MinalKumar Patel(M.E. - Computer Engineering)
Lecturer,Computer Engineering Department,
A.D.Patel Institute of Technology,
New Vallabh Vidyanagar,Karamsad - 388121,
Anand,Gujarat.
Mobile - 9998574188
E-mail Id - patel...@yahoo.co.in
URL - http://www.minall.co.in
On Friday, 9 January 2015 4:
Thanks Jan/George/Tim for your valuable inputs. To make discussion more
efficient, let's do a summary for previous discussions and remaining opens
here:
--
1) 'fail' vs. 'warn' upon gfn confliction
Assigning device which fails RMRR confliction check (i.e. intended gfns
already allocated for oth
Jim Fehlig wrote:
> Jim Fehlig wrote:
>
>> Ian Campbell wrote:
>>
>>
>>
>>> I must confess that I thought you already did use libxlu...
>>>
>>>
>>>
>> No, not directly. But I will be doing so now. I should try to revert
>> all this nonsense and use libxlu before it ends
branch xen-unstable
xen branch xen-unstable
job test-amd64-amd64-xl-qemuu-ovmf-amd64
test debian-hvm-install
Tree: linux git://xenbits.xen.org/linux-pvops.git
Tree: linuxfirmware git://xenbits.xen.org/osstest/linux-firmware.git
Tree: qemu git://xenbits.xen.org/staging/qemu-xen-unstable.git
Tree: q
> From: Andrew Cooper [mailto:andrew.coop...@citrix.com]
> Sent: Thursday, January 08, 2015 11:39 PM
>
> Use the standard "do { } while ( 0 )" semantics, and don't hide the break
> statement, incase this macro wants to be used anywhere outside of a switch.
>
> No functional change, but it is now
> From: George Dunlap
> Sent: Friday, January 09, 2015 2:02 AM
>
> On Thu, Jan 8, 2015 at 4:10 PM, Jan Beulich wrote:
> On 08.01.15 at 16:59, wrote:
> >> On Thu, Jan 8, 2015 at 1:54 PM, Jan Beulich wrote:
> the 1st invocation of this interface will save all reported reserved
> re
> From: George Dunlap
> Sent: Friday, January 09, 2015 12:00 AM
>
> >3.3 Policies
> >>
> >> An intuitive thought is to fail immediately upon a confliction, however
> >> it is not flexible regarding to different requirments:
> >>
> >> a) it's not appropriate to fail libxc domain builder ju
> -Original Message-
> From: Dario Faggioli [mailto:dario.faggi...@citrix.com]
> Sent: Friday, January 09, 2015 1:20 AM
> To: Pang, LongtaoX
> Cc: Wei Liu; Hu, Robert; ian.jack...@eu.citrix.com; ian.campb...@citrix.com;
> Zheng, Di; xen-devel@lists.xen.org
> Subject: Re: [Xen-devel] [OSST
> From: George Dunlap
> Sent: Thursday, January 08, 2015 8:55 PM
>
> On Thu, Jan 8, 2015 at 12:49 PM, George Dunlap
> wrote:
> > If RMRRs almost always happen up above 2G, for example, then a simple
> > solution that wouldn't require too much work would be to make sure
> > that the PCI MMIO hole
> From: George Dunlap
> Sent: Thursday, January 08, 2015 8:50 PM
>
> On Fri, Dec 26, 2014 at 11:23 AM, Tian, Kevin wrote:
> > (please note some proposal is different from last sent version after more
> > discussions. But I tried to summarize previous discussions and explained why
> > we choose a
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, January 08, 2015 8:59 PM
>
> >>> On 08.01.15 at 13:49, wrote:
> > One question: where are these RMRRs typically located in memory? Are
> > they normally up in the MMIO region? Or can they occur anywhere (even
> > in really low are
> From: Jan Beulich [mailto:jbeul...@suse.com]
> Sent: Thursday, January 08, 2015 9:55 PM
>
> >>> On 26.12.14 at 12:23, wrote:
> > [Issue-2] Being lacking of goal-b), existing device assignment with
> > RMRR works only when reserved regions happen to not conflicting with
> > other valid allocatio
> -Original Message-
> From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
> Sent: Friday, January 09, 2015 1:48 AM
> To: Xu, Quan; xen-devel@lists.xen.org
> Cc: samuel.thiba...@ens-lyon.org; stefano.stabell...@eu.citrix.com
> Subject: Re: [PATCH v2 1/5] vTPM: event channel bind interdom
> From: Tim Deegan [mailto:t...@xen.org]
> Sent: Thursday, January 08, 2015 8:32 PM
>
> Hi Kevin,
>
> Thanks for sending out this design document. I think Jan will have
> the most to say about this. Looking just at the hypervisor side of
> things, and leaving the tools desig to others...
>
> A
"Old" tested version had not actually been tested; therefore in this
flight we test it, rather than a new candidate. The baseline, if
any, is the most recent actually tested revision.
flight 33264 xen-4.5-testing real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33264/
Failures and pr
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
On Thu, Jan 8, 2015 at 2:31 PM, Marcelo Tosatti wrote:
> On Tue, Jan 06, 2015 at 11:49:09AM -0800, Andy Lutomirski wrote:
>> On Tue, Jan 6, 2015 at 10:45 AM, Marcelo Tosatti wrote:
>> > On Tue, Jan 06, 2015 at 10:26:22AM -0800, Andy Lutomirski wrote:
>> >> On Tue, Jan 6, 2015 at 10:13 AM, Marcelo
On Tue, Jan 06, 2015 at 11:49:09AM -0800, Andy Lutomirski wrote:
> On Tue, Jan 6, 2015 at 10:45 AM, Marcelo Tosatti wrote:
> > On Tue, Jan 06, 2015 at 10:26:22AM -0800, Andy Lutomirski wrote:
> >> On Tue, Jan 6, 2015 at 10:13 AM, Marcelo Tosatti
> >> wrote:
> >> > On Tue, Jan 06, 2015 at 08:56:4
Jim Fehlig wrote:
> Ian Campbell wrote:
>
>
>> I must confess that I thought you already did use libxlu...
>>
>>
>
> No, not directly. But I will be doing so now. I should try to revert
> all this nonsense and use libxlu before it ends up in the next libvirt
> release.
>
Hmm, I don
On 08/01/15 15:50, Jan Beulich wrote:
> +if ( !buf )
> +buf = p_data;
> +else
> +switch ( bytes_per_rep )
> +{
> +#define CASE(bits, suffix) \
> +case (bits) / 8:
> > > = Timeline =
> > >
> > > Xen 4.5 is a 10 month release. The dates are:
> > >
> > > * Feature Freeze: 24th September 2014
> > > * First RC: 24th October [Friday!]
> > > * RC2: Nov 11th
> > > * RC2 Test-day: Nov 13th
> > > * RC3: Dec 3rd.
> > > * RC3 Test-day: Dec 4th
> > > * RC4: Dec 15th
>
flight 33257 linux-next real [real]
http://www.chiark.greenend.org.uk/~xensrcts/logs/33257/
Regressions :-(
Tests which did not succeed and are blocking,
including tests which could not be run:
build-armhf 3 host-install(3) broken REGR. vs. 33115
build-amd64-libvirt
Andrew, Ian, and Paul - thanks so much for the help. I need to study the code
and I'll try to get a channel going between two Linux VMs. Latency and
performance are critical (~500 MB/s), so I'll probably have more questions
about best practices for large data buffers. However, once I have a w
On Thu, Jan 08, 2015 at 08:51:51AM +0100, Olaf Hering wrote:
> On Wed, Jan 07, Ian Campbell wrote:
>
> > On Wed, 2015-01-07 at 16:49 +, Ian Jackson wrote:
> > > Certainly removing this feature this late in the 4.5 release cycle is
> > > not appropriate.
> >
> > I agree that faffing around wit
Hi All,
We are using Xenserver 6.2 with latest patches installed and we just
enabled email sending on the pool (the pool has been running for long time
with no major issues)
now 3 hosts out of 4 hosts in the pool are flooding us with xen-ringwatch
exceptions
like this
Traceback (most recent call l
On 08/01/15 16:04, Jan Beulich wrote:
On 08.01.15 at 16:56, wrote:
>> At 15:23 + on 08 Jan (1420727005), Jan Beulich wrote:
>>> +if ( (value & EFER_LMSLE) && !cpu_has_lmsl )
>>> +return 0;
>> I see this bit has no CPUID flag, and the docs don't seem to suggest
>> that it would
On 08/01/15 15:23, Jan Beulich wrote:
> Following the earlier similar change validating CR4 modifications.
>
> Signed-off-by: Jan Beulich
>
> --- a/xen/arch/x86/hvm/hvm.c
> +++ b/xen/arch/x86/hvm/hvm.c
> @@ -1672,20 +1672,53 @@ static int hvm_save_cpu_ctxt(struct doma
> return 0;
> }
>
> -
At 17:05 + on 08 Jan (1420733142), Jan Beulich wrote:
> >>> On 08.01.15 at 17:56, wrote:
> > At 16:29 + on 08 Jan (1420730974), Jan Beulich wrote:
> >> >>> On 08.01.15 at 17:16, wrote:
> >> > At 15:50 + on 08 Jan (1420728649), Jan Beulich wrote:
> >> >> While the REP MOVS acceleration
On Thu, Jan 08, 2015 at 06:02:04PM +, George Dunlap wrote:
> On Thu, Jan 8, 2015 at 4:10 PM, Jan Beulich wrote:
> On 08.01.15 at 16:59, wrote:
> >> On Thu, Jan 8, 2015 at 1:54 PM, Jan Beulich wrote:
> the 1st invocation of this interface will save all reported reserved
> regio
On Thu, Jan 8, 2015 at 4:10 PM, Jan Beulich wrote:
On 08.01.15 at 16:59, wrote:
>> On Thu, Jan 8, 2015 at 1:54 PM, Jan Beulich wrote:
the 1st invocation of this interface will save all reported reserved
regions under domain structure, and later invocation (e.g. from
hvmloader
On 08/01/15 17:20, Johannes Weiner wrote:
> On Thu, Jan 08, 2015 at 03:28:43PM +, David Vrabel wrote:
>> Add an optional array of pages to struct vm_area_struct that can be
>> used find the page backing a VMA. This is useful in cases where the
>> normal mechanisms for finding the page don't wo
On 01/08/2015 11:49 AM, Xu, Quan wrote:
-Original Message-
From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
Sent: Thursday, January 08, 2015 11:55 PM
To: Xu, Quan; xen-devel@lists.xen.org
Cc: samuel.thiba...@ens-lyon.org; stefano.stabell...@eu.citrix.com
Subject: Re: [PATCH v2 1/5]
Scheduling related tests are ok to run on ARM, so do
not cut them off. They also do not depend on a
particular Dom0 architecture.
The net effect is that the following tests are removed:
test-amd64-i386-xl-credit2
test-amd64-i386-xl-multivcpu
while the following new ones are created:
test-amd64
On Thu, 2015-01-08 at 13:45 +, Andrew Cooper wrote:
> This script has become orphaned from the build system, and depends on removed
> Xend functionality (xen.util.pci) so can't possibly function now.
>
> Signed-off-by: Andrew Cooper
> CC: Ian Campbell
> CC: Ian Jackson
> CC: Wei Liu
Acked
On Wed, 2015-01-07 at 16:57 +, Wei Liu wrote:
> > > diff --git a/tools/libxl/libxl_internal.c b/tools/libxl/libxl_internal.c
> > > index 9d8025d..a70214b 100644
> > > --- a/tools/libxl/libxl_internal.c
> > > +++ b/tools/libxl/libxl_internal.c
> > > @@ -458,6 +458,20 @@ out:
> > >
> > > void
On Tue, 2015-01-06 at 03:28 +, Pang, LongtaoX wrote:
> [Pang, LongtaoX]
> [Pang, LongtaoX] Thanks for checking. We used ts-debian-hvm-install for
> installing L1 HVM guest via ISO Image,
> because we will build XEN, XEN-Tools and dom0 kernel inside it, and then we
> will install L2 guest in
On 08/01/15 15:22, Jan Beulich wrote:
> Unused arguments get clobbered before the call (not affecting caller
> visible state), while used arguments get clobbered afterwards unless
> a continuation is needed (affecting caller visible state).
>
> Signed-off-by: Jan Beulich
After a long time pouring
On Thu, Jan 08, 2015 at 03:28:43PM +, David Vrabel wrote:
> Add an optional array of pages to struct vm_area_struct that can be
> used find the page backing a VMA. This is useful in cases where the
> normal mechanisms for finding the page don't work. This array is only
> inspected if the PTE
On Thu, 2015-01-08 at 18:20 +0100, Dario Faggioli wrote:
> On Tue, 2015-01-06 at 03:28 +, Pang, LongtaoX wrote:
> > [Pang, LongtaoX]
> > [Pang, LongtaoX] Thanks for checking. We used ts-debian-hvm-install for
> > installing L1 HVM guest via ISO Image,
> > because we will build XEN, XEN-Tools
On Mon, 2014-12-01 at 14:21 +, Euan Harris wrote:
> Tools debug builds are built with optimization level -O1, inherited from
> the CFLAGS definition in StdGNU.mk. Optimizations confuse the debugger,
> and the comment justifying -O1 in StdGNU.mk should not apply for a
> userspace library.
(Fo
Ian Campbell wrote:
> On Thu, 2015-01-08 at 09:37 -0700, Jim Fehlig wrote:
>
>> xen.org wrote:
>>
>>> flight 33157 libvirt running [real]
>>> http://www.chiark.greenend.org.uk/~xensrcts/logs/33157/
>>>
>>> Regressions :-(
>>>
>>> Tests which did not succeed and are blocking,
>>> including t
>>> On 08.01.15 at 17:56, wrote:
> At 16:29 + on 08 Jan (1420730974), Jan Beulich wrote:
>> >>> On 08.01.15 at 17:16, wrote:
>> > At 15:50 + on 08 Jan (1420728649), Jan Beulich wrote:
>> >> While the REP MOVS acceleration appears to have helped qemu-traditional
>> >> based guests, qemu-up
On Thu, 2015-01-08 at 16:22 +, Jan Beulich wrote:
> 1: avoid named helper symbols
> 2: certain methods are not supposed to have a return value
>
> Reported-by: Ian Campbell
> Signed-off-by: Jan Beulich
FWIW (I'm no asl expect): Acked-by: Ian Campbell
_
When converting a pfn to a physical address be sure to use 64 bit
wide types.
Also avoid invalidating memory for zero sized non-aligned extra
memory regions.
Signed-off-by: Juergen Gross
Tested-by: Boris Ostrovsky
---
arch/x86/xen/setup.c | 6 --
1 file changed, 4 insertions(+), 2 deletion
In xen_rebuild_p2m_list() for large areas of invalid or identity
mapped memory the pmd entries on 32 bit systems are initialized
wrong. Correct this error.
Suggested-by: Boris Ostrovsky
Signed-off-by: Juergen Gross
---
arch/x86/xen/p2m.c | 2 +-
1 file changed, 1 insertion(+), 1 deletion(-)
di
In the setup code of the linear mapped p2m list several bugs have
been found, especially for 32 bit dom0. These patches correct the
errors and make 32 bit dom0 bootable again.
Juergen Gross (3):
xen: correct error for building p2m list on 32 bits
xen: correct race in alloc_p2m_pmd()
xen: use
When allocating a new pmd for the linear mapped p2m list a check is
done for not introducing another pmd when this just happened on
another cpu. In this case the old pte pointer was returned which
points to the p2m_missing or p2m_identity page. The correct value
would be the pointer to the found ne
At 16:29 + on 08 Jan (1420730974), Jan Beulich wrote:
> >>> On 08.01.15 at 17:16, wrote:
> > At 15:50 + on 08 Jan (1420728649), Jan Beulich wrote:
> >> While the REP MOVS acceleration appears to have helped qemu-traditional
> >> based guests, qemu-upstream (or really the respective video B
On Sun, 21 Dec 2014, Chuck Tuffli wrote:
> With Xen configured into the arm64 kernel, any driver allocating
> DMA'able memory for PCI operations, must be GPL compatible, regardless
> of its interaction with Xen. This patch relaxes the GPL requirement of
> xen_dma_ops and its dependencies to allow o
> -Original Message-
> From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
> Sent: Thursday, January 08, 2015 11:55 PM
> To: Xu, Quan; xen-devel@lists.xen.org
> Cc: samuel.thiba...@ens-lyon.org; stefano.stabell...@eu.citrix.com
> Subject: Re: [PATCH v2 1/5] vTPM: event channel bind inter
On Thu, 8 Jan 2015, Ian Campbell wrote:
> On Thu, 2015-01-08 at 16:07 +, Wei Liu wrote:
> > On Thu, Jan 08, 2015 at 02:07:42PM +, Ian Campbell wrote:
> > > On Wed, 2014-11-26 at 16:55 +, Wei Liu wrote:
> > > > Modify libxl and hotplug script to allow raw format file to use phy
> > > > b
On Thu, 2015-01-08 at 09:37 -0700, Jim Fehlig wrote:
> xen.org wrote:
> > flight 33157 libvirt running [real]
> > http://www.chiark.greenend.org.uk/~xensrcts/logs/33157/
> >
> > Regressions :-(
> >
> > Tests which did not succeed and are blocking,
> > including tests which could not be run:
> > bu
xen.org wrote:
> flight 33157 libvirt running [real]
> http://www.chiark.greenend.org.uk/~xensrcts/logs/33157/
>
> Regressions :-(
>
> Tests which did not succeed and are blocking,
> including tests which could not be run:
> build-amd64-libvirt queued
> test-amd64-i386-l
On Tue, Apr 8, 2014 at 7:26 AM, Anthony PERARD
wrote:
> On Tue, Apr 08, 2014 at 11:49:43AM +0100, George Dunlap wrote:
>> On Mon, Apr 7, 2014 at 9:50 PM, Eric Shelton wrote:
>> > Where does this feature stand currently? It pops up under a couple of
>> > names
>> > and proposed implementations (
At 16:30 + on 08 Jan (1420731016), Jan Beulich wrote:
> >>> On 08.01.15 at 17:14, wrote:
> > At 15:52 + on 08 Jan (1420728734), Jan Beulich wrote:
> >> - struct msixtbl_entry's table_len field can be unsigned int, and by
> >> moving it down a little the structure size can be reduced slig
Newer iasl complains about this being violated.
Also convert a ShiftLeft(, ) to a plain constant.
Reported-by: Ian Campbell
Signed-off-by: Jan Beulich
--- a/tools/firmware/hvmloader/acpi/mk_dsdt.c
+++ b/tools/firmware/hvmloader/acpi/mk_dsdt.c
@@ -222,12 +222,9 @@ int main(int argc, char **argv
Newer iasl validly complains that such routines would otherwise need to
be marked Serialized (in the SSDT case it can't know that explicit
serialization is being enforced), which is undesirable. Use Local
instead.
Reported-by: Ian Campbell
Signed-off-by: Jan Beulich
--- a/tools/firmware/hvmload
>>> On 08.01.15 at 17:14, wrote:
> At 15:52 + on 08 Jan (1420728734), Jan Beulich wrote:
>> - struct msixtbl_entry's table_len field can be unsigned int, and by
>> moving it down a little the structure size can be reduced slightly
>> - a disjoint xmalloc()/memset() pair can be converted to x
>>> On 08.01.15 at 17:16, wrote:
> At 15:50 + on 08 Jan (1420728649), Jan Beulich wrote:
>> While the REP MOVS acceleration appears to have helped qemu-traditional
>> based guests, qemu-upstream (or really the respective video BIOSes)
>> doesn't appear to benefit from that. Instead the acceler
At 16:00 + on 08 Jan (1420729255), Jan Beulich wrote:
> 1: spinlock: use local_irq_disable() instead of local_irq_save() where
> possible
> 2: rwlock: allow arch to override read_unlock() atomic
> 3: rwlock: allow arch to override write_unlock() atomic
>
> Signed-off-by: Jan Beulich
Reviewe
1: avoid named helper symbols
2: certain methods are not supposed to have a return value
Reported-by: Ian Campbell
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
At 15:50 + on 08 Jan (1420728649), Jan Beulich wrote:
> While the REP MOVS acceleration appears to have helped qemu-traditional
> based guests, qemu-upstream (or really the respective video BIOSes)
> doesn't appear to benefit from that. Instead the acceleration added
> here provides a visible p
... (for consistency with read_unlock()), and default it to xchg(),
being generally cheaper than cmpxchg().
Signed-off-by: Jan Beulich
--- a/xen/common/spinlock.c
+++ b/xen/common/spinlock.c
@@ -438,10 +438,14 @@ int _write_trylock(rwlock_t *lock)
return 1;
}
-void _write_unlock(rwlock_t
At 15:52 + on 08 Jan (1420728734), Jan Beulich wrote:
> - struct msixtbl_entry's table_len field can be unsigned int, and by
> moving it down a little the structure size can be reduced slightly
> - a disjoint xmalloc()/memset() pair can be converted to xzalloc()
> - a pointless local variable
At 15:51 + on 08 Jan (1420728683), Jan Beulich wrote:
> Also simplify a few other operations (without funtional change).
>
> Signed-off-by: Jan Beulich
Reviewed-by: Tim Deegan
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.or
On x86, LOCK DEC is cheaper than LOCK CMPXCHG and doesn't require a
retry loop around it.
Signed-off-by: Jan Beulich
--- a/xen/common/spinlock.c
+++ b/xen/common/spinlock.c
@@ -333,14 +333,18 @@ int _read_trylock(rwlock_t *lock)
return 1;
}
-void _read_unlock(rwlock_t *lock)
-{
-uint
... as generally being a cheaper operation.
Signed-off-by: Jan Beulich
--- a/xen/common/spinlock.c
+++ b/xen/common/spinlock.c
@@ -162,7 +162,7 @@ unsigned long _spin_lock_irqsave(spinloc
local_irq_restore(flags);
while ( likely(_raw_spin_is_locked(&lock->raw)) )
c
On Thu, 2015-01-08 at 16:07 +, Wei Liu wrote:
> On Thu, Jan 08, 2015 at 02:07:42PM +, Ian Campbell wrote:
> > On Wed, 2014-11-26 at 16:55 +, Wei Liu wrote:
> > > Modify libxl and hotplug script to allow raw format file to use phy
> > > backend.
> > >
> > > The block script now tests th
>>> On 08.01.15 at 17:01, wrote:
> There appear to other many other places which could benifit from a
> caching of guest_x86_mode() (especially in the nested virt case). Is it
> worth considering unconditionally calculating on vmexit and removing the
> function?
If it's _only_ nested, then maybe
>>> On 08.01.15 at 16:59, wrote:
> On Thu, Jan 8, 2015 at 1:54 PM, Jan Beulich wrote:
>>> the 1st invocation of this interface will save all reported reserved
>>> regions under domain structure, and later invocation (e.g. from
>>> hvmloader) gets saved content.
>>
>> Why would the reserved region
On Thu, Jan 08, 2015 at 02:07:42PM +, Ian Campbell wrote:
> On Wed, 2014-11-26 at 16:55 +, Wei Liu wrote:
> > Modify libxl and hotplug script to allow raw format file to use phy
> > backend.
> >
> > The block script now tests the path and determine the actual type of
> > file (block device
>>> On 08.01.15 at 16:56, wrote:
> At 15:23 + on 08 Jan (1420727005), Jan Beulich wrote:
>> +if ( (value & EFER_LMSLE) && !cpu_has_lmsl )
>> +return 0;
>
> I see this bit has no CPUID flag, and the docs don't seem to suggest
> that it would ever not be valid. Are there real CPUs
On Thu, 2015-01-08 at 15:58 +, Thomas Leonard wrote:
> On 8 January 2015 at 15:52, Ian Campbell wrote:
> > On Tue, 2014-10-21 at 11:50 +0100, Ian Campbell wrote:
> >> On Fri, 2014-10-03 at 10:20 +0100, Thomas Leonard wrote:
> >> > Based on an initial patch by Karim Raslan.
> >> >
> >> > Signed
On 08/01/15 15:22, Jan Beulich wrote:
> - drop clearing of excessive multicall arguments in compat case (no
> longer needed now that hypercall_xlat_continuation() only checks the
> actual arguments)
> - latch current into a local variable
> - use the cached value of hvm_guest_x86_mode() instead
1: spinlock: use local_irq_disable() instead of local_irq_save() where possible
2: rwlock: allow arch to override read_unlock() atomic
3: rwlock: allow arch to override write_unlock() atomic
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-de
On Thu, Jan 8, 2015 at 1:54 PM, Jan Beulich wrote:
> Ideally, rather than detecting conflicts, hvmloader would just
> consume what libxc set up. Obviously that would require awareness
> in libxc of things it currently doesn't care about (like fitting PCI BARs
> into the MMIO hole, enlarging it as
On 8 January 2015 at 15:52, Ian Campbell wrote:
> On Tue, 2014-10-21 at 11:50 +0100, Ian Campbell wrote:
>> On Fri, 2014-10-03 at 10:20 +0100, Thomas Leonard wrote:
>> > Based on an initial patch by Karim Raslan.
>> >
>> > Signed-off-by: Karim Allah Ahmed
>> > Signed-off-by: Thomas Leonard
>>
>>
At 15:38 + on 08 Jan (1420727918), Andrew Cooper wrote:
> Use the standard "do { } while ( 0 )" semantics, and don't hide the break
> statement, incase this macro wants to be used anywhere outside of a switch.
>
> No functional change, but it is now clear that long_mode_do_msr_write()
> doesn'
At 15:23 + on 08 Jan (1420727005), Jan Beulich wrote:
> +if ( (value & EFER_LMSLE) && !cpu_has_lmsl )
> +return 0;
I see this bit has no CPUID flag, and the docs don't seem to suggest
that it would ever not be valid. Are there real CPUs where it can't
be set?
My reviewed-by: stan
On 01/08/2015 03:20 AM, Xu, Quan wrote:
-Original Message-
From: Daniel De Graaf [mailto:dgde...@tycho.nsa.gov]
Sent: Wednesday, January 07, 2015 3:47 AM
To: Xu, Quan; xen-devel@lists.xen.org
Cc: samuel.thiba...@ens-lyon.org; stefano.stabell...@eu.citrix.com
Subject: Re: [PATCH v2 1/5]
>>> On 08.01.15 at 16:49, wrote:
> On 01/08/2015 04:50 AM, Jan Beulich wrote:
> On 07.01.15 at 18:55, wrote:
>>> There probably would not be too serious issues in converting everything
>>> to PXM, or adding duplicates, but I don't see the reason why we should
>>> do such a thing... Perhaps I'
At 15:15 + on 08 Jan (1420726540), Jan Beulich wrote:
> 1: streamline hypercall_create_continuation()
> 2: HVM: clobber hypercall arguments just like for PV
> 3: HVM: make hvm_efer_valid() honor guest features
>
> Signed-off-by: Jan Beulich
Reviewed-by: Tim Deegan
_
On Tue, 2014-10-21 at 11:50 +0100, Ian Campbell wrote:
> On Fri, 2014-10-03 at 10:20 +0100, Thomas Leonard wrote:
> > Based on an initial patch by Karim Raslan.
> >
> > Signed-off-by: Karim Allah Ahmed
> > Signed-off-by: Thomas Leonard
>
> Acked-by: Ian Campbell
Applied (for 4.6), thanks.
#2
- struct msixtbl_entry's table_len field can be unsigned int, and by
moving it down a little the structure size can be reduced slightly
- a disjoint xmalloc()/memset() pair can be converted to xzalloc()
- a pointless local variable can be dropped
Signed-off-by: Jan Beulich
--- unstable.orig/xe
Also simplify a few other operations (without funtional change).
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/vioapic.c
+++ b/xen/arch/x86/hvm/vioapic.c
@@ -46,11 +46,9 @@
static void vioapic_deliver(struct hvm_hw_vioapic *vioapic, int irq);
-static unsigned long vioapic_read_indirect(
While the REP MOVS acceleration appears to have helped qemu-traditional
based guests, qemu-upstream (or really the respective video BIOSes)
doesn't appear to benefit from that. Instead the acceleration added
here provides a visible performance improvement during very early HVM
guest boot.
Signed-o
On 01/08/2015 04:50 AM, Jan Beulich wrote:
On 07.01.15 at 18:55, wrote:
There probably would not be too serious issues in converting everything
to PXM, or adding duplicates, but I don't see the reason why we should
do such a thing... Perhaps I'm missing what using PXM would actually buy
us?
As
1: also allow REP STOS emulation acceleration
2: HVM: drop pointless parameters from vIOAPIC internal routines
3: HVM: vMSI simplification
Signed-off-by: Jan Beulich
___
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
Use the standard "do { } while ( 0 )" semantics, and don't hide the break
statement, incase this macro wants to be used anywhere outside of a switch.
No functional change, but it is now clear that long_mode_do_msr_write()
doesn't have fallthough for the STAR, LSTAR and SYSCALL_MASK cases.
Signed-
All,
now that 4.5 is almost out the door, I'd like to get stable releases
prepared on the other two active branches. 4.3.4 is expected to be
the last xen.org managed release on the 4.3 branch. Aiming at RC1s
some time next week, please indicate commits you consider relevant
to backport but find mi
On 08/01/2015 02:33, trump_zhang wrote:
Hi,
I am trying to test the single-queue networking performance for
netback/netfront in upstream, my testing environment is as follows:
1. Using pkt-gen to send a single UDP flow from one host to a vm
which runs on another XEN host. Two hosts ar
These two patches are the common parts of a larger Xen series[1]
fixing several long-standing bugs the handling of foreign[2] pages in
Xen guests.
The first patch is required to fix get_user_pages[_fast]() with
userspace space mappings of such foreign pages. Basically, pte_page()
doesn't work so
Add an optional array of pages to struct vm_area_struct that can be
used find the page backing a VMA. This is useful in cases where the
normal mechanisms for finding the page don't work. This array is only
inspected if the PTE is special.
Splitting a VMA with such an array of pages is trivially
From: Jenny Herbert
The foreign page flag will be used by Xen guests to mark pages that
have grant mappings of frames from other (foreign) guests.
The foreign flag is an alias for the existing (Xen-specific) pinned
flag. This is safe because pinned is only used on pages used for page
tables and
Usage:
spice_streaming_video=[filter|all|off]
Specifies what streaming video setting is to be used by spice (if
given),
otherwise the qemu default will be used.
Signed-off-by: Fabio Fantoni
---
Changes in v2:
- refresh
---
docs/man/xl.cfg.pod.5 | 5 +
tools/libxl/libxl.h |
Usage:
spice_image_compression=[auto_glz|auto_lz|quic|glz|lz|off]
Specifies what image compression is to be used by spice (if given),
otherwise the qemu default will be used.
Signed-off-by: Fabio Fantoni
---
Changes in v2:
- refresh
---
docs/man/xl.cfg.pod.5 | 5 +
tools/libxl/libx
Following the earlier similar change validating CR4 modifications.
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -1672,20 +1672,53 @@ static int hvm_save_cpu_ctxt(struct doma
return 0;
}
-static bool_t hvm_efer_valid(struct domain *d,
-
Unused arguments get clobbered before the call (not affecting caller
visible state), while used arguments get clobbered afterwards unless
a continuation is needed (affecting caller visible state).
Signed-off-by: Jan Beulich
--- a/xen/arch/x86/hvm/hvm.c
+++ b/xen/arch/x86/hvm/hvm.c
@@ -4818,6 +48
- drop clearing of excessive multicall arguments in compat case (no
longer needed now that hypercall_xlat_continuation() only checks the
actual arguments)
- latch current into a local variable
- use the cached value of hvm_guest_x86_mode() instead of re-executing
it
- scope restrict "regs"
-
>>> On 08.01.15 at 16:15, wrote:
> On Thu, Jan 8, 2015 at 1:00 PM, Jan Beulich wrote:
> On 08.01.15 at 13:54, wrote:
>>> On Thu, Jan 8, 2015 at 12:49 PM, George Dunlap
>>> wrote:
If RMRRs almost always happen up above 2G, for example, then a simple
solution that wouldn't require t
1 - 100 of 172 matches
Mail list logo