b/tools/libxl/libxl.c
index f7961f6..d
On 11/11/14 12:27, Thanos Makatos wrote:
>> The arbitrary limitations in number of ops and page alignment should be
>> removed. I think both can be removed relatively easily by consuming page
>> aligned chunks of segments and doign the hypercall when a batch of ops is
>> filled.
>
> Wouldn't this
This patch allows to use more than one high-level
cpufreq driver. This patch is needed for implementation
xen-based high-level cpufreq driver.
Signed-off-by: Oleksandr Dmytryshyn
---
drivers/cpufreq/Kconfig| 4 +
drivers/cpufreq/Makefile | 1 +
drivers/cpufreq/acpi-cpuf
Xen changes frequencies on physical CPUs using this
high-level cpufreq driver.
Workflow:
* cpufreq governor driver in Xen wants to change the
frequency of the physical CPU
* cpufreq driver in Xen sets parameters in the shared
memory
* cpufreq driver in Xen sends an event via event channel
This shared info will be used by xen-cpufreq driver
to receive commands from the cpufreq driver in xen.
Signed-off-by: Oleksandr Dmytryshyn
---
arch/arm/include/asm/xen/interface.h | 15 ++-
1 file changed, 14 insertions(+), 1 deletion(-)
diff --git a/arch/arm/include/asm/xen/interf
Kernel uses this op to start/stop cpufreq notification
events sending.
Signed-off-by: Oleksandr Dmytryshyn
---
include/xen/interface/sysctl.h | 10 ++
1 file changed, 10 insertions(+)
diff --git a/include/xen/interface/sysctl.h b/include/xen/interface/sysctl.h
index 97c91b0..a4d52e5 100
Hi to all.
Next series of patches implements xen-cpufreq driver in kernel.
Cpufreq core and registered cpufreq governors are located in xen. Hwdom has CPU
driver which can only change frequency of the physical CPUs. In addition this
driver can change CPUs regulator voltage. At start time xen-cpuf
Those functions should be dependent on CONFIG_CPU_FREQ_TABLE
instead of the CONFIG_CPU_FREQ.
Signed-off-by: Oleksandr Dmytryshyn
---
drivers/base/power/opp.c | 4 ++--
include/linux/opp.h | 2 +-
2 files changed, 3 insertions(+), 3 deletions(-)
diff --git a/drivers/base/power/opp.c b/drive
Low-level cpufreq drivers should depend from CPUFREQ_DRV_OPS
config instead of the CPU_FREQ config in case if we want
to use additional high-level cpufreq driver. This patch
is needed for implementation xen-based high-level cpufreq
driver.
Signed-off-by: Oleksandr Dmytryshyn
---
drivers/Makefile
This hypercall will be used by xen-cpufreq driver
to upload CPUs PM data from Kernel to Xen.
Signed-off-by: Oleksandr Dmytryshyn
---
arch/arm/include/asm/xen/hypercall.h | 1 +
arch/arm/xen/enlighten.c | 1 +
arch/arm/xen/hypercall.S | 1 +
3 files changed, 3 insertions(+
Xen hypervisor creates standard cpus nodes for virtual cpus.
All information needed for this driver about physical cpus
now located in /hypervisor/pcpus node instead of the
/cpus node in case if kernel is running as hardware domain.
Signed-off-by: Oleksandr Dmytryshyn
---
drivers/cpufreq/cpufreq
This hypercall will be used by xen-cpufreq driver
to get real number of physical CPUs.
Signed-off-by: Oleksandr Dmytryshyn
CC: Keir Fraser
---
arch/arm/include/asm/xen/hypercall.h | 1 +
arch/arm/include/asm/xen/interface.h | 2 +
arch/arm/xen/enlighten.c | 1 +
arch/arm/xen/hype
Signed-off-by: Oleksandr Dmytryshyn
---
Documentation/devicetree/bindings/arm/xen.txt | 20 +++-
1 file changed, 19 insertions(+), 1 deletion(-)
diff --git a/Documentation/devicetree/bindings/arm/xen.txt
b/Documentation/devicetree/bindings/arm/xen.txt
index 0f7b9c2..1d7aea3 1006
ACPI-specific parts are moved under appropriate ifdefs.
Now pmstat functions can be used in ARM platform.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/drivers/pm/stat.c | 8 +++-
1 file changed, 7 insertions(+), 1 deletion(-)
diff --git a/xen/drivers/pm/stat.c b/xen/drivers/pm/stat.c
index 3
Cpufreq driver should be more generalizable (not ACPI-specific).
Thus this file should be placed to more convenient location.
Signed-off-by: Oleksandr Dmytryshyn
---
MAINTAINERS | 1 +
xen/arch/x86/acpi/cpu_idle.c | 2 +-
xen/arch/x86/acpi/cpufreq
This patch copies all c...@0..cpu@N nodes (from input
device tree) with properties to /hypervisor/pcpus
node (device tree for hwdom). Thus we can give all
information about all physical CPUs in the pcpus node.
Driver in hwdom should parse /hypervisor/pcpus path
instead of the /cpus path in the devi
Signed-off-by: Oleksandr Dmytryshyn
---
xen/arch/arm/Rules.mk | 3 +++
1 file changed, 3 insertions(+)
diff --git a/xen/arch/arm/Rules.mk b/xen/arch/arm/Rules.mk
index 718cd8a..1484b55 100644
--- a/xen/arch/arm/Rules.mk
+++ b/xen/arch/arm/Rules.mk
@@ -9,6 +9,9 @@
HAS_DEVICE_TREE := y
HAS_VIDEO
This patch enables xsm_platform_op hook for all architectures
and implements platform hypercall for ARM.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/arch/arm/Makefile | 1 +
xen/arch/arm/platform_hypercall.c | 84 +++
xen/arch/arm/traps.c
This driver uses hwdom to change frequencies on physical
CPUs.
Workflow:
* cpufreq governor driver in Xen wants to change the
frequency of the physical CPU
* hwdom-cpufreq driver sets parameters in the shared
memory
* hwdom-cpufreq driver sends an event via event channel
to notify the h
Hi to all.
Next series of patches implements xen-cpufreq driver in Xen hypervisor.
Cpufreq core and registered cpufreq governors are located in xen. Hwdom has CPU
driver which can only change frequency of the physical CPUs. In addition this
driver can change CPUs regulator voltage. At start time
This settings is not needed for some architectures.
So make it to be configurable and use it for x86
architecture.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/Rules.mk | 1 +
xen/arch/x86/Rules.mk | 1 +
xen/drivers/cpufreq/utility.c | 11 ++-
xen/drivers/pm/st
Kernel uses this op to start/stop cpufreq notification
events sending.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/include/public/sysctl.h | 11 +++
1 file changed, 11 insertions(+)
diff --git a/xen/include/public/sysctl.h b/xen/include/public/sysctl.h
index 8437d31..35188d7 100644
---
Cpufreq driver should be more generalizable (not ACPI-specific).
Thus this file should be placed to more convenient location.
Signed-off-by: Oleksandr Dmytryshyn
---
MAINTAINERS| 2 +-
xen/arch/x86/platform_hypercall.c | 2 +-
xen/include/
Cpufreq driver should be more generalizable (not ACPI-specific).
Thus this file should be placed to more convenient location.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/Rules.mk | 1 +
xen/arch/x86/Rules.mk| 1 +
xen/common/sysctl.c
First implementation of the cpufreq driver has been
written with x86 in mind. This patch makes possible
the cpufreq driver be working on both x86 and arm
architectures.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/Rules.mk | 1 +
xen/drivers/cpufreq/cpufreq.c| 80
This shared info will be used by hwdom-cpufreq driver
to send commands to the cpufreq driver in the hwdom.
Signed-off-by: Oleksandr Dmytryshyn
---
xen/include/asm-arm/shared.h | 14 ++
xen/include/public/arch-arm.h | 12
2 files changed, 26 insertions(+)
create mode 10
I wonder if it is necessary for xen to trigger the event channel pending when
the port related a vcpu port io.
Suppose a scenario as follows:
1) Qemu make a hypercall using codes:
for (i = 0; i < smp_cpus; i++) {
rc = xc_evtchn_bind_interdomain(state->xce_handle, xen_domid,
On 10/11/14 18:01, Ian Jackson wrote:
> * Domain name(s) which you use to provide Xen software/services.
This makes sense for a services provider but I'm not sure what it means
for a distro. Is this intended to mean a download location for an
installation image and updates?If it's a down
> The arbitrary limitations in number of ops and page alignment should be
> removed. I think both can be removed relatively easily by consuming page
> aligned chunks of segments and doign the hypercall when a batch of ops is
> filled.
Wouldn't this lead to multiple calls to gnttab_batch_copy(), p
Hi list,
When creating a cpupool, starting and destroying a guest within this pool,
then removing this pool doesn't work because of EBUSY.
It seems the cause of this behavior is the commit
bac6334b51d9bcfe57ecf4a4cb5288348fcf044a.
In domain_kill() the function sched_move_domain() gets called cha
On 11/11/2014 12:45 PM, Andrew Cooper wrote:
On 11/11/14 05:43, Juergen Gross wrote:
diff --git a/arch/x86/xen/p2m.c b/arch/x86/xen/p2m.c
index fa75842..f67f8cf 100644
--- a/arch/x86/xen/p2m.c
+++ b/arch/x86/xen/p2m.c
@@ -268,6 +271,22 @@ static void p2m_init(unsigned long *p2m)
On Tue, 11 Nov 2014, Ian Jackson wrote:
> xen.org writes ("[xen-unstable test] 31473: tolerable FAIL - PUSHED"):
> > flight 31473 xen-unstable real [real]
> > http://www.chiark.greenend.org.uk/~xensrcts/logs/31473/
> >
> > Failures :-/ but no regressions.
> ...
> > version targeted for testing:
>
On Mon, 10 Nov 2014, Catalin Marinas wrote:
> On Mon, Nov 10, 2014 at 04:14:02PM +, Stefano Stabellini wrote:
> > --- a/arch/arm/include/asm/xen/page.h
> > +++ b/arch/arm/include/asm/xen/page.h
> > @@ -107,4 +107,8 @@ static inline bool set_phys_to_machine(unsigned long
> > pfn, unsigned long
On 11/11/14 05:43, Juergen Gross wrote:
> diff --git a/arch/x86/xen/p2m.c b/arch/x86/xen/p2m.c
> index fa75842..f67f8cf 100644
> --- a/arch/x86/xen/p2m.c
> +++ b/arch/x86/xen/p2m.c
> @@ -268,6 +271,22 @@ static void p2m_init(unsigned long *p2m)
> p2m[i] = INVALID_P2M_ENTRY;
> }
>
>
xen.org writes ("[xen-unstable test] 31473: tolerable FAIL - PUSHED"):
> flight 31473 xen-unstable real [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/31473/
>
> Failures :-/ but no regressions.
...
> version targeted for testing:
> xen e6fa63d6cf8e79de2cfb2d428269b6d6
On Mon, 10 Nov 2014, Catalin Marinas wrote:
> On Mon, Nov 10, 2014 at 04:12:40PM +, Stefano Stabellini wrote:
> > this patch series introduces support for GNTTABOP_cache_flush to perform
> > cache maintenance operation on foreign pages and reverts the current
> > code based on XENFEAT_grant_map
On Mon, 10 Nov 2014, Catalin Marinas wrote:
> On Mon, Nov 10, 2014 at 04:13:56PM +, Stefano Stabellini wrote:
> > Introduce a boolean flag and an accessor function to check whether a
> > device is dma_coherent. Set the flag from set_arch_dma_coherent_ops.
> >
> > Signed-off-by: Stefano Stabell
On Mon, 10 Nov 2014, Catalin Marinas wrote:
> On Mon, Nov 10, 2014 at 04:13:55PM +, Stefano Stabellini wrote:
> > void xen_dma_unmap_page(struct device *hwdev, dma_addr_t handle,
> > size_t size, enum dma_data_direction dir,
> > - struct dma_attrs *attrs);
> > +
On Mon, Nov 10, 2014 at 12:54:18PM -0500, Zhigang Wang wrote:
[...]
> Could you please explain what does "no configuration" means?
>
> Do you mean no info for the domain at all? If this is the case, it seems not
> consistent with xl list without -l.
>
That means no configuration at all. I think
On 11/11/2014 11:50 AM, David Vrabel wrote:
On 11/11/14 10:36, Juergen Gross wrote:
On 11/11/2014 11:21 AM, David Vrabel wrote:
On 11/11/14 05:43, Juergen Gross wrote:
Some functions in arch/x86/xen/p2m.c are used locally only. Make them
static. Rearrange the functions in p2m.c to avoid forwar
On Tue, 11 Nov 2014, Chen Gang wrote:
> In xen_hvm_change_state_handler(), can pass 'opaque' with type cast to
> xen_main_loop_prepare() directly, need not use additional variable for
> it.
>
> Signed-off-by: Chen Gang
Acked-by: Stefano Stabellini
> xen-hvm.c | 3 +--
> 1 file changed, 1 ins
On 11/11/14 10:36, Juergen Gross wrote:
> On 11/11/2014 11:21 AM, David Vrabel wrote:
>> On 11/11/14 05:43, Juergen Gross wrote:
>>> Some functions in arch/x86/xen/p2m.c are used locally only. Make them
>>> static. Rearrange the functions in p2m.c to avoid forward declarations.
>>>
>>> While at it
1 - 100 of 120 matches
Mail list logo